Thursday, March 27, 2025
HomecryptocurrencyStablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

Published on

SIEM as a Service

Follow Us on Google News

The cryptocurrency sector faced one of its most significant security breaches this year as stablecoin banking platform @0xinfini fell victim to a sophisticated cyberattack.

Hackers drained 49.5 million USD Coin ($USDC) from the platform’s reserves, triggering immediate market turbulence and raising urgent questions about the security infrastructure of decentralized finance (DeFi) protocols.

The stolen funds were swiftly converted into 49.5 million Dai ($DAI) and then into 17,696 Ethereum ($ETH), which were transferred to an anonymous wallet, exacerbating concerns about the stability of algorithmic stablecoins and their susceptibility to systemic risks.

Chronology of the Attack

The breach occurred at approximately 15:45 UTC when attackers exploited a vulnerability in @0xinfini’s smart contract infrastructure to withdraw $USDC directly from the platform’s liquidity pools.

Blockchain analytics firm Lookonchain traced the stolen $USDC to a series of rapid transactions: within 15 minutes, the hackers exchanged the entire sum for $DAI via decentralized exchanges (DEXs) like Uniswap and Curve Finance, capitalizing on the stablecoin’s deep liquidity to avoid price slippage.

By 16:00 UTC, the $DAI was converted into 17,696 $ETH at an average price of $2,800 per token, with the funds subsequently moved to wallet address “0xfcc8…6e49”.

The attacker’s decision to funnel stolen assets into $ETH—a volatile cryptocurrency—suggests a strategy to obscure transaction trails through cross-chain interoperability protocols.

Security experts at Etherscan noted that the wallet’s lack of prior activity and its sudden inflow of $ETH indicate premeditated planning, potentially involving insider knowledge of @0xinfini’s operational safeguards.

Immediate Market Reactions

The hack sent shockwaves through cryptocurrency markets, destabilizing $USDC’s peg to the U.S. dollar.

Within 10 minutes of the breach becoming public, $USDC’s value dropped 0.2% to $0.998, reflecting investor apprehension about collateral reserves.

Conversely, $DAI briefly appreciated to $1.0005 as traders sought alternatives, though its robustness was attributed to its overcollateralized design.

Ethereum, however, surged 2% to $2,800 amid heightened trading activity, as markets speculated that the hacker’s $ETH accumulation might signal impending market manipulation.

Trading volumes for $USDC and $DAI spiked 300% and 200%, respectively, totaling $2.5 billion in combined hourly activity—a record for stablecoin pairs.

The frenzy extended to $ETH derivatives, with open interest on futures contracts rising 15% as traders hedged against potential volatility. The breach underscores persistent vulnerabilities in DeFi’s trustless architecture.

Analysts at DeFi Pulse warned that liquidity providers on platforms dependent on $USDC—which constitutes 32% of all stablecoin collateral—could face cascading losses if confidence erodes further.

Regulatory scrutiny is also expected to intensify; the transfer of stolen $ETH to an anonymous wallet complicates asset recovery efforts, highlighting jurisdictional challenges in decentralized ecosystems.

Technical indicators reveal a growing bearish sentiment. The Relative Strength Index (RSI) for $USDC fell to 45 post-hack, nearing oversold territory, while its Moving Average Convergence Divergence (MACD) confirmed a bearish crossover.

$DAI’s metrics suggested fleeting strength, with its RSI at 55 and MACD signaling bullish momentum, but these trends remain fragile given the interconnectedness of stablecoin markets.

Though unrelated to the attack’s origins, AI-driven trading algorithms responded swiftly to market dislocations.

Tokens like Fetch.ai ($FET) saw volume spikes of 5% as machine learning models adjusted portfolios to mitigate stablecoin exposure.

Projects emphasizing blockchain security, such as Ocean Protocol ($OCEAN), registered heightened social media activity, though their market performance remained stable.

@0xinfini has initiated a chain-wide freeze of the stolen $USDC in collaboration with Circle, though this process could take days due to regulatory approvals.

Crypto exchanges including Binance and Kraken have flagged the hacker’s wallet, but the pseudonymous nature of blockchain transactions complicates asset recovery.

For traders, monitoring on-chain activity and derivatives data—particularly $ETH’s funding rates—will prove critical in navigating near-term volatility.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Blacklock Ransomware Infrastructure Breached, Revealing Planned Attacks

Resecurity, a prominent cybersecurity firm, has successfully exploited a vulnerability in the Data Leak...

Classiscam Operators Use Automated Malicious Sites to Steal Financial Data

Classiscam, an automated scam-as-a-service operation, has been identified as a significant threat in Central...

G2 Names INE 2025 Cybersecurity Training Leader

INE, a global leader in networking and cybersecurity training and certifications, is proud to...

Threat Actors Compromise 150,000 Websites to Promote Chinese Gambling Platforms

A large-scale cyberattack has compromised approximately 150,000 legitimate websites by injecting malicious JavaScript to...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Blacklock Ransomware Infrastructure Breached, Revealing Planned Attacks

Resecurity, a prominent cybersecurity firm, has successfully exploited a vulnerability in the Data Leak...

Classiscam Operators Use Automated Malicious Sites to Steal Financial Data

Classiscam, an automated scam-as-a-service operation, has been identified as a significant threat in Central...

Threat Actors Compromise 150,000 Websites to Promote Chinese Gambling Platforms

A large-scale cyberattack has compromised approximately 150,000 legitimate websites by injecting malicious JavaScript to...