Skip to main content
Incrypthos
search
Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary
  • search
Incrypthos
Close Search
Security

Venus Protocol User Compromised by Phishing, $13.5m Funds Recovered

A sophisticated phishing attack targeting delegated account control highlights critical off-chain human element vulnerabilities, demanding enhanced user security protocols.
September 17, 20253 min
Signal∞Context∞Analysis∞Parameters∞Outlook∞Verdict∞

A central, white, segmented cylindrical mechanism forms the core, flanked by clusters of metallic blue, geometric blocks. Soft, white, cloud-like formations partially obscure these block clusters, creating a dynamic interplay
A detailed, sharp-focus perspective captures a complex mechanical device, featuring interconnected blue and dark grey modular components. Silver-colored wires are neatly routed between these panels, which are secured with visible metallic fasteners

Briefing

The Venus Protocol, a prominent DeFi lending platform, recently experienced a targeted phishing attack by the Lazarus Group that compromised a major user’s delegated account control. This incident, occurring on September 2, 2025, resulted in the theft of $13.5 million in various digital assets, underscoring the persistent threat of social engineering against high-value targets within the decentralized ecosystem. Crucially, the protocol’s emergency governance mechanism facilitated the unprecedented recovery of the entire $13.5 million within 12 hours, setting a new benchmark for rapid incident response in DeFi.

A white and metallic technological component, partially submerged in dark water, is visibly covered in a layer of frost and ice. From a central aperture within the device, a luminous blue liquid, interspersed with bubbles and crystalline fragments, erupts dynamically

Context

Prior to this event, the DeFi landscape has consistently faced a spectrum of vulnerabilities, often rooted in smart contract exploits or private key compromises. However, this incident pivots to an off-chain vector → the human element. The prevailing attack surface for such exploits frequently involves sophisticated social engineering tactics designed to circumvent robust on-chain security, leveraging a user’s trust or operational oversight rather than a direct protocol flaw.

Intricate electronic circuitry fills the frame, showcasing a dark blue printed circuit board densely packed with metallic and dark-hued components. Vibrant blue and grey data cables weave across the board, connecting various modules and metallic interface plates secured by bolts

Analysis

The incident’s technical mechanics involved a phishing scam that deployed a malicious Zoom client to compromise a major Venus Protocol user, Kuan Sun. This enabled the Lazarus Group to gain delegated control over the user’s account, allowing them to initiate unauthorized borrowing and asset redemption. The attack bypassed the protocol’s core smart contract logic and front-end interfaces, which remained uncompromised, by exploiting the permissions granted to a compromised user account. This chain of cause and effect highlights how an off-chain compromise of a user’s operational environment can directly impact on-chain asset security through delegated authority.

A detailed view presents a complex, cubic technological device featuring intricate blue and black components, surrounded by interconnected cables. The central element on top is a blue circular dial with a distinct logo, suggesting a high-level control or identification mechanism

Parameters

  • Protocol Targeted → Venus Protocol
  • Attack Vector → Phishing via Malicious Zoom Client leading to Delegated Account Control
  • Threat Actor → Lazarus Group
  • Initial Financial Impact → $13.5 Million
  • Funds Recovered → $13.5 Million
  • Recovery Method → Emergency Governance Vote and Forced Liquidation
  • Incident Date → September 2, 2025
  • Resolution Time → Less than 12 hours

The image features a sophisticated mechanical assembly composed of blue and silver gears, shafts, and rings, intricately intertwined. White granular particles are scattered around and within these components, while a transparent, syringe-like element extends from the left

Outlook

Immediate mitigation for users requires heightened vigilance against social engineering, rigorous software verification, and the adoption of hardware security modules for critical accounts. For protocols, this incident underscores the necessity of robust off-chain security awareness campaigns and the potential for integrating emergency governance mechanisms for rapid response. This event will likely catalyze new security best practices focusing on the perimeter defense of user operational environments and the development of more resilient delegated permission systems to contain the blast radius of such compromises.

A detailed 3D render showcases a complex mechanical apparatus composed of deep blue and metallic silver interlocking gears, blocks, and structural beams, suspended against a subtle grey gradient background. The entire intricate mechanism is partially surrounded by a dynamic, translucent light blue, fluid-like material

Verdict

This incident decisively reaffirms that the human element remains a critical attack surface, necessitating a holistic security posture that extends beyond smart contract audits to encompass comprehensive user and operational security.

