$2.8M Refund After Loopscale Hack: Details, Events, and Current Trends in DeFi
In late April 2025, decentralized finance (DeFi) protocol Loopscale suffered a massive security incident that resulted in the theft of approximately $5.7 million in USDC and SOL cryptocurrency from its vaults. However, thanks to prompt communication and a strategy of cooperation with the attacker, some of the funds — almost half of the stolen funds — were returned. This incident demonstrates a changing trend in the DeFi industry, where hackers are increasingly reaching out to project teams, returning stolen assets in exchange for a reward and amnesty.
Incident stages and refund
The hack occurred on April 26, 2025. The attacker exploited a vulnerability in the pricing functions of the RateX PT tokens, which are part of the Loopscale infrastructure. This allowed him to withdraw about $5.7 million (equivalent) from the protocol – in USDC and SOL. The loss amounted to about 12% of the total platform assets and affected only depositors of the storage facilities – borrowers and other participants of the protocol were not affected.
As early as April 27, the Loopscale team took active steps to contact the exploiter, sending him an on-chain message with an offer: return 90% of the stolen funds in exchange for a 10% reward and complete exemption from legal liability. The team emphasized that without a positive response within 24 hours, law enforcement agencies will be involved.
In response, on April 28, the exploiter expressed his willingness to negotiate. As a result of the steps taken between April 28 and 29, approximately 19,463 Wrapped SOL (WSOL), equivalent to approximately $2.88 million, were returned to Loopscale wallets. The return took place in two tranches – first 10,000 WSOL (~$1.48 million), then 4,463 WSOL (~$660,000), with 5,000 WSOL (~$740,000) previously returned on April 27.
The Loopscale team has officially confirmed the progress of these efforts through updates on X, emphasizing the desire for a peaceful resolution to the incident and updating the community on the progress of negotiations.
The Role of Rewards and Whitehat Hacking in DeFi
The Loopscale team’s offer to reward the exploiter with 10% of the stolen funds was one of the key reasons for the successful recovery. This practice, a kind of collaborative whitehat hacking, is becoming increasingly common in the decentralized finance space.
Recovering funds from hacks in DeFi has long been considered an unlikely scenario due to the anonymity and decentralization of the ecosystem. However, cases like Loopscale and the earlier incident with lending protocol Term Finance suggest that negotiations and compensation agreements with attackers are becoming more common.
On April 27, Term Finance reported that it had successfully recovered about $1 million of the $1.6 million stolen as a result of a misconfigured oracle on the Treehouse (tETH) platform. The company recovered 223 ETH internally and an additional 333 ETH through negotiations with the exploiter.
Context of the Biggest Cyberattacks in Q1 2025
The April Loopscale incident is part of a larger pattern of rising attacks on cryptocurrency platforms. In the first quarter of 2025, total losses from exchange hacks and smart contract exploits exceeded $1.6 billion, according to a report from PeckShield, a leading blockchain security research firm.
The leading share of these losses – more than 90% – is due to one of the largest attacks carried out by the North Korean hacker group Lazarus Group on the centralized crypto exchange Bybit, amounting to about $1.5 billion. This highlights the ongoing threat to all types of crypto projects, centralized and decentralized.
The Loopscale incident clearly demonstrates that:
- Hacks and exploits in DeFi remain a serious problem and can cause significant losses.
- Active communication and offering rewards to exploiters can help to partially or fully recover stolen assets.
- The DeFi community is becoming more mature in terms of incident response and resolution mechanisms.
- Overall, the security of crypto projects and protocols remains a priority for the industry, requiring constant monitoring and improvement.
Loopscale continues to work on improving its security systems and maintains an open dialogue with the community, and industry experts are watching the situation with interest, seeing it as a positive example of conflict resolution in DeFi.
Here is a selection of articles and cases similar to the Loopscale protocol hack and refund case, revealing thematic aspects of security and incidents in DeFi in 2025:
- “DeFi Hacks: Methods and Cases” (BitHide)
An extensive overview of the main methods of hacking DeFi protocols, such as flash-loan attacks and oracle manipulation. The article provides examples of major attacks in 2025, including the Impermax and Dexodus Finance incidents, with a detailed analysis of the damage and attack mechanisms. It also raises the question of why DeFi remains vulnerable and how to protect funds.
Read more 1 - Cetus Protocol Hack Case Study: $220-260M
Exploit Analysis of the Cetus exploit, one of the biggest DeFi hacks of 2025, which used a vulnerability in smart contracts to manipulate oracle prices. The article reveals the consequences of the attack on liquidity and tokens, as well as the market reaction. Importantly, Cetus is now actively working to return the stolen funds.
Read more 2 - Hacken Cryptocurrency Loss Report 1H25
Analysis of losses from DeFi and CeFi hacks and breaches, highlighting key incidents including Cetus and other cases. Details on the causes of vulnerabilities, trends, and security recommendations.
