Skip to main content
Incrypthos
search
Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary
  • search
Incrypthos
Close Search
Security

Venus Protocol User Phished, Lazarus Group Funds Recovered

A sophisticated phishing attack leveraging a compromised client granted delegated account control, exposing DeFi users to direct asset drain risk.
September 17, 20253 min
Signal∞Context∞Analysis∞Parameters∞Outlook∞Verdict∞

The close-up showcases a futuristic array of pristine white, interconnected modular units, featuring a central glowing blue crystalline structure emitting intense light. This intricate design suggests a high-performance processing engine, with radiant blue conduits signifying dynamic data transfer
A detailed close-up showcases a high-tech, modular hardware device, predominantly in silver-grey and vibrant blue. The right side prominently features a multi-ringed lens or sensor array, while the left reveals intricate mechanical components and a translucent blue element

Briefing

The Venus Protocol, a prominent decentralized finance lending platform, successfully mitigated a sophisticated phishing attack attributed to the North Korea-linked Lazarus Group. The incident, which occurred on September 2, 2025, involved a major user falling victim to a malicious client, enabling attackers to gain delegated control over their account and drain approximately $13.5 million in various cryptocurrencies. Through an unprecedented emergency governance vote and rapid collaboration with security partners, Venus Protocol achieved a full recovery of the stolen assets within 12 hours, marking a significant milestone in DeFi incident response.

A close-up reveals an intricate mechanical system featuring two modular units, with the foreground unit exposing precision gears, metallic plates, and a central white geometric component within a brushed metal casing. Multi-colored wires connect the modules, which are integrated into a blue structural frame alongside additional mechanical components and a ribbed metallic adjustment knob

Context

Prior to this incident, the DeFi ecosystem has consistently faced a spectrum of attack vectors, ranging from smart contract vulnerabilities to social engineering tactics, often resulting in irreversible fund losses. The prevailing attack surface includes not only inherent protocol logic but also external dependencies and user-side security, which remains a critical, often overlooked, vulnerability point. This exploit specifically leveraged a previously known class of vulnerability → user compromise through sophisticated phishing, a method frequently employed by state-sponsored actors to bypass robust protocol-level security.

The image displays a detailed view of a futuristic device, highlighting a circular port filled with illuminated blue crystalline elements and surrounded by white, frosty material. Modular white and dark grey components make up the device's exterior, suggesting complex internal mechanisms

Analysis

The incident’s technical mechanics centered on a phishing scam that targeted a major Venus Protocol user, Kuan Sun, via a malicious Zoom client. This compromise allowed the Lazarus Group to acquire delegated control of the user’s account, not directly exploiting Venus Protocol’s smart contracts or front-end interface, which were confirmed uncompromised. With delegated control, the attackers could initiate transactions on the user’s behalf, effectively borrowing and redeeming assets from the Venus Protocol as if they were the legitimate account holder. The success of the attack hinged on manipulating user trust and leveraging external software vulnerabilities to gain illicit access to on-chain capabilities.

A sophisticated, multi-component device showcases transparent blue panels revealing complex internal mechanisms and a prominent silver control button. The modular design features stacked elements, suggesting specialized functionality and robust construction

Parameters

  • Protocol Targeted → Venus Protocol
  • Attack Vector → Phishing via Malicious Client Leading to Delegated Account Control
  • Threat Actor → Lazarus Group (North Korea-linked)
  • Financial Impact → $13.5 Million (Stolen and Fully Recovered)
  • Response Time → 12 Hours (Full Recovery)
  • Vulnerability Scope → User-side compromise, not protocol smart contracts

A close-up view reveals luminous blue internal structures housed within a textured, translucent casing, accented by sleek silver-white modular panels. These metallic panels feature subtle etched patterns, suggesting advanced circuitry and interconnectedness

Outlook

This incident underscores the imperative for enhanced user education and multi-layered security frameworks that extend beyond smart contract audits to encompass the entire operational security posture. Protocols must consider implementing stricter delegation controls and monitoring mechanisms for unusual account activity, while users should adopt advanced anti-phishing practices and secure client environments. The successful, rapid recovery via emergency governance sets a new benchmark for crisis response, potentially influencing future DeFi protocols to integrate similar agile mitigation capabilities, though it also reignites discussions on the balance between decentralization and necessary emergency centralization.

A polished metallic square plate, featuring a prominent layered circular component, is securely encased within a translucent, wavy, blue-tinted material. The device's sleek, futuristic design suggests advanced technological integration

Verdict

This incident affirms that while protocol-level security remains paramount, the human element and external software supply chain represent critical attack surfaces demanding equally rigorous attention and adaptive, governance-driven response mechanisms for asset protection.

Signal Acquired from → ainvest.com

Micro Crypto News Feeds

emergency governance

Definition ∞ Emergency governance refers to pre-defined protocols or mechanisms that allow for rapid decision-making and action in critical situations within a decentralized system.

user compromise

Definition ∞ User compromise signifies a situation where an individual's digital identity, private keys, or account credentials have been unlawfully accessed or controlled by an unauthorized party.

delegated control

Definition ∞ Delegated control refers to a system where the authority to manage or operate certain functions is transferred from one party to another.

protocol

Definition ∞ A protocol is a set of rules governing data exchange or communication between systems.

phishing

Definition ∞ Phishing, in the digital asset space, involves deceptive practices aimed at tricking individuals into divulging sensitive information, such as private keys or login credentials, typically through fraudulent communications.

lazarus group

Definition ∞ The Lazarus Group is a clandestine state-sponsored hacking collective, widely attributed to North Korea, known for its involvement in cybercrime, particularly cryptocurrency theft.

recovery

Definition ∞ Recovery, in a financial context, signifies the process by which an asset, market, or economy regains value after a period of decline.

vulnerability

Definition ∞ A vulnerability refers to a flaw or weakness in a system, protocol, or smart contract that could be exploited by malicious actors to compromise its integrity, security, or functionality.

smart contract

Definition ∞ A Smart Contract is a self-executing contract with the terms of the agreement directly written into code.

supply chain

Definition ∞ A supply chain is the network of all the individuals, companies, resources, activities, and technologies involved in the creation and sale of a product, from the delivery of source materials from the supplier to the manufacturer, through to its eventual sale to the end consumer.

Tags:

Account Delegation DeFi Security User Compromise Phishing Attack Digital Assets Supply Chain

Discover More

  • A high-fidelity render depicts a sophisticated, modular technological apparatus, central to a distributed ledger technology DLT ecosystem. A prominent white cylindrical interconnect module forms the core, featuring intricate metallic fins suggesting intense cryptographic hashing or transaction validation processes. This central unit links two larger, dark grey node infrastructure segments, emphasizing seamless block propagation and cross-chain communication. Subtle vapor indicates active operation and high network throughput, characteristic of advanced scalability solutions and interoperability protocols facilitating atomic swaps and efficient smart contract execution within a decentralized infrastructure. Decentralized Exchange