Signal Acquired from → AInvest

Micro Crypto News Feeds

emergency governance

Definition ∞ Emergency governance refers to pre-defined protocols or mechanisms that allow for rapid decision-making and action in critical situations within a decentralized system.

social engineering

Definition ∞ Social engineering is a non-technical method of influencing people to give up confidential information or perform actions that benefit the attacker.

delegated control

Definition ∞ Delegated control refers to a system where the authority to manage or operate certain functions is transferred from one party to another.

protocol

Definition ∞ A protocol is a set of rules governing data exchange or communication between systems.

phishing

Definition ∞ Phishing, in the digital asset space, involves deceptive practices aimed at tricking individuals into divulging sensitive information, such as private keys or login credentials, typically through fraudulent communications.

lazarus group

Definition ∞ The Lazarus Group is a clandestine state-sponsored hacking collective, widely attributed to North Korea, known for its involvement in cybercrime, particularly cryptocurrency theft.

governance

Definition ∞ Governance refers to the systems, processes, and rules by which an entity or system is directed and controlled.

off-chain

Definition ∞ Off-chain refers to transactions or processes that occur outside of the main blockchain ledger.

smart contract

Definition ∞ A Smart Contract is a self-executing contract with the terms of the agreement directly written into code.

Tags:

Threat Mitigation Lazarus Group DeFi Security Account Compromise User Education Off-Chain Vulnerability

Discover More

  • A polished silver toroidal structure rests alongside a sculpted, translucent sapphire-blue form, revealing an intricate mechanical watch movement. This composition visually interprets a cryptographic primitive securing complex smart contract execution within a transparent decentralized ledger technology DLT environment. The visible gears and jewels signify precise protocol logic and the underlying tokenomics driving on-chain governance mechanisms, emphasizing verifiable operations. Decentralized Exchange GMX Drained Forty-Two Million via Smart Contract Re-Entrancy Flaw A critical re-entrancy vulnerability in the GMX codebase allowed a threat actor to repeatedly execute withdrawal logic, resulting in a $42 million asset drain .
  • A frosted translucent module features two metallic, brushed-finish circular buttons, suggesting a hardware wallet or secure authentication device. This interface facilitates transaction signing and private key management, crucial for cold storage of digital assets. The underlying abstract blue and silver forms evoke blockchain data streams and decentralized network infrastructure, highlighting the immutable ledger and cryptographic proof mechanisms. This device could enable multi-signature approvals for DeFi protocols or Web3 interactions, ensuring robust security for token transfers and smart contract execution. DeFi Protocol Drained $50 Million Exploiting Oracle Manipulation and Logic Flaw Inadequate input validation and reliance on a single oracle feed created a critical economic attack vector, allowing a $50M asset drain.
  • A sophisticated metallic device, likely a hardware wallet, showcases its internal complexity. On one side, a stack of physical coins is secured beneath a brilliant, multifaceted blue crystal, symbolizing tokenized assets and immutable digital value. The opposing side reveals an exposed, intricate mechanical watch movement, abstractly representing a proof-of-stake consensus mechanism or precise timestamping for transaction finality. Two subtle buttons on the device's edge suggest secure private key management and multi-signature capabilities. DeFi Protocol Typus Drained $3.4 Million via Oracle Price Manipulation A critical missing authorization check in the oracle contract's `update_v2()` function allowed unauthorized price manipulation, directly compromising the TLP and draining $3.44M in assets.
  • A dynamic visualization portrays a translucent, hourglass-shaped structure, vibrant blue with internal reflections, signifying the flow of liquidity pools. Two metallic, cylindrical rods intersect its narrowest point, forming an 'X,' representing cross-chain interoperability and blockchain bridges. The illuminated blue channels within suggest active smart contract execution facilitating atomic swaps across disparate distributed ledger technology networks. This abstract depiction illustrates the intricate DeFi mechanisms driving seamless, secure asset transfer and enhanced transaction throughput. Phishing Airdrop Tricked Users into Malicious Token Approval Theft Malicious airdrop claims weaponized token approvals, bypassing private key security to execute authorized asset draining across multiple chains.
  • A close-up view reveals a sophisticated hardware wallet, featuring a prominent faceted blue secure element, reminiscent of a digital asset or token. Brushed metallic surfaces encase transparent components, highlighting an internal blue glow, symbolizing cryptographic key protection. This device represents robust security for private key management, facilitating secure transaction signing and immutable ledger interactions within a decentralized finance ecosystem, safeguarding digital identity and Web3 assets. User Wallet Drained by Phishing Permit Signature Exploit Malicious permit signatures leveraging EIP-2612 enable off-chain asset drainage, posing a critical risk to DeFi users' staked and wrapped holdings.
  • A transparent, modular structure with intricate blue illuminated pathways forms a central 'X' shape, suggesting complex data flow. This visualizes decentralized ledger technology DLT architecture, highlighting the precision of smart contract execution and transaction validation. The interconnected network nodes facilitate seamless interoperability protocols, driven by underlying cryptographic operations. Dark background elements imply a robust digital infrastructure supporting these advanced mechanisms. New Delegation Flaw Exploited by Wallet Drainers to Steal User Assets EIP-7702-style delegation is weaponized to bypass traditional `approve` checks, granting malicious contracts persistent, batch execution authority over user assets.
  • A frosty blue tubular structure, resembling a cold storage conduit, features granular ice crystals. A perfectly spherical water droplet, a smaller one trailing, hovers nearby. This imagery evokes a blockchain node's cooling system, crucial for maintaining cryptographic integrity during transaction processing. The droplet symbolizes a token transfer or data packet moving through a liquidity pipeline, emphasizing air-gapped security for digital assets. It highlights the precision required for network stability and optimal throughput in a decentralized ledger environment. ALEX Protocol Suffers $8.3 Million Exploit via Malicious Token Verification Flaw A critical vulnerability in token self-listing verification logic allowed an attacker to manipulate permissions, enabling unauthorized vault access and asset exfiltration.
  • A translucent blue liquid-like structure, signifying dynamic liquidity provisioning and immutable data streams, flows atop a dark blue, faceted, transparent component. This component, revealing intricate internal smart contract logic and cryptographic primitives, represents a core consensus mechanism. It rests on a dark, ribbed metallic base, likely part of a node infrastructure or hardware security module. The abstract background hints at a complex distributed ledger technology environment, emphasizing computational integrity within a decentralized ecosystem. Arcadia Finance Rebalancer Exploited on Base, $3.5 Million Drained A critical validation flaw in Arcadia Finance's Rebalancer contract enabled an attacker to hijack asset management, leading to a multi-million dollar fund drain.
  • A macro view reveals a sophisticated mechanical apparatus, featuring polished silver and deep blue components, intricately assembled. Central to the design are translucent, crystalline blue formations, resembling large ice shards, embedded within the structure. These elements evoke cold storage and energy efficiency, conceptually linking to optimized Proof-of-Stake consensus mechanisms. The metallic framework suggests robust network nodes facilitating secure distributed ledger technology, where digital assets are safeguarded and transactions validated. This visual metaphor highlights the intricate engineering behind high-performance blockchain infrastructure, emphasizing operational integrity. SwissBorg Staking Program Compromised via Partner API Supply Chain Attack External API supply chain compromise allowed unauthorized Solana stake authority manipulation, resulting in $41.5M asset loss.

