BlockThreat - Week 49, 2025

React | Yearn | USDP | Goldfinch | WaveX | Kroll | Binance

BlockThreat - Week 49, 2025

Greetings!

Almost $11M were stolen this week across four incidents. The majority of losses came from the Yearn Finance compromise where an attacker exploited an integer underflow to steal $9M. The key lesson is that this was yet another legacy codebase that had not been audited for years and contained a deep vulnerability in its math logic. As I mentioned in my recent talk, this is emerging as a real threat to many protocols and to the broader ecosystem that relies on them. Simply isolating or derisking these codebases may not always be feasible, so the practical path forward may require reauditing them with modern tools, improved techniques, and highly experienced auditors that simply did not exist when much of this code was written.

Another incident this week involved an exploit class I also highlighted in the same DSS talk. The USDP initialization hijacking allowed attackers to insert a malicious backdoor, resulting in a one million dollar theft. Attackers are becoming more sophisticated in how they place these backdoors, which is creating ideal conditions for a future watering hall contract scenario.

And just as we were getting a break from two mass supply chain attacks, the web2 world delivered another reminder of its fragility. The mass React compromise is one of the most severe exploitation campaigns in recent memory. Please patch your instances immediately!



Let’s dive into the news!

News

Crime

Policy

Phishing

Scams

Media

Contests

Research

Tools

  • coq-of-solidity - a tool to automatically translate Solidity smart contracts to the Rocq proof system. This allows to formally verify the correctness of the smart contracts.
  • Antidrain by Zun. Claim airdrops, recover staked tokens & rescue NFTs from compromised wallets. Powered by EIP-7702, execute atomic batch operations before sweeper bots can react.

Hacks

Yearn

Date: December 01, 2025
Attack Vector: Rounding Error
Impact: $9,000,000 (Recovered $2,390,000)
Chain: Ethereum

References:

https://x.com/SlowMist_Team/status/1996771017310834869
https://x.com/Phalcon_xyz/status/1995430697478361268
https://x.com/TenArmorAlert/status/1995334980008894918
https://x.com/PeckShieldAlert/status/1995311852310675537
https://x.com/yearnfi/status/1995259652288729315
https://x.com/hklst4r/status/1995319273456009274
https://x.com/TikkalaResearch/status/1995728415702577551
https://x.com/andrewhong5297/status/1995388055595933723

Analysis

https://slowmist.medium.com/9-million-stolen-analysis-of-the-yearn-yeth-pool-vulnerability-557237092054
https://defimon.xyz/blog/yearn-yeth-hack-november-2025
https://quillaudits.medium.com/yearn-yeth-exploit-bece9e5bb3dd
https://rekt.news/yearn-rekt3
https://github.com/banteg/yeth-exploit/blob/main/report.pdf
https://github.com/yearn/yearn-security/blob/master/disclosures/2025-12-01.md

Recovery:

https://x.com/yearnfi/status/1995488425785659492
https://protos.com/yearn-hacker-loses-2-4m-of-9m-loot-as-tokens-burned-from-wallet/

Exploit:

https://etherscan.io/tx/0x53fe7ef190c34d810c50fb66f0fc65a1ceedc10309cf4b4013d64042a0331156
https://github.com/johnnyonline/yeth-hack

Goldfinch

Date: December 02, 2025
Attack Vector: Price Oracle Manipulation
Impact: $330,000
Chain: Ethereum

References:

https://x.com/TenArmorAlert/status/1995774987706188201
https://x.com/GoPlusZH/status/1995842787078475801
https://x.com/PeckShieldAlert/status/1995774198564966434
https://x.com/TikkalaResearch/status/1995901805306544474

Negotiations:

https://etherscan.io/tx/0x2a4d83d30f924ab8c617d45ba29230f1339d194c88900a81b9b2db8010599fa0

Exploit:

https://etherscan.io/tx/0x3a8bde0a17e04f6a119ae2f28e6b56ac736feb70761e2fa97cac25f816f751c2
https://etherscan.io/tx/0xd462ce892166e041f303af47340ae50d22b3cadc55be65cecbfcab8f5d48e149
https://github.com/DK27ss/0x0689a-330K-PoC

USPD.IO

Date: December 04, 2025
Attack Vector: Uninitialized Contract
Impact: $1,050,000
Chain: Ethereum

References:

https://x.com/USPD_io/status/1996711283446464598
https://x.com/PeckShieldAlert/status/1996826080741937213
https://x.com/CertiKAlert/status/1996897892481827220
https://x.com/BlockscopeCo/status/1996976887608881435
https://x.com/AstraSecAI/status/1996905647355437363
https://rekt.news/uspd-rekt

Negotiations:

https://etherscan.io/tx/0x71237c1a93331b51072717768ba660c137f0009effcad04033066d204c4b68cd

Exploit:

https://etherscan.io/tx/0xc0b7e490caac2b8cfa5e62d1b28a5e7dba7600e623c71352acbc9b23c2b65b7c/advanced
https://etherscan.io/tx/0xf9a493f061fbf17fe2cf7c26d6b03d85c6b43026500e61728933c2e218581079

WaveX

Date: December 06, 2025
Attack Vector:
Impact:
$430,000
Chain: Soneium

References:

https://x.com/De_FiSecurity/status/1999143885235188025
https://x.com/DefimonAlerts/status/1998676082963456212
https://x.com/waveX_fi/status/1998645885409124636
https://x.com/waveX_fi/status/1998680217880244253