Read more 3 - Arcadia Finance DeFi Platform Hacked for $2.5 Million
A description of a specific hack involving a vulnerability in the Rebalancer contract, asset withdrawal, and an attempt to hide traces. The Arcadia Finance team has confirmed the hack and is investigating.
Read more 4 - Review of the increasing number of hacks of DeFi projects and the return of funds by hackers (RBC, SecurityLab)
Analysis of frequent hacks and mechanisms for returning stolen funds, from the story of Vee Finance and SushiSwap to the largest case of PolyNetwork, where the hacker returned all the funds. Discussion of hackers’ motivations and practices of cooperation with project teams.
More details – RBC review 5
More details – GMX hack 6 - WOO X and CoinDCX — reward programs for refunding funds after hacks
Modern practices of crypto exchanges and DeFi platforms offering rewards to “white hackers” or exploiters in exchange for the return of stolen assets. Analysis of new compensation cases in the crypto industry in 2025.
More 7
DeFi Hacks in 2025: Main Attack Methods and Key Cases
Decentralized finance protocols (DeFi), despite the high level of innovation, remain a vulnerable area of the crypto industry. In 2025, the number and complexity of attacks on DeFi protocols has increased significantly, due to both technical vulnerabilities of the contracts themselves and the specifics of the ecosystem architecture. Below is an extensive overview of the main hacking methods common in 2025, as well as examples of high-profile incidents and an analysis of the causes of vulnerabilities.
Main Methods of Hacking DeFi Protocols
- Flash Loan Attacks
Flash loans are unsecured loans that must be repaid in a single transaction. Flash loans were originally created for arbitrage, but their ability to quickly use large amounts of money without upfront investment made them a powerful tool for attacks. In 2025, hackers actively use flash loans to manipulate token prices in liquidity pools, bypass limits, and exploit protocols.
Example: In April 2025, the Impermax protocol fell victim to a flash loan attack. The hacker manipulated Uniswap V3 fee calculations and logic errors, which allowed them to withdraw between $152,000 and $300,000 from the platform.
Another example: in May 2025, Dexodus Finance was flash-borrowed and outdated oracle signatures were manipulated, allowing a hacker with x100 leverage to make a profit of around $300,000 thanks to an artificially low ETH price. 1 - Oracle manipulation
Oracles provide external data, such as asset prices, to smart contracts. If the protocol does not verify the currency or authenticity of this data, attackers can use outdated or forged signatures, leading to incorrect asset pricing and the ability to withdraw funds. This was a key factor in the attack on Dexodus Finance. - Attacks on Bridges and Cross-Chain Protocols
Bridges between blockchains are a popular target due to their complex architecture, including smart contracts and centralized components. Their vulnerabilities lead to billions of dollars in leaked funds. In 2025, such cross-chain attacks have become one of the most expensive categories of DeFi hacks. 2 - Smart Contract Exploits
Errors in the logic and code of smart contracts, often due to rapid development without proper auditing, open a “hole” for hackers. These vulnerabilities can be related to incorrect balance handling, incorrect commission calculation logic, or neglected data checks. - Social Engineering and Phishing
Attacks through the compromise of private keys, fake websites, and tricks with trust relationships between users and developers continue to be effective methods for malicious actors. - Sandwich attacks
This is a manipulation of prices on decentralized exchanges (DEXs) where the attacker places transactions before and after a large order, creating an artificial price change and profiting at the expense of the victim. 5
Why DeFi Remains Vulnerable?
- Open and complex code. Smart contracts are often created quickly, with errors and new non-standard solutions. Even when audited, some vulnerabilities remain unnoticed.
- Decentralization and anonymity. The lack of a single point of responsibility makes it difficult to respond to incidents and recover stolen funds.
- Integration with external data and services. Protocols depend on oracles, libraries, and infrastructure, which themselves may have vulnerabilities.
- Large sums and motivation for hackers. High rewards for successful attacks attract increasingly experienced and organized attackers.
Examples of high-profile cases in 2025
- Impermax (April 2025): Flash loan attack resulted in withdrawals of up to $300,000 due to incorrect fee calculations in Uniswap V3. 1
- Dexodus Finance (May 2025): Using flash borrowing and reusing oracle signatures to make around $300,000 in profit with x100 leverage. 1
- Attacks on bridges and cross-chain protocols have caused multi-billion dollar losses within the DeFi ecosystem. 2
- Mass domain takeovers of abandoned DeFi protocols are a new attack vector where hackers take control of old sites and use them to phish and steal users’ cryptocurrency. 3
How to protect funds in DeFi?
- Use projects with a proven reputation and security audit.
- Keep your software up to date and strictly monitor key security.
- Be wary of complex transactions and price manipulation, avoiding suspicious liquidity pools and excessive leverage.
- Use multi-signatures, hardware wallets and other security measures.
