BlockThreat - Week 6, 2025

Tornado | KyberSwap | Ionic | Mode | Peapods

BlockThreat - Week 6, 2025

Greetings!

More than $12.5M was stolen this week across seven incidents. But before diving into a few intriguing case studies, we need to revisit a fascinating indictment by the U.S. Department of Justice. The case involves Andean Medjedovic, a Canadian hacker responsible for two massive DeFi exploits totaling $65M—Indexed Finance and KyberSwap.

The indictment reads like a spy thriller: brazen hacks, undercover agents, informants, extortion, and a near capture. If you need a refresher, Andy was behind the $16M Indexed Finance compromise in 2021. His identity was exposed due to a series of OPSEC mistakes, forcing him to spend the last three years as a fugitive from Canadian authorities. Now, we’ve learned he funded his life on the run through a years-long hacking spree that included KyberSwap, HXA Coin, QAN Platform, and more. If US DoJ’s ability to recover fugitives is even slightly better than their Canadian counterparts, then Andy may soon be joining Avi and SBF at MDC Brooklyn.

One of the week’s most interesting exploits was a $12.3M attack on Ionic (aka Midas) on Mode chain. Unlike purely technical hacks, this one involved a sophisticated month-long social engineering effort. The attacker convinced the team to add a fake LBTC token into the protocol, then quickly minted $24M worth of it and used it as collateral to drain the protocol. But here’s where it gets interesting—Mode chain intervened, freezing the attacker’s address. However, they were quickly reminded of the same L1 to L2 transaction backchannel that recently caught Soneium off guard.

Lastly, I’m tracking an attacker tearing through multiple no-source MEV contracts across various chains, all exploiting the same Insufficient Access Control vulnerability. Most individual hits are under $5K, but one already reached $188K. Just another reminder that vulnerabilities can be found—with or without source code.

To gain access to comprehensive vulnerability write-ups, post-mortems, exploit proof of concepts (PoCs), attacker addresses, and additional data regarding this week’s compromises, please subscribe to the premium plan below.

Let’s dive into the news!

News

Crime

Policy

Phishing

Scams

Malware

Media

Research

Tools

  • sb-heists - a comprehensive framework for testing smart contract security patches against real-world exploits by Assert at KTH Royal Institute of Technology.
  • Arachne - a scaffolding framework built to streamline the development of large-scale fuzzing suites. It offers a range of helper functions and a solid structure to minimize setup time, allowing users to begin fuzzing quickly and efficiently, while keeping the codebase maintainable. A great addition to Echidna and Medusa. Developed by Perimeter Security.
  • Medusa v1.0.0. A major release introduces on-chain fuzzing, Slither integration, more evm cheatcodes support.
  • Slither 0.11.0 released. Includes more detectors and printers as well as a beautiful storage viewer.
  • Search CTF Writeups - Find and explore CTF solutions and writeups including many DeFi contests.
  • LLM4Decompile - Reverse Engineering: Decompiling Binary Code with Large Language Models.

Hacks

Ionic, Midas Capital, Ironclad

Date: February 04, 2025
Attack Vector: Social Engineering
Impact: $12,300,000 (Recovered $8,800,000)
Chain: Mode

References:

https://x.com/CertiKAlert/status/1886955515990979040

https://x.com/ionicmoney/status/1886794417270317159

https://x.com/ionicmoney/status/1887141460992213411https://x.com/YouAreMyYield/status/1887076221910991012

https://nickfranklin.site/2025/02/05/ionic-finance-hacked/

https://postmortem.s3.us-east-1.amazonaws.com/postmortem.pdf

https://rekt.news/ionic-money-rekt/

Exploit:

https://explorer.mode.network/tx/0x9aa3fd43a6b0f85b4f1bf74f0c9e79773f238591d9c6fe666287bd2c8ac19009

https://explorer.mode.network/tx/0x5db6d90a17a44bed6d9ed9ca73d800df2661751fa1a273e71fc2174ad3b6944f

XSD Token

Date: February 06, 2025
Attack Vector: Reentrancy
Impact: $45,000
Chain: Ethereum, BSC, Optimism

References:

https://x.com/TenArmorAlert/status/1888141223094821215

https://x.com/0xNickLFranklin/status/1887783380588118290

https://x.com/SlowMist_Team/status/1887802943266771423

https://nickfranklin.site/2025/02/07/xsd-token-hacked/

Exploit:

https://etherscan.io/tx/0xcec091760cac239afb912396b53f778a3710d14ab05ca810c285fe31fa70ede6

https://bscscan.com/tx/0xe808330b8ddc2f7c6164743c210c9e1975de87c1949c6353d98f2d39e4dde182

https://optimistic.etherscan.io/tx/0xe1a3d0ddce6a075ee424fe0d0b87b465b363c2f26ca855b646296058f89b0c31

ADACash, Cashverse

Date: February 07, 2025
Attack Vector: Price Oracle Manipulation
Impact: $108,000
Chain: BSC

References:

https://x.com/Phalcon_xyz/status/1888143950990778773

https://x.com/SlowMist_Team/status/1888125078560452989

Exploit:

https://bscscan.com/tx/0x8501a9d34fc28bee21fd08505b3e4b1b0a4aec3a5496b508a290531d8eb25281

Unkn_0f29c2

Date: February 08, 2025
Attack Vector: Logic Error
Impact: $2,700
Chain: BSC

References:

https://x.com/TikkalaResearch/status/1888661849555804212

Exploit:

https://bscscan.com/tx/0x3168579cd23a703da74d3763bd572eb49d2f257c9c9be4da3cd6c321a557f9a7

Unkn_09C125

Date: February 08, 2025
Attack Vector: Insufficient Function Access Control
Impact: $188,000
Chain: Arbitrum

References:

Exploit:

https://arbiscan.io/tx/0x4b75157d64bb371380bc83256ee36034effb07c532b8623a34154aa881df9798

Peapods

Date: February 08, 2025
Attack Vector: Insufficient Function Access Control
Impact: $3,500
Chain: Ethereum

References:

https://nickfranklin.site/2025/02/09/peapods-finance-hacked/

https://x.com/Phalcon_xyz/status/1888163987696865499

https://blog.solidityscan.com/peapods-finance-hack-analysis-bdc5432107a5

Exploit:

https://etherscan.io/tx/0x2c1a19982aa88bee8a5d9a5dfeb406f2bfe1cfc1213f20e91d91ce3b55c86cc5

Unkn_9ad9

Date: February 09, 2025
Attack Vector: Insufficient Function Access Control
Impact: Assets Stolen
Chain: BSC

References:

https://x.com/TenArmorAlert/status/1888507016173220277

https://x.com/snfernandez/status/1888667689662488585

Exploit:

https://bscscan.com/tx/0x5eb225ce9fb2c7a169e1736eb3b2bf2b6a5843839dd84cdcf6fe2ab0577ae21f