DeFi Protocol Balancer Loses $120M in Exploit

Balancer, a decentralized finance (DeFi) protocol, recently suffered a significant security breach resulting in a loss of $120 million. The exploit targeted vulnerabilities within the protocol's smart contracts, allowing attackers to manipulate the system and drain funds. This incident highlights the ongoing risks associated with DeFi platforms, which, despite their innovative financial models, remain attractive targets for cybercriminals due to their complex and often untested codebases. The attack on Balancer underscores the critical need for rigorous security audits and continuous monitoring in the DeFi space. As decentralized platforms grow in popularity, the sophistication of attacks is also increasing, necessitating advanced defensive measures. Users and investors are urged to exercise caution and stay informed about the security posture of the platforms they engage with. This breach also raises questions about regulatory oversight and the implementation of standardized security protocols across DeFi projects. While the decentralized nature of these platforms offers numerous benefits, it also complicates incident response and recovery efforts. The Balancer exploit serves as a cautionary tale for the broader crypto community, emphasizing the importance of security-first approaches in the development and deployment of blockchain-based financial services.

This Cyber News was published on www.infosecurity-magazine.com. Publication date: Tue, 04 Nov 2025 09:50:03 +0000


Cyber News related to DeFi Protocol Balancer Loses $120M in Exploit

CVE-2025-41233 - Description: ...
8 months ago
DeFi Protocol Balancer Loses $120M in Exploit - Balancer, a decentralized finance (DeFi) protocol, recently suffered a significant security breach resulting in a loss of $120 million. The exploit targeted vulnerabilities within the protocol's smart contracts, allowing attackers to manipulate the ...
4 months ago Infosecurity-magazine.com
Hackers Stolen $500K Exploiting Balancer Vulnerability - Hackers have exploited a critical vulnerability in the Balancer protocol, resulting in a theft exceeding $500,000. This incident highlights the growing risks associated with decentralized finance (DeFi) platforms and the urgent need for enhanced ...
4 months ago Cybersecuritynews.com
Hacker steals over $120 million from Balancer DeFi crypto protocol - In a significant security breach, a hacker has exploited the Balancer DeFi crypto protocol, resulting in a theft exceeding $120 million. This incident highlights the growing risks associated with decentralized finance platforms, which, despite their ...
4 months ago Bleepingcomputer.com
Attackers Drained $128M From Balancer Pools - In a significant cybersecurity incident, attackers successfully drained $128 million from Balancer pools, highlighting vulnerabilities in decentralized finance (DeFi) platforms. This attack underscores the increasing sophistication of cybercriminals ...
4 months ago Cybersecuritynews.com
1inch Partners with InnerWorks to Strengthen DeFi Security - 1inch, a leading decentralized finance (DeFi) aggregator, has announced a strategic partnership with InnerWorks, a cybersecurity firm specializing in blockchain security. This collaboration aims to enhance the security framework of 1inch's DeFi ...
4 months ago Cybersecuritynews.com
Hackers Steal Assets Worth $484,000 in Ledger Security Breach - Threat actors responsible for attacking Ledger's connector library have stolen assets valued at approximately $484,000. This information was given by the blockchain analysis platform Lookonchain. Ledger has said that the security breach might have a ...
2 years ago Cysecurity.news
CVE-2023-28846 - Unpoly is a JavaScript framework for server-side web applications. There is a possible Denial of Service (DoS) vulnerability in the `unpoly-rails` gem that implements the Unpoly server protocol for Rails applications. This issues affects Rails ...
2 years ago
AWS WAF: Secure CDN, Load Balancers, API Servers - DZone - If you want your application to contain specific validation tokens in headers, you can specify such rules in the WebACL associated with the Application Load Balancer. With AWS WAF, you can create security rules that control bot traffic and block ...
1 year ago Feeds.dzone.com