Tags:

Account CompromiseDeFi SecurityDelegated ControlFund RecoveryGovernance ResponseLazarus GroupOff-Chain VulnerabilityPhishing AttackThreat MitigationUser Education

Incrypthos

Stop Scrolling. Start Crypto.

About

Contact

LLM Disclaimer

Terms & Conditions

Privacy Policy

Cookie Policy

Encrypthos
Encrypthos

Blockchain Knowledge

Decrypthos
Decrypthos

Cryptocurrency Foundation

Incryphos Logo Icon
Incrypthos

Cryptospace Newsfeed

© 2026 Incrypthos

All Rights Reserved

Founded by Noo

Build on Noo-Engine

Source: The content on this website is produced by our Noo-Engine, a system powered by an advanced Large Language Model (LLM). This information might not be subject to human review before publication and may contain errors.
Responsibility: You should not make any financial decisions based solely on the content presented here. We strongly urge you to conduct your own thorough research (DYOR) and to consult a qualified, independent financial advisor.
Purpose: All information is intended for educational and informational purposes only. It should not be construed as financial, investment, trading, legal, or any other form of professional advice.
Risk: The cryptocurrency market is highly volatile and carries significant risk. By using this site, you acknowledge these risks and agree that Incrypthos and its affiliates are not responsible for any financial losses you may incur.
Close Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary

Cookie Consent

We use cookies to personalize content and marketing, and to analyze our traffic. This helps us maintain the quality of our free resources. manage your preferences below.

Detailed Cookie Preferences

This helps support our free resources through personalized marketing efforts and promotions.
Analytics cookies help us understand how visitors interact with our website, improving user experience and website performance.
Personalization cookies enable us to customize the content and features of our site based on your interactions, offering a more tailored experience.