- Monitor news and respond promptly to reports of hacks and vulnerabilities.
This review is based on an in-depth investigation by leading crypto media BitHide and other sources, revealing the deep mechanisms of hacks and security findings in the growing DeFi space in 2025. 1 2 3 5
Cetus Protocol Hack Case Is One of the Biggest DeFi Incidents of 2025
On May 22, 2025, Cetus Protocol, a leading decentralized exchange (DEX) on the Sui blockchain, suffered a massive attack, resulting in the attacker siphoning off between $220 million and $260 million in digital assets. The incident was one of the largest leaks in the history of decentralized finance (DeFi) and caused significant concern in the crypto community.
Hacking Mechanism and Vulnerability in Smart Contracts
The attack was carried out due to a vulnerability in the logic of Cetus smart contracts, namely in the pricing system and in the concentrated liquid market maker (CLMM) mechanism. The attacker exploited a flaw in the overflow check function math_u256::checked_shlw, which allowed the issuance of an infinite number of liquid pool tokens using only one token as input.
This made it possible to exhaust the protocol reserves and distort asset prices, effectively creating fictitious liquidity, and then use it to withdraw significant funds. In total, the hacker managed to steal about $223 million in SUI tokens, USDC and other cryptocurrencies.
The Impact of the Hack on Liquidity and Tokens
- Trading volumes on Cetus increased sharply on the day of the attack, from approximately $320 million to $2.9 billion, indicating widespread attacker activity.
- The price of the SUI token fell by about 14-15%, falling from $4.19 to around $3.6 by the end of May 2025. Similarly, the CETUS token fell by about 40%, from $0.26 to $0.15, reflecting market panic and declining confidence.
- Of the stolen funds, approximately $160 million were promptly frozen by the Sui development team and foundation partners, preventing further use and intended to be returned back to the liquidity pool.
- The remaining amount, approximately $60-63 million, was transferred to Ethereum in the form of ETH (about 21,900 ETH), highlighting the issue of cross-chain vulnerabilities and the difficulty of completely stopping the outflow of assets after an attack.
The Cetus Team’s Response and the Subsequent Recovery Process
Cetus Protocol responded quickly to the incident: the developers suspended all smart contracts, thereby freezing most of the stolen funds. Measures were initiated to eliminate the discovered vulnerability, and a reward program worth about $6 million was launched to encourage assistance in the investigation and return of assets.
The team is actively collaborating with the Sui community and various partners to minimize damage, restore liquidity, and gradually resume the platform. The protocol plans to relaunch with a more secure architecture and improved protection mechanisms.
General context and lessons for the DeFi community
The Cetus hack is a prime example of how bugs in complex smart contracts and insufficient code review can lead to significant losses in DeFi. The attack raises questions about the security of new blockchains and protocols like Sui, which are growing rapidly but require increased attention to auditing and testing.
The following lessons can be drawn from this incident:
- The need for rigorous and multi-stage code auditing, especially in critical token handling and liquidity functions.
- The importance of effective mechanisms for monitoring and quickly responding to anomalies in trading activity.
- The importance of coordinating with blockchain funds and communities to promptly freeze stolen assets and prevent additional losses.
- Cross-chain transaction vulnerabilities require special attention, as transferring assets between blockchains can complicate the recovery of stolen funds.
Results
- On May 22, 2025, an attack occurred on the Cetus Protocol on the Sui blockchain, resulting in the theft of between $220 and $260 million.
- A vulnerability in the smart contract overflow check function allowed an attacker to issue fictitious liquidity and withdraw large sums.
- Of the stolen funds, about $160 million were frozen and subject to return, and about $60 million went into the Ethereum network.
- The Cetus team has suspended operations, fixed the vulnerability, and is working to restore the platform.
- The incident was a shocking signal to the entire DeFi community about the need for increased security controls.
This case highlights that despite DeFi’s innovative potential, security issues remain fundamental. Continuous improvements and responsible risk management are needed to protect users’ funds and ensure the sustainable development of the ecosystem.
Hacken Report on Cryptocurrency Losses in the First Half of 2025: Causes, Scale, and Security Recommendations
The cryptocurrency industry has seen unprecedented losses from hacking and fraudulent schemes in the first half of 2025. According to analysts at cybersecurity company Hacken, losses have exceeded $3.1 billion , which is already more than the total losses for the entire 2024, which amounted to about $2.85 billion. 1 2 3
Key facts and trends of losses
- Total losses: Over $3.1 billion stolen due to exploits in decentralized (DeFi) and centralized (CeFi) crypto projects. 1 3
- Biggest Incident: The hack of centralized exchange Bybit in February 2025 resulted in the loss of approximately $1.5 billion. This attack remains the largest in the industry in 2025. 1 2 3
- Types of loss attacks:
- Access control exploits are the leading cause of losses, accounting for about 59% of all losses, or approximately $1.83 billion. This includes vulnerabilities related to multi-signature wallet security, compromised interfaces, improper key management, and access rights. 1 3 4
- Social engineering attacks and phishing account for about 19% of losses, or about $594 million. Attackers increasingly used deception and human factor methods to gain access to users’ and organizations’ funds. 1 3
- Errors and vulnerabilities in smart contracts led to losses of about $263-300 million, which is about 8-10% of the total damage. Technical bugs in the code of decentralized protocols remain a serious problem. 1 3 5
Key points from the Hacken report
- Despite innovations in the Web3 space, most attacks in 2025 will still rely on vulnerabilities known from previous years, including weaknesses in multisig wallet management that have put vast amounts of funds at risk.
