Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Skills Shortages Trump Headcount as Critical Cyber Challenge

December 6, 2025

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

December 6, 2025

Louvre to Bolster Its Security, Issues €57m Public Tender

December 6, 2025
Facebook X (Twitter) Instagram
Saturday, December 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Yearn Finance yETH Pool Hit by $9M Exploit
News

Yearn Finance yETH Pool Hit by $9M Exploit

Team-CWDBy Team-CWDDecember 3, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A significant vulnerability in Yearn Finance’s yETH pool on Ethereum has enabled an attacker to drain about $9m in assets.

According to new findings released by Check Point Research (CPR), the flaw in the pool’s internal accounting allowed the perpetrator to mint 235 septillion yETH tokens after depositing only 16 wei, worth roughly $0.000000000000000045 at the time of the attack.

A Complex Exploit

The cybersecurity researchers said a critical oversight in the pool’s cached storage system created the opening.

The yETH pool uses stored virtual balances, known as packed_vbs[], to reduce gas costs during operation.

When all liquidity was removed from the pool, the main supply counter reset to zero, but the cached values did not. This desynchronization led the protocol to believe the pool was empty even though leftover phantom balances remained in storage.

The attacker took advantage of this by repeatedly cycling deposit and withdrawal transactions through flash loans. Each pass left behind small residual virtual balances that accumulated over time.

After completely emptying the pool, the attacker deposited tiny amounts across eight supported tokens. The protocol interpreted the action as a first-time deposit and minted tokens based on the inflated cached values instead of the negligible input.

Read more on Ethereum-related attacks: DeFi Protocol Balancer Loses Over $120m in Cyber Heist

How the Breach Unfolded

The intrusion progressed in six distinct phases:

  • Borrowing assets through flash loans

  • Polluting stored virtual balances with repeated deposit-withdrawal cycles

  • Burning all LP tokens to drop the supply to zero

  • Depositing 16 wei across the pool to trigger the flawed “first deposit” logic

  • Swapping the newly minted yETH for underlying assets

  • Converting proceeds to ETH, repaying loans and laundering funds

The attacker ultimately exchanged the stolen LSD assets, including wstETH, rETH and cbETH, into ETH through various DEXs before routing a portion through Tornado Cash.

CPR noted that the incident underscores the risk created by complex AMM mechanics and gas-saving optimizations.

“For defenders, this exploit reinforces that correctness in complex systems requires explicit handling of ALL state transitions, not just the happy path,” they said.

The company added that the breach could have been prevented with transaction simulation, sequence-level monitoring and automated blocking of abnormal minting behavior.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleChinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs
Next Article Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More
Team-CWD
  • Website

Related Posts

News

Skills Shortages Trump Headcount as Critical Cyber Challenge

December 6, 2025
News

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

December 6, 2025
News

React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability

December 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

How chatbots can help spread scams

October 14, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.