Chainalysis observes decrease in cryptocurrency crime in 2023 - While the ransomware market is rising and cybercriminals continue to rack up bitcoin payments, illicit cryptocurrency activity is declining, according to new research from Chainalysis. Funds sent to illicit cryptocurrency addresses dropped from $39.6 ...
2 years ago Techtarget.com Rocke
What is cloud load balancing? - Cloud load balancing is the process of distributing workloads across computing resources in a cloud computing environment and carefully balancing the network traffic accessing those resources. Cloud load balancing helps enterprises achieve ...
1 year ago Techtarget.com
The past year was the most detrimental for digital currency security breaches, with North Korean organizations profiting. - In 2022, cyberattacks on cryptocurrency platforms resulted in the theft of almost $4 billion, with a large portion of the activity being attributed to hackers working on behalf of the North Korean government. According to blockchain research firm ...
3 years ago Therecord.media Lazarus Group
North Koreans finish initial laundering stage after more than $1 billion stolen from Bybit | The Record from Recorded Future News - TRM Labs has tracked previous thefts by North Korean actors and found a similar playbook, where the hackers use DeFi platforms to convert funds into Bitcoin before using mixers to obfuscate the source of the cryptocurrency. Last week, the FBI ...
1 year ago Therecord.media Lazarus Group
CVE-2025-38491 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
U.S. recovers $31 million stolen in 2021 Uranium Finance hack - U.S. authorities recovered $31 million in cryptocurrency stolen in 2021 cyberattacks on Uranium Finance, a Binance Smart Chain-based DeFi protocol. The second attack took place on April 28, 2021, and leveraged a single-character coding error in ...
1 year ago Bleepingcomputer.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
What Is Dynamic Host Configuration Protocol (DHCP)? - DHCP, or Dynamic Host Configuration Protocol, is a network protocol that allows devices on a network to be automatically assigned an IP address. DHCP is used extensively in both home and enterprise networks, as it simplifies the process of ...
3 years ago Heimdalsecurity.com
CVE-2022-49018 - In the Linux kernel, the following vulnerability has been resolved: mptcp: fix sleep in atomic at close time Matt reported a splat at msk close time: BUG: sleeping function called from invalid context at net/mptcp/protocol.c:2877 in_atomic(): 1, ...
1 year ago Tenable.com
CVE-2020-3172 - A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code as root or cause a denial of service (DoS) condition on an affected ...
2 years ago
NK Hackers Use EtherHiding to Steal Cryptocurrency - North Korean hackers have been identified using a sophisticated malware called EtherHiding to steal cryptocurrency from victims. This malware specifically targets Ethereum wallets by hiding malicious code within legitimate smart contracts, making ...
4 months ago Infosecurity-magazine.com North Korean hackers
Lazarus Group Attacking Crypto Users Via Telegram - In a calculated escalation of cyber warfare, the Lazarus Group, a notorious North Korea hacking unit, has pivoted its focus to cryptocurrency projects, employing intricate phishing scams on the widely-used platform Telegram. SlowMist, a cybersecurity ...
2 years ago Cybersecuritynews.com Lazarus Group
Indian Authorities Seize Loot From Collapsed BitConnect Crypto Scam - This seizure sets a precedent for India’s fight against crypto-enabled financial crimes, signaling tighter scrutiny of DeFi projects and cross-agency collaboration to trace illicit flows across chains like Binance Smart Chain and Solana. Between ...
1 year ago Cybersecuritynews.com
OKX suspends DEX aggregator after Lazarus hackers try to launder funds - OKX Web3 has decided to suspend its DEX aggregator services to implement security upgrades following reports of abuse by the notorious North Korean Lazarus hackers, who recently conducted a $1.5 billion crypto heist. OKX is a leading global ...
11 months ago Bleepingcomputer.com Lazarus Group
CVE-2024-34343 - Nuxt is a free and open-source framework to create full-stack web applications and websites with Vue.js. The `navigateTo` function attempts to blockthe `javascript:` protocol, but does not correctly use API's provided by `unjs/ufo`. This library ...
1 year ago