- New trends have been identified: attackers are moving from technical methods to attacks on the human factor – phishing, key leaks, blind signature attacks.
- Vulnerabilities related to outdated versions of code (such as GMX V1) have also been used in a number of exploits, highlighting the importance of keeping projects up to date and supported. 1 2
- Hacken analysts recommend strengthening real-time monitoring, automating controls, and reviewing access control processes to prevent similar attacks in the future. 4
Examples of high-profile incidents that complete the picture
- Major hacks on DeFi protocols, including the famous Cetus case with the loss of over $220 million, reveal vulnerabilities in smart contracts and oracles. 1 3
- In particular, the attack on Bybit involved compromising the signing interface of multi-signature wallets, which allowed attackers to deceive authorized users and withdraw funds in the amount of $1.46 billion. 3 4
- Large-scale phishing campaigns and attacks on human factors lead to significant leaks of funds, which requires strengthening educational and informational work with users and company personnel. 1 3
Security recommendations based on the report
- Constantly updating and auditing software codes, abandoning outdated versions and providing support at the proper level.
- Implementation and improvement of multi-stage and multi-factor authentication in key and access management.
- Active use of monitoring technologies and automated response to anomalies in the operation of protocols and services.
- Strengthening information security measures, including training staff and users against phishing attacks and social engineering.
- Increase transparency and communication with the community to quickly respond to incidents.
Hacken Report
The Hacken H1 2025 report highlights that despite advances in technology and industry expertise, the cryptocurrency ecosystem remains at serious risk due to vulnerabilities at the process and human level. The biggest losses are not simply due to technical bugs, but to shortcomings in access control and key protection. Countering these challenges requires a comprehensive approach that includes technical, organizational, and educational measures.
This analysis helps to better understand the complexity and dynamism of cryptosecurity threats and provides practical guidance for investors, developers and users to protect their assets.
Arcadia Finance DeFi Platform Hacked for $2.5 Million: A Detailed Analysis of the Incident and Its Consequences
In June 2025, the decentralized financial platform Arcadia Finance, which operates on the Base blockchain, suffered a major cyberattack, resulting in the attacker stealing approximately $2.5 million in crypto assets. The incident became another alarming signal for the DeFi industry, highlighting the vulnerability of even relatively new projects and the importance of comprehensive smart contract protection.
Hack Mechanism: Vulnerability in Rebalancer Contract
A hacker managed to exploit a technical vulnerability in the Rebalancer smart contract , an important component of the Arcadia Finance protocol responsible for swap operations. The attacker changed arbitrary parameters swapData, which allowed him to conduct unauthorized swap operations and withdraw users’ funds from their deposits.
Experts from blockchain security company Cyvers noted that the attack was carried out very quickly: the malicious contract was deployed and activated in just a minute, after which the theft of funds occurred instantly. This indicates a high level of preparation of the hacker and the use of automated tools for exploitation.
Size and composition of stolen assets
The total amount of damage was approximately:
- $2.3 million in USDC (a stablecoin pegged to the US dollar),
- $227k in USDS ,
- During the exchange, the attacker received 199 Wrapped Ethereum (WETH) and about 965.8 million AERO tokens .
These assets were withdrawn from 12 compromised protocol user addresses.
An attempt to hide the traces and further actions of the attacker
Following the theft, all of the stolen tokens were converted to Wrapped Ethereum (WETH) on the Base network and then transferred to the Ethereum mainnet. Analysts have noted that the funds are now in new staging addresses on Ethereum, indicating either an attempt to obscure the trail through fragmentation and mixing, or preparation for further operations on decentralized exchanges.
This creates significant difficulties for law enforcement and project teams in tracking and recovering stolen funds.
Arcadia Finance Team Reaction and Security Recommendations
The Arcadia Finance team officially confirmed the hack and immediately published recommendations for users:
- Remove all asset manager permissions, especially those related to the Rebalancer smart contract, to prevent further unauthorized transactions.
- Inform users of the current situation and promise further updates on the investigation.
In addition, security experts advise:
- Add the attacker addresses to blacklists in both Base and Ethereum.
- Notify major crypto exchanges and bridges to block suspicious transactions from these addresses.
