TheCentWise

Hacker Drains $5.9M From Ethereum Liquidity TrustedVolumes

A security flaw allowed a hacker to drain approximately $5.9 million from TrustedVolumes, a DeFi liquidity provider on Ethereum. Authorities and researchers are investigating how the breach occurred and what it means for the wider market.

Hacker Drains $5.9M From Ethereum Liquidity TrustedVolumes

Topline: Major DeFi Breach Hits Ethereum Liquidity Provider TrustedVolumes

The DeFi ecosystem faces another setback after a hacker drained about $5.9 million from TrustedVolumes, a liquidity provider operating on the Ethereum blockchain. The incident, disclosed Thursday by the platform and security researchers, underscores ongoing vulnerabilities in permissioned systems used by some DeFi projects.

The breach is already drawing attention from security firms and investors as analysts assess the broader risk landscape for decentralized finance. In a market where hacks have become a persistent risk, this event adds momentum to discussions about safer design patterns and faster incident response in cross-chain liquidity pools.

What Happened

Security researchers traced the theft to a flaw in TrustedVolumes’ custom order-settlement flow, described in technical briefs as a Request for Quote (RFQ) proxy. The attacker managed to identify and exploit a weakness that allowed them to pull funds from the platform’s settlement mechanism while presenting themselves as an authorized signer for trades they controlled.

Blockchain security firm Blockaid flagged the exploit in real time, helping to alert the ecosystem to the breach as it unfolded. A GoPlus Security breakdown confirms the attacker’s path, while the Defi Nerd technical analysis details how the attacker leveraged a mismatch between authorization and token movement to siphon assets.

Compound Interest CalculatorSee how your money can grow over time.
Try It Free

Stolen Assets: The Numbers Behind the Heist

  • 1,291 WETH
  • Approximately 16.9 WBTC
  • About 206,000 USDT
  • Just under 1.27 million USDC

In a pattern seen in other DeFi breaches, the attacker moved funds from the resolver contract after gaining proxy permissions, then converted the stolen WETH back into ETH before consolidating the haul into a private wallet. The attack appears to have involved multiple drain transactions aimed at the same proxy mechanism, each designed to extract assets step by step before final consolidation.

How the Attack Unfolded

The core vulnerability lay in the RFQ proxy’s design, which connected the process of authorization with asset movement in a way that created a blind spot. The attacker registered themselves as an authorized order signer using a publicly accessible function, effectively allowing them to sign trades they controlled while the settlement flow pulled funds from a separate address.

According to Defi Nerd’s technical report, the attacker used four drain transactions against the TrustedVolumes resolver contract. Each drain moved tokens from the resolver to the attacker’s environment, while the proxy sent back only a single unit of USDC as a partial return, enabling a stepwise exfiltration. The attacker then converted the WETH to ETH and routed the funds to a personal wallet, leaving little immediate recourse for recovery.

Official Reactions and Investigations

TrustedVolumes acknowledged the breach and issued a call for collaboration with the security community. The firm disclosed three wallet addresses that now hold portions of the stolen funds and invited the hacker to initiate contact about a potential bug bounty and a mutual resolution. In its public statement, TrustedVolumes emphasized ongoing cooperation with investigators as they work to trace the transfers and identify the entry point.

Official Reactions and Investigations
Official Reactions and Investigations

Blockaid, the security firm that identified the attack as it happened, said in a real-time alert that the breach was detected during the initial exploitation window. A spokesperson for Blockaid noted that the incident highlights the importance of rapid monitoring and response in DeFi environments that rely on complex, permissioned components.

GoPlus Security offered a breakdown of the technical sequence, stressing that the vulnerability was rooted in authorization checks that did not align with the actual asset custody at the time of transfer. Defi Nerd’s analysis echoed that assessment, detailing how a single misalignment in the sign-off and fund movement created an opportunity for the attacker to drain assets gradually.

What This Means for Users and the Market

The TrustedVolumes breach adds to a growing list of DeFi incidents that regulators, auditors, and developers say are a reminder of how complex cross-contract operations can become. For users, the incident underscores the importance of understanding where liquidity lives, how access is controlled, and what safeguards exist to protect funds during upgrade cycles and ongoing maintenance.

Industry observers say this event could accelerate a broader push for stronger controls around RFQ proxies and signer management, including more rigorous authorization checks and a clear separation between who can sign trades and who can move assets. In the near term, market participants are watching for liquidity shifts within Ethereum-based pools and whether other platforms disclose similar vulnerabilities that might prompt portfolio reallocations or risk reassessments.

Market and Security Context

Although the broader crypto markets have shown resilience in recent weeks, DeFi security remains a persistent concern as projects push the envelope with advanced liquidity solutions. This incident comes amid renewed calls for standardized security tooling, bug bounties, and formal incident-response playbooks that can be deployed quickly when a breach is detected.

Experts caution that even sophisticated DeFi projects are not immune to human error or inherent design weaknesses in newer financial primitives. The focus for 2026 will likely be on improving governance models, enhancing contract audits, and building safer upgrade paths so that honest users are not caught in the crossfire of a hostile breach.

Next Steps for TrustedVolumes and the Industry

  • Public wallet disclosures and ongoing traceability efforts to recover or freeze assets where possible.
  • Comprehensive security reviews of the RFQ proxy architecture and signer authorization flows.
  • Increased bug-bounty activity and more transparent incident postmortems to guide community learning.
  • Industry-wide discussions about best practices for mix-and-match custody in DeFi liquidity providers.

For traders and liquidity providers, this event is a reminder to factor in smart contract risk alongside market risk. The DeFi space has demonstrated remarkable innovation, but the price of that innovation is ongoing vigilance and robust security engineering.

Bottom Line: The Hacker Drains $5.9M From the DeFi Frontier Remains a Cautionary Tale

As TrustedVolumes works with investigators and security partners to trace the breach, the broader DeFi community must confront a fundamental truth: permissioned finance on the blockchain can be both powerful and vulnerable. The hacker drains $5.9m from a critical liquidity node, and the lesson is clear — multi-layered security, clear signer governance, and rapid incident response are no longer optional in the race to build trust in decentralized finance.

Finance Expert

Financial writer and expert with years of experience helping people make smarter money decisions. Passionate about making personal finance accessible to everyone.

Share
React:
Was this article helpful?

Test Your Financial Knowledge

Answer 5 quick questions about personal finance.

Get Smart Money Tips

Weekly financial insights delivered to your inbox. Free forever.

Discussion

Be respectful. No spam or self-promotion.
Share Your Financial Journey
Inspire others with your story. How did you improve your finances?

Related Articles

Subscribe Free