Monday, February 24, 2025
HomecryptocurrencyStablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

Published on

SIEM as a Service

Follow Us on Google News

The cryptocurrency sector faced one of its most significant security breaches this year as stablecoin banking platform @0xinfini fell victim to a sophisticated cyberattack.

Hackers drained 49.5 million USD Coin ($USDC) from the platform’s reserves, triggering immediate market turbulence and raising urgent questions about the security infrastructure of decentralized finance (DeFi) protocols.

The stolen funds were swiftly converted into 49.5 million Dai ($DAI) and then into 17,696 Ethereum ($ETH), which were transferred to an anonymous wallet, exacerbating concerns about the stability of algorithmic stablecoins and their susceptibility to systemic risks.

Chronology of the Attack

The breach occurred at approximately 15:45 UTC when attackers exploited a vulnerability in @0xinfini’s smart contract infrastructure to withdraw $USDC directly from the platform’s liquidity pools.

Blockchain analytics firm Lookonchain traced the stolen $USDC to a series of rapid transactions: within 15 minutes, the hackers exchanged the entire sum for $DAI via decentralized exchanges (DEXs) like Uniswap and Curve Finance, capitalizing on the stablecoin’s deep liquidity to avoid price slippage.

By 16:00 UTC, the $DAI was converted into 17,696 $ETH at an average price of $2,800 per token, with the funds subsequently moved to wallet address “0xfcc8…6e49”.

The attacker’s decision to funnel stolen assets into $ETH—a volatile cryptocurrency—suggests a strategy to obscure transaction trails through cross-chain interoperability protocols.

Security experts at Etherscan noted that the wallet’s lack of prior activity and its sudden inflow of $ETH indicate premeditated planning, potentially involving insider knowledge of @0xinfini’s operational safeguards.

Immediate Market Reactions

The hack sent shockwaves through cryptocurrency markets, destabilizing $USDC’s peg to the U.S. dollar.

Within 10 minutes of the breach becoming public, $USDC’s value dropped 0.2% to $0.998, reflecting investor apprehension about collateral reserves.

Conversely, $DAI briefly appreciated to $1.0005 as traders sought alternatives, though its robustness was attributed to its overcollateralized design.

Ethereum, however, surged 2% to $2,800 amid heightened trading activity, as markets speculated that the hacker’s $ETH accumulation might signal impending market manipulation.

Trading volumes for $USDC and $DAI spiked 300% and 200%, respectively, totaling $2.5 billion in combined hourly activity—a record for stablecoin pairs.

The frenzy extended to $ETH derivatives, with open interest on futures contracts rising 15% as traders hedged against potential volatility. The breach underscores persistent vulnerabilities in DeFi’s trustless architecture.

Analysts at DeFi Pulse warned that liquidity providers on platforms dependent on $USDC—which constitutes 32% of all stablecoin collateral—could face cascading losses if confidence erodes further.

Regulatory scrutiny is also expected to intensify; the transfer of stolen $ETH to an anonymous wallet complicates asset recovery efforts, highlighting jurisdictional challenges in decentralized ecosystems.

Technical indicators reveal a growing bearish sentiment. The Relative Strength Index (RSI) for $USDC fell to 45 post-hack, nearing oversold territory, while its Moving Average Convergence Divergence (MACD) confirmed a bearish crossover.

$DAI’s metrics suggested fleeting strength, with its RSI at 55 and MACD signaling bullish momentum, but these trends remain fragile given the interconnectedness of stablecoin markets.

Though unrelated to the attack’s origins, AI-driven trading algorithms responded swiftly to market dislocations.

Tokens like Fetch.ai ($FET) saw volume spikes of 5% as machine learning models adjusted portfolios to mitigate stablecoin exposure.

Projects emphasizing blockchain security, such as Ocean Protocol ($OCEAN), registered heightened social media activity, though their market performance remained stable.

@0xinfini has initiated a chain-wide freeze of the stolen $USDC in collaboration with Circle, though this process could take days due to regulatory approvals.

Crypto exchanges including Binance and Kraken have flagged the hacker’s wallet, but the pseudonymous nature of blockchain transactions complicates asset recovery.

For traders, monitoring on-chain activity and derivatives data—particularly $ETH’s funding rates—will prove critical in navigating near-term volatility.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Smart Bed Security Flaw Lets Hackers Access Other Network Devices

A security researcher has uncovered critical vulnerabilities in Eight Sleep’s internet-connected smart beds, revealing...

Apple Removes Advanced Data Protection (ADP) for UK Users

Apple has discontinued its Advanced Data Protection (ADP) feature for UK users following a...

Wireshark 4.4.4 Released – Explore the Latest Features!

The Wireshark Foundation has announced the release of Wireshark 4.4.4, the latest iteration of...

GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems

GhostSocks, a Golang-based SOCKS5 backconnect proxy malware, has emerged as a significant threat within...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Smart Bed Security Flaw Lets Hackers Access Other Network Devices

A security researcher has uncovered critical vulnerabilities in Eight Sleep’s internet-connected smart beds, revealing...

Apple Removes Advanced Data Protection (ADP) for UK Users

Apple has discontinued its Advanced Data Protection (ADP) feature for UK users following a...

Wireshark 4.4.4 Released – Explore the Latest Features!

The Wireshark Foundation has announced the release of Wireshark 4.4.4, the latest iteration of...