BNB Chain lending platform Venus Protocol resumed full operations after an exploit on Tuesday forced an emergency vote to suspend withdrawals and liquidations. The platform confirmed later that it had restored services and recovered the $27 million worth of digital assets compromised in the incident. The disruption began when Venus identified suspicious activity linked to […]BNB Chain lending platform Venus Protocol resumed full operations after an exploit on Tuesday forced an emergency vote to suspend withdrawals and liquidations. The platform confirmed later that it had restored services and recovered the $27 million worth of digital assets compromised in the incident. The disruption began when Venus identified suspicious activity linked to […]

Venus Protocol returns to full operation after resolving $27M exploit

2025/09/03 19:56

BNB Chain lending platform Venus Protocol resumed full operations after an exploit on Tuesday forced an emergency vote to suspend withdrawals and liquidations. The platform confirmed later that it had restored services and recovered the $27 million worth of digital assets compromised in the incident.

The disruption began when Venus identified suspicious activity linked to a phishing scam, which was also flagged by several cybersecurity firms. As reported by Cryptopolitan, blockchain analysts had mentioned irregular transactions in the platform’s Core Pool Comptroller contract, which routes user assets vUSDC and vETH.

Venus called for an emergency vote to pause services in order to limit losses and allow security teams to assess whether the exploit compromised Venus’ infrastructure. 

Although users were unable to withdraw or liquidate positions during the hiatus, the protocol partially restored some functionality later the same day for them to repay debt and supply funds, actions that helped them protect their positions until normal operations could resume.

Venus Protocol’s proposed plan for restoration approved

Venus Protocol proposed a plan to its community to determine the immediate steps for handling the crisis. The four-stage plan was outlined as follows: partial restoration within five hours, recovery of stolen funds within seven hours, a full security review within 24 hours, and the eventual resumption of all services once checks were completed.

Voting ended at around 5 PM UTC, with the community voting “100% to proceed,” the protocol announced. “We are so thankful for your support, and will proceed with the execution,” the team wrote on X.

By 9:58 PM UTC, Venus confirmed that the plan had been completed successfully. 

“Venus Protocol has been fully restored, withdrawals and liquidations resumed. The lost funds have been recovered under Venus’ protection,” the platform said.

The exploit stemmed from a phishing incident that tricked a Venus user into approving a malicious transaction, which granted an attacker access to the user’s $27 million worth of digital assets. 

Phishing scams imitate trusted platforms with near-identical websites made to lure users into entering credentials or approving harmful transactions.

According to Cyvers, a blockchain security firm, this particular attack was launched using a domain closely resembling a legitimate site. The small differences are, more often than not unnoticed when victims rush through approvals for token launches or airdrops. Once the user approved the transaction, their wallet was drained.

Venus explained that its quick response prevented the attacker from moving the stolen assets out of their wallet. 

“Fortunately, the suspicious transaction was identified almost immediately, and Venus Protocol was paused. Because of this quick response, the stolen funds remain locked in the attacker’s wallet and this is why Venus is currently paused,” the platform wrote in its emergency update.

Venus to publish full post-mortem after analysis

Venus Protocol said it would publish a full post-mortem of the incident once investigations are complete. The platform also thanked its users for their trust and patience during the suspension of services. 

“Hackers have no place on Venus. Thank you for your patience, understanding, and continued trust as we work tirelessly to protect our users, safeguard our community, and uphold the integrity of the Venus Protocol. The community is the foundation of Venus, and we will always act in your best interest,” the team stated.

Phishing attacks are still atop of the most common threats in decentralized finance, accounting for almost 20% of the $2.17 billion stolen from crypto services in 2025, according to Chainalysis’ mid-year report.

If you're reading this, you’re already ahead. Stay there with our newsletter.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Best Crypto to Buy as Saylor & Crypto Execs Meet in US Treasury Council

Best Crypto to Buy as Saylor & Crypto Execs Meet in US Treasury Council

The post Best Crypto to Buy as Saylor & Crypto Execs Meet in US Treasury Council appeared on BitcoinEthereumNews.com. Michael Saylor and a group of crypto executives met in Washington, D.C. yesterday to push for the Strategic Bitcoin Reserve Bill (the BITCOIN Act), which would see the U.S. acquire up to 1M $BTC over five years. With Bitcoin being positioned yet again as a cornerstone of national monetary policy, many investors are turning their eyes to projects that lean into this narrative – altcoins, meme coins, and presales that could ride on the same wave. Read on for three of the best crypto projects that seem especially well‐suited to benefit from this macro shift:  Bitcoin Hyper, Best Wallet Token, and Remittix. These projects stand out for having a strong use case and high adoption potential, especially given the push for a U.S. Bitcoin reserve.   Why the Bitcoin Reserve Bill Matters for Crypto Markets The strategic Bitcoin Reserve Bill could mark a turning point for the U.S. approach to digital assets. The proposal would see America build a long-term Bitcoin reserve by acquiring up to one million $BTC over five years. To make this happen, lawmakers are exploring creative funding methods such as revaluing old gold certificates. The plan also leans on confiscated Bitcoin already held by the government, worth an estimated $15–20B. This isn’t just a headline for policy wonks. It signals that Bitcoin is moving from the margins into the core of financial strategy. Industry figures like Michael Saylor, Senator Cynthia Lummis, and Marathon Digital’s Fred Thiel are all backing the bill. They see Bitcoin not just as an investment, but as a hedge against systemic risks. For the wider crypto market, this opens the door for projects tied to Bitcoin and the infrastructure that supports it. 1. Bitcoin Hyper ($HYPER) – Turning Bitcoin Into More Than Just Digital Gold The U.S. may soon treat Bitcoin as…
Share
BitcoinEthereumNews2025/09/18 00:27
The Future of Secure Messaging: Why Decentralization Matters

The Future of Secure Messaging: Why Decentralization Matters

The post The Future of Secure Messaging: Why Decentralization Matters appeared on BitcoinEthereumNews.com. From encrypted chats to decentralized messaging Encrypted messengers are having a second wave. Apps like WhatsApp, iMessage and Signal made end-to-end encryption (E2EE) a default expectation. But most still hinge on phone numbers, centralized servers and a lot of metadata, such as who you talk to, when, from which IP and on which device. That is what Vitalik Buterin is aiming at in his recent X post and donation. He argues the next steps for secure messaging are permissionless account creation with no phone numbers or Know Your Customer (KYC) and much stronger metadata privacy. In that context he highlighted Session and SimpleX and sent 128 Ether (ETH) to each to keep pushing in that direction. Session is a good case study because it tries to combine E2E encryption with decentralization. There is no central message server, traffic is routed through onion paths, and user IDs are keys instead of phone numbers. Did you know? Forty-three percent of people who use public WiFi report experiencing a data breach, with man-in-the-middle attacks and packet sniffing against unencrypted traffic among the most common causes. How Session stores your messages Session is built around public key identities. When you sign up, the app generates a keypair locally and derives a Session ID from it with no phone number or email required. Messages travel through a network of service nodes using onion routing so that no single node can see both the sender and the recipient. (You can see your message’s node path in the settings.) For asynchronous delivery when you are offline, messages are stored in small groups of nodes called “swarms.” Each Session ID is mapped to a specific swarm, and your messages are stored there encrypted until your client fetches them. Historically, messages had a default time-to-live of about two weeks…
Share
BitcoinEthereumNews2025/12/08 14:40