USPD stablecoin protocol falls prey to an advanced CPIMP attack costing 1M. During deployment, Hacker took control and went underground, taking months before emptying the coffers. A critical exploit was confirmed by the USPD protocol. The attacker minted 98 million USPD tokens. About 232 stETH was liquidated out of liquidity pools. As per the USPD […] The post $1M Drained: Hacker’s “Ghost” Protocol Attack Exposed appeared first on Live Bitcoin News.USPD stablecoin protocol falls prey to an advanced CPIMP attack costing 1M. During deployment, Hacker took control and went underground, taking months before emptying the coffers. A critical exploit was confirmed by the USPD protocol. The attacker minted 98 million USPD tokens. About 232 stETH was liquidated out of liquidity pools. As per the USPD […] The post $1M Drained: Hacker’s “Ghost” Protocol Attack Exposed appeared first on Live Bitcoin News.

$1M Drained: Hacker’s “Ghost” Protocol Attack Exposed

2025/12/06 15:45

USPD stablecoin protocol falls prey to an advanced CPIMP attack costing 1M. During deployment, Hacker took control and went underground, taking months before emptying the coffers.

A critical exploit was confirmed by the USPD protocol. The attacker minted 98 million USPD tokens. About 232 stETH was liquidated out of liquidity pools.

As per the USPD on X, users need to stop purchasing the USPD. The group put out a security emergency warning 20 hours ago. Every approval is to be canceled immediately.

$1M Drained: Hacker's "Ghost" Protocol Attack Exposed

Source:   USPD on X

Hidden Attack Went Unnoticed Since September

It was not a code vulnerability breach. USPD was audited by Nethermind and Resonance regarding security. The logic of smart contracts was not compromised in the incident.

Rather, attackers used a CPIMP attack vector. This abbreviates Clandestine Proxy in the Middle of Proxy. The adventure took place on deployment on the 16th of September.

The Multicall3 transaction was used to initialize the proxy with the aid of the hacker. Before deployment scripts would complete, admin privileges were stolen. A shadow implementation sent calls to the valid audited code.

Etherscan Verification Tools Fooled Completely

The presence of the attacker was hidden by the manipulation of the event payload. Storage slot spoofing played around the Etherscan verification system. The site portrayed audited contracts as ongoing implementations.

This camouflage avoided every verification tool as tweeted by USPD_io on X. Security checks performed manually did not reveal any suspicious items. The hacker was lurking in full view for months.

Proxy upgrades were available yesterday by accessing a proxy via a hidden means. Unlicensed coins struck the world with tokens. Minting operations are followed by the draining of liquidity.

You might also like: Crypto Hack News: North Korean Hackers Exploit EtherHiding for Crypto Thefts

Law Enforcement and CEXs Now Tracking Stolen Funds

USPD representatives marked out the addresses of attackers with significant exchanges. Notifications were made on both centralized and decentralized platforms. Now, fund flow monitoring is operational on platforms.

There are two addresses under investigation. Infector wallet = 0x7C97313f349608f59A07C23b18Ce523A33219d83. Drainer address = 0x083379BDAC3E138cb0C7210e0282fbC466A3215A.

The team provided a whitehat resolution path. Attackers can refund 90 percent of stolen funds. When funds are recovered, law enforcement will be halted.

The USPD officials have assured a technical post-mortem shortly. Transparency in the community is still a priority. The recovery process goes on with major security organizations.

The protocol showed how new attack vectors are putting security to the test. This advanced attack was not thwarted by even the stringent audits. An industry-wide implication is now being looked at.

The post $1M Drained: Hacker’s “Ghost” Protocol Attack Exposed appeared first on Live Bitcoin News.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

The post Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum appeared on BitcoinEthereumNews.com. A crypto whale lost more than $6 million in staked Ethereum (stETH) and Aave-wrapped Bitcoin (aEthWBTC) after approving malicious signatures in a phishing scheme on Sept. 18, according to blockchain security firm Scam Sniffer. According to the firm, the attackers disguised their move as a routine wallet confirmation through “Permit” signatures, which tricked the victim into authorizing fund transfers without triggering obvious red flags. Yu Xian, founder of blockchain security company SlowMist, noted that the victim did not recognize the danger because the transaction required no gas fees. He wrote: “From the victim’s perspective, he just clicked a few times to confirm the wallet’s pop-up signature requests, didn’t spend a single penny of gas, and $6.28 million was gone.” How Permit exploits work Permit approvals were originally designed to simplify token transfers. Instead of submitting an on-chain approval and paying fees, a user can sign an off-chain message authorizing a spender. That efficiency, however, has created a new attack surface for malicious players. Once a user signs such a permit, attackers can combine two functions—Permit and TransferFrom—to drain assets directly. Because the authorization takes place off-chain, wallet dashboards show no unusual activity until the funds move. As a result, the assets are gone when the approval executes on-chain, and tokens are redirected to the attacker’s wallet. This loophole has made permit exploits increasingly attractive for malicious actors, who can siphon millions without needing complex hacks or high-cost gas wars. Phishing losses The latest theft highlights a wider trend of escalating phishing campaigns. Scam Sniffer reported that in August alone, attackers stole $12.17 million from more than 15,200 victims. That figure represented a 72% jump in losses compared with July. According to the firm, the most significant share of August’s damages came from three large accounts that accounted for nearly half…
Share
BitcoinEthereumNews2025/09/19 02:31