- Provide full details of the breach to law enforcement and regulatory authorities to assist in their investigation.
The significance of the incident for the DeFi industry
This case illustrates the key security issues facing DeFi projects:
- Vulnerabilities in smart contracts, even in important components such as the Rebalancer, can lead to significant financial losses.
- The high speed and automation of cyberattacks make it difficult for project teams to protect and respond.
- Attackers’ attempts to use stealth techniques, such as mixing and moving funds between networks, make it difficult to recover stolen assets.
Results
- In June 2025, the DeFi platform Arcadia Finance fell victim to an attack through a vulnerability in the Rebalancer contract.
- The hacker withdrew crypto assets worth approximately $2.5 million , including USDC, USDS, Wrapped Ethereum, and AERO tokens.
- The stolen funds were quickly converted and transferred to the Ethereum network in order to cover their tracks.
- The Arcadia Finance team quickly confirmed the hack, advised users to revoke permissions, and is investigating and working to prevent further attacks.
- Experts are calling for stronger security measures and cross-platform collaboration to combat cybercrime in DeFi.
This incident highlights the importance of ongoing smart contract auditing, improved security monitoring, and rapid threat response in the rapidly evolving field of decentralized finance.
Overview of the increasing number of hacks of DeFi projects and the practice of returning stolen funds by hackers: analysis and real cases
In 2025, the decentralized finance (DeFi) sector remains vulnerable to cyberattacks despite efforts to strengthen security. The frequency and scale of hacks show that hackers are constantly improving their methods of bypassing security, and projects are forced to respond with increasing speed and sophistication. At the same time, there is a growing practice of negotiating with exploiters in order to partially or fully return stolen funds, which indicates a new trend of cooperation within the crypto community.
DeFi Hacks: Scope and Key Incidents of 2025
According to leading analysts and publications, including RBC and SecurityLab, the industry’s losses from hacks have already exceeded $3 billion in the first half of 2025. A characteristic feature has become large exploits both on centralized exchanges and in DeFi protocols, among which the following stand out: 2 7
- The theft of around $1.5 billion from Bybit , a centralized exchange hacked by North Korean hacker group Lazarus Group , is a serious issue for the entire industry, demonstrating the dangers of multi-signature wallet hacks and social engineering. 1 2
- The biggest hacks in DeFi — protocols including Cetus and Arcadia Finance have been attacked, stealing hundreds of millions and millions of dollars, respectively. Successful exploits often involve vulnerabilities in smart contracts, oracles, and the use of flash loans to manipulate prices. 6
- Refund Stories – In a number of cases, such as PolyNetwork, SushiSwap and Vee Finance, hackers have returned stolen tokens after hacks, which has become a surprising but important trend [source RBC]. This happened thanks to open negotiations, rewards and amnesty offers from projects interested in minimizing damage and maintaining reputation.
Mechanisms and motivations for the return of stolen goods
Recoveries from hacks have always been rare in DeFi due to anonymity and decentralization, but this is changing from 2024-2025 due to several factors:
- The practice of “white hat” or ethical hackers who seek out vulnerabilities and sometimes pay back the funds in exchange for a reward or recognition.
- Negotiations with “gray” and “black” hackers , in which project teams offer to postpone negative legal consequences and pay part of the stolen money in the form of a “bug bounty” – a reward program.
- Openness and cooperation of communities , increased transparency of incidents and public pressure through social networks and the media, which reduces the opportunities for covert withdrawal of stolen goods.
- Development of a legal framework and regulatory measures that influence hackers, making returns more attractive and reducing the risk of sanctions.
The Importance of PolyNetwork, SushiSwap, and Vee Finance Cases
- PolyNetwork is one of the most high-profile examples: in 2021, after an attack that stole over $600 million, almost all of the funds were returned by the exploiter, who stated his intention to “show the vulnerability” [RBC]. This has had a positive impact on the perception of security and dialogue between hackers and projects.
- SushiSwap is a decentralized exchange that suffered a smart contract vulnerability in 2025, leading to funds being withdrawn, but some were later returned through negotiations.
- Vee Finance is a platform that also announced a comeback after the incident, showing an example of prompt collaboration and use of rewards programs.
General trends and lessons for the industry
- Increase in hacks and sophistication of attack methods. Flash loans, oracle manipulation, smart contract vulnerabilities and social engineering attacks remain the main risks.
- Successful practices of cooperation with hackers. Offers of rewards, amnesties and public negotiations often lead to partial return of stolen funds, which helps to reduce losses of investors and maintain confidence in projects.
- Increased focus on security and auditing. Project teams are increasingly investing in auditing, bug bounty programs, and real-time security monitoring.
- Community participation and media influence: Public discussions and coverage of incidents promote accountability and reduce the shadow activity of hackers.
