BlockThreat - Week 40, 2025

Abracadabra | Alt Town | SBI Crypto | Discord | TEE

BlockThreat - Week 40, 2025

Greetings!

Almost $5M were stolen this week across 6 incidents. On the DeFi side, Abracadabra suffered its third exploit which cost them $1.8M. It’s particularly unfortunate as the protocol did not practice defensive coding where a single missed else statement resulted in an unwanted state.

Yet another mining pool exploitation surfaced and was discovered weeks after it happened. The centralized nature of pools, combined with their large routine transfers, often obscures signs of compromise. This time $24M vanished from SBI Crypto were only noticed a week later when stolen funds began flowing to the usual laundering targets. As a reminder, the massive $3.5B Lubian miner hack went undetected for nearly five years, raising the question of how many other CeFi breaches remain unknown.

One of the more interesting exploits this week was a vulnerable 7702 wallet where attackers were able to drain more than $300K. The contract had a an unprotected pancakeV3SwapCallback function which allowed anyone to ask for a “repayment” which is exactly what the attacker for a USDT.C token:

pancakeV3SwapCallback(366,671,873,699, -1, 0x96fb784986284cb6d4a8da6dd50dd7e85ef38f5d)

The exploit was simple and the damage limited, but it’s a warning shot. A single vulnerable smart wallet could one day trigger multimillion losses across the ecosystem. Be careful which 3rd party smart wallet contracts you trust.



Let’s dive into the news!

News

Crime

Policy

Phishing

Scams

Research

Tools

Hacks

Unkn_dc8275

Date: September 29, 2025
Attack Vector: Bad Randomness
Impact: $143,000
Chain: Ethereum

References:

https://x.com/Phalcon_xyz/status/1972595841245516037
https://t.me/defimon_alerts/1926

Exploit:

https://etherscan.io/tx/0x9061d21aa6c0e2afd07a96a6371bb656bc11155aa9410bfcaa11b0742d159fce

Alt Town

Date: September 29, 2025
Attack Vector: Key/Signer Compromise
Impact: $1,200,000
Chain: BSC

References:

https://x.com/DecurityHQ/status/1972967737992638616
https://x.com/AlttownOfficial/status/1972853816652710317
https://medium.com/alttown/town-post-mortem-report-81322f2b587c

Exploit:

https://bscscan.com/tx/0xf8b234fd5eaa9e860b7d351644c89813158356879f521920d080553fc16d65c6

Hyperliquid User

Date: September 30, 2025
Attack Vector: Insufficient Function Access Control
Impact: $1,100,000
Chain: Ethereum

References:

https://x.com/GoPlusSecurity/status/1973218095272698141
https://x.com/PixOnChain/status/1973078867066716537

Exploit:

https://etherscan.io/tx/0x8bbb18a9c68e391b8b5c489e95d6e71c1908461fddcc33d5cca3c3e1cfb5b5e3

1Inch User

Date: October 01, 2025
Attack Vector: Forgotten approval
Impact: $200,000
Chain: Ethereum

References:

https://x.com/Cycho1337/status/1974101465624097197

Exploit:

https://etherscan.io/tx/0xe5e12f0d1211b5926e9a51bc22a9f289a5d65dadf2331cf31a6f8f9cc18d5085

7702 Wallet

Date: October 02, 2025
Attack Vector: Insufficient Function Access Control
Impact: $336,000
Chain: BSC

References:

https://x.com/TikkalaResearch/status/1973967082762220003

Exploit:

https://bscscan.com/tx/0x33242482763a2eca804180745bac6b2e96d7258da31ccde9a7345c92689c1668

Abracadabra

Date: October 04, 2025
Attack Vector: Logic Error
Impact: $1,800,000
Chain: Ethereum

References:

https://x.com/MIM_Spell/status/1975130787486831018
https://www.quillaudits.com/blog/hack-analysis/abracadabra-hack-explained
https://x.com/Phalcon_xyz/status/1974533451408986417
https://x.com/extractor_web3/status/1976671424455811296
https://blog.solidityscan.com/abracadabra-hack-analysis-f2efcdee9c05
https://hacken.io/insights/abracadabra-mim-hack-explained/
https://rekt.news/abracadabra-rekt3
https://docs.bughunter.live/blog/abracadabra-bughunter/
https://x.com/hklst4r/status/1974827196557426899
https://x.com/evilcos/status/1975438468219326502

Tracking:

https://x.com/Whistleblowe007/status/1976143986264863220

Exploit:

https://etherscan.io/tx/0x842aae91c89a9e5043e64af34f53dc66daf0f033ad8afbf35ef0c93f99a9e5e6
https://github.com/SunWeb3Sec/DeFiHackLabs/blob/main/src/test/2025-10/MIMSpell3_exp.sol