Increased DeFi Hacks with Hackers Reclaiming Funds Again
Increased DeFi hacks with repeated refunds by hackers are the new reality of the crypto industry in 2025. Despite the remaining serious risks, the practice of cooperation between projects and exploiters helps to reduce financial losses and improve the overall understanding of security.
While threats remain high and require constant attention and innovation in security, successful fund recovery cases set a positive precedent for the industry, showing that even in a decentralized environment, constructive dialogue and partial restoration of justice are possible.
Sources:
- RBC: Analytics on DeFi and cases of returning stolen funds
- SecurityLab: Overview of hacking methods and practice of cooperation with hackers
- Hacken and Halborn: Safety and Loss Volume Reports 2025
- Crypto.ru — analysis of the largest hacks of DeFi and CeFi platforms in 2025
- Official announcements from PolyNetwork, SushiSwap, Vee Finance projects on incidents and refunds
WOO X and CoinDCX Hack Refund Programs: A New Approach to Security in the Crypto Industry in 2025
In 2025, the cryptocurrency industry faces serious challenges related to cyberattacks on platforms and platforms. However, the growing practice of reward programs initiated by leading exchanges and DeFi projects demonstrates a new level of cooperation with ethical hackers (“white hats”) and even exploiters who return stolen assets. Examples of such initiatives were the programs of crypto exchanges WOO X and CoinDCX, which offered significant compensation in exchange for the return of stolen funds.
The WOO X Case: Hack, Damage Control, and Promise of Compensation
In July 2025, cryptocurrency trading platform WOO X reported a cyberattack that resulted in the theft of approximately $14 million from nine user accounts. The important point was that the exchange’s funds remained intact, and damage was caused only to user accounts.
The WOO X team responded quickly, pausing withdrawals and blocking some of the suspicious transactions. External cybersecurity experts Seal911 and Hypernative were brought in to investigate the incident, track down and potentially freeze the stolen assets.
The exchange assured users that all unauthorized write-offs will be fully compensated . In addition, the WOO X team has established active interaction with the victims and other crypto platforms to minimize the consequences of the attack and strengthen protection in the future. 1 2 5
CoinDCX Initiative: Reward Program to Return Stolen Funds
Indian cryptocurrency exchange CoinDCX, which lost around $44 million in a hack of its internal liquidity account in July 2025 , has also launched a dedicated program to incentivize refunds.
According to CEO Sumit Gupta, the company is offering up to 25% of the recovered funds as a reward to “white hat hackers.” The funds are held in corporate reserves, and no user funds are affected.
The goal of the initiative is not only to return the stolen assets, but also to identify and catch the perpetrators in order to prevent similar incidents in the future of CoinDCX itself and in the crypto industry as a whole.
CoinDCX emphasizes that this new level of collaboration with the community and ethical hackers is an important link in the fight against cybercrime on centralized platforms, which remain a prime target for sophisticated cyberattacks. 3 4 6
The Big Picture and Importance of Rewards Programs
- White hat rewards programs are becoming a common tool for loss prevention and accelerated recovery of stolen funds in the crypto industry in 2025.
- Platforms like WOO X and CoinDCX have shown a willingness to work with ethical hackers and even some exploiters, offering compensation in exchange for cooperation.
- This approach reduces financial damage to users and preserves the platforms’ reputations by encouraging safety and open dialogue.
- Bounty programs often involve outside cybersecurity experts, careful monitoring, and transparent communication to the community.
Context and Prospects
In 2025, crypto exchanges and DeFi platforms lost over $3.1 billion due to cyberattacks, making security critical. As technology advances, so do the risks, so modern methods for combating hacks include:
- Active identification of vulnerabilities through bug bounty programs.
- Incentivizing the return of stolen assets through material incentives.
- Increased coordination between platforms and security services.
- Creation of a legal framework and cooperation with law enforcement agencies.
The WOO X and CoinDCX initiatives demonstrate that a new practice is emerging in the industry – instead of harsh confrontation and hopeless search for stolen funds, flexible schemes are emerging that allow to minimize damage and strengthen user trust.
Sources of information:
- WOO X Incident and Compensation Reports and Statements 1 2 5
- CoinDCX CEO Announcements & Interviews, Rewards Program Description 3 4 6
- Cyberattack analytics and security monitoring of the crypto industry in 2025, data from Cyvers, Seal911, Hacken
- https://ru.investing.com/news/cryptocurrency-news/article-2843698
- https://www.block-chain24.com/news/novosti-bezopasnosti/woo-x-vremenno-ostanovila-vyvod-sredstv-posle-vzloma-na-14-mln
- https://www.block-chain24.com/news/novosti-bezopasnosti/coindxc-obyavlyaet-programmu-voznagrazhdeniy-za-vozvrat-sredstv-posle
- https://happycoin.club/coindcx-exchange-announced-reward-after-hack-at-44-mln/
- https://tradersunion.com/ru/news/cryptocurrency-news/show/387537-woo-x-hack-withdrawals-suspended-users-promised-full-refund/
- https://ru.investing.com/news/cryptocurrency-news/article-2837071
- https://mechfac.ru/vzlom-coindcx-na-44-mln-pripisali-hakeram-iz-lazarus-group.html
- https://m-stroganov.ru/postradavshaia-ot-vzloma-coindcx-obiavila-nagrady-za-poimky-hakerov.html
- https://forklog.com/exclusive/obzor-woo-x-birzha-s-nulevymi-komissiyami-i-nagradami-za-sdelki
- https://crypto.ru/v-halborn-otsenili-krupnejshie-vzlomy/
- https://www.block-chain24.com/news/novosti-bezopasnosti/hacken-ubytki-ot-vzlomov-kriptovalyutnyh-sistem-prevysili-31-mlrd-v-2025
- https://amp.rbc.ru/crypto/news/687f98bf9a79474e75f84d84
- https://ptsecurity.com/ru-ru/research/analytics/kiberugrozy-finansovoi-otrasli—prognoz-na-2025-2026-g/
- https://crypto.ru/issledovateli-halborn-poteri-defi-sektora-za-10-let/
- https://bithide.io/blog/ru/defi-hacks-cases-and-methods/
- https://forklog.com/news/hudshee-polugodie-industriya-poteryala-ot-skama-i-hakerov-3-1-mlrd
- https://plusworld.ru/journal/2025/plus-3-323-2025/kiberugrozy-kriptobiznesa-trendy-2024-2025/
- https://www.rbc.ru/crypto/news/683980399a794703c8ed8332
- https://ru.beincrypto.com/anatomiyu-kripto-moshennichestva/
Sources:
- Cyvers Security Analytics and Blockchain Cybersecurity Reports
- Arcadia Finance team social media posts (X, former Twitter)
- Incident review on ru.investing.com and block-chain24.com (June-July 2025)
- https://ru.investing.com/news/cryptocurrency-news/article-2828345
- https://www.block-chain24.com/news/novosti-bezopasnosti/eksploit-arcadia-finance-25-mln-pohishcheno-i-perevedeno-v-weth
- https://www.bitget.com/ru/news/detail/12560604866013
- https://coinspot.io/world/woo-x-halts-withdrawals-after-14m-security-breach/
- https://ru.tradingview.com/ideas/page-72/?sort=recent_extended&video=no
- https://ru.tradingview.com/ideas/%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8/page-3/
- https://daytimenews.ru/fin/defi-platforma-arcadia-finance-podverglas-vzlomu-na-2-5-mln-531288.html
- https://dapp.expert/ru/news/vzlom-arcadia-finance-kraza-25-millionov-kriptovaliuty-1752598581-638399
- https://dapp.expert/ru/news/arcadia-finance-novyi-vzlom-podnimaet-voprosy-bezopasnosti-v-defi-1752578962-205890
- https://www.block-chain24.com/news/novosti-bezopasnosti/woo-x-vremenno-ostanovila-vyvod-sredstv-posle-vzloma-na-14-mln
Sources of information:
- Hacken Web3 Security Report, First Half 2025 1 2 3 4 5
- CoinDesk, hack and multi-signature analytics 2025 4
- Analysis of the Biggest Hacks Including Bybit and Cetus 1 3
- https://www.block-chain24.com/news/novosti-bezopasnosti/hacken-ubytki-ot-vzlomov-kriptovalyutnyh-sistem-prevysili-31-mlrd-v-2025
- https://crypto.ru/otchet-hacken-2025/
- https://forklog.com/news/hudshee-polugodie-industriya-poteryala-ot-skama-i-hakerov-3-1-mlrd
- https://www.coindesk.com/ru/business/2025/07/24/multisig-failures-dominate-as-usd2b-is-lost-in-web3-hacks-in-the-first-half
- https://cryptonews.net/ru/news/security/30763684/
- https://www.binance.com/ru/square/post/22383244871049
- https://yellow.com/ru/news/%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D1%85%D0%B0%D0%BA%D0%B8-%D0%BF%D1%80%D0%B5%D0%B2%D1%8B%D1%88%D0%B0%D1%8E%D1%82-31-%D0%BC%D0%BB%D1%80%D0%B4-%D0%B2-2025-%D0%B3%D0%BE%D0%B4%D1%83-%D0%BD%D0%B0-%D1%84%D0%BE%D0%BD%D0% B5-%D1%80%D0%BE%D1%81%D1%82%D0%B0-%D1%83%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D0%B5%D0%B9-%D0%BA%D0%BE%D0%BD%D 1%82%D1%80%D0%BE%D0%BB%D1%8F-%D0%B4%D0%BE%D1%81%D1%82%D1%83%D 0%BF%D0%B0-%D0%B8-%D1%83%D0%B3%D1%80%D0%BE%D0%B7-%D0%B8%D0%B8
- https://financefeeds.com/ru/%D0%9F%D0%BE%D1%82%D0%B5%D1%80%D0%B8-%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82-%D0%B4%D0%BE%D1%81%D1%82%D0%B8%D0%B3%D0%BB%D0%B8-3-%D0%BC%D0%BB%D1%80%D0%B4-%D0%B2-%D0%BF%D0%B5%D1%8 0%D0%B2%D0%BE%D0%B9-%D0%BF%D0%BE%D0%BB%D0%BE%D0%B2%D0%B8%D0%BD%D0%B5-1-%D0%B3%D0%BE%D0%B4%D0%B0—%D0%BF%D1%80%D0%B5%D 0%B2%D1%8B%D1%81%D0%B8%D0%B2-%D0%B2%D0%B5%D1%81%D1%8C-%D0%BF%D1%80%D0%BE%D1%88%D0%BB%D1%8B%D0%B9-%D0%B3%D0%BE%D0%B4/
- https://crypto.ru/uyazvimosti-multi-podpisnyh-koshelkov/
- https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%9C%D0%BE%D1%88%D0%B5%D0%BD%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D1%82%D0%B2%D0%BE_%D1%81_%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%D0%BE%D0%B9
- https://www.block-chain24.com/articles/kak-ukrali-220-millionov-dollarov-za-neskolko-minut-vzlom-cetus-dex-na-sui
- https://news.bitcoin.com/ru/cetus-protocol-perezapuskaetsya-posle-khakerskoy-attaki-na-220-millionov-vosstanavlivaet-likvidnost/
- https://www.binance.com/ru/square/post/24631906985809
- https://www.coinex.com/ru/academy/detail/2687-sui-ecosystem-hacked-how-the-260m-cetus-hack-exposes-risks-and-boosts-ethereums-postpectra-appeal
- https://www.bitrue.com/ru/blog/cetus-protocol-hack-2025-lessons
- https://cryptorank.io/news/feed/99e7e-%D1%87%D1%82%D0%BE-%D0%BE%D0%B7%D0%BD%D0%B0%D1%87%D0%B0%D0%B5%D1%82-%D0%B2%D0%B7%D0%BB%D0%BE%D0%BC-cetus-%D0%B4%D0%BB%D1%8F-%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D0%B8-def
- https://ru.tradingview.com/news/forklog:d4ecc0fab67b8:0/
- https://www.block-chain24.com/news/novosti-defi/cetus-perezapuskaetsya-posle-vzloma-na-200-mln
- https://www.binance.com/ru/square/post/24602312056257
- https://www.bitget.com/ru/news/detail/12560604772568
- https://bithide.io/blog/ru/defi-hacks-cases-and-methods/
- https://doktormunhen.ru/vzlomy-defi-protokolov-v-2025-godu-samye-gromkie-kejsy-i-vyvody-dlya-investorov/
- https://forklog.com/news/hakery-zahvatili-100-zabroshennyh-defi-protokolov
- https://amp.rbc.ru/crypto/news/687f98bf9a79474e75f84d84
- https://ru.beincrypto.com/defi-attacks/
- https://bithide.io/blog/en/crypto-aml-risks-and-solutions-2025/
- https://tangem.com/ru/blog/post/distributed-and-defenceless-how-defi-hacks-happen/
- https://cyberacademy.dev/ru/blog/2-tehnicheskie-i-ekonomicheskie-ataki-defi
- https://vc.ru/crypto/1922241-defi-farming-2025-kak-zarabotat-na-kriptovaljutah
- https://bingx.com/ru-ru/learn/inside-the-260m-cetus-protocol-hack-and-the-lessons-for-defi-security
- https://bithide.io/blog/ru/defi-hacks-cases-and-methods/
- https://ru.investing.com/news/cryptocurrency-news/article-2773773
- https://www.block-chain24.com/news/novosti-bezopasnosti/hacken-ubytki-ot-vzlomov-kriptovalyutnyh-sistem-prevysili-31-mlrd-v-2025
- https://happycoin.club/defi-platforma-arcadia-finance-podverglas-vzlomu-na-25-mln/
- https://www.rbc.ru/crypto/news/6149dd379a7947052c580779
- https://www.securitylab.ru/news/561199.php
- https://www.block-chain24.com/news/novosti-bezopasnosti/woo-x-vremenno-ostanovila-vyvod-sredstv-posle-vzloma-na-14-mln
- https://myseldon.com/ru/news/index/332444438?requestId=57f6a2e5-4f2d-44e8-b738-0d98754b792d
- https://amp.rbc.ru/crypto/news/687f98bf9a79474e75f84d84
- https://news.bitcoin.com/ru/platforma-defi-abracadabra-podverglas-vzlomu-predlagaet-voznagrazhdenie-za-vozvrat/
Sources:
- Loopscale Updates on X (Twitter)
- Term Finance Reports
- PeckShield Cybersecurity Incident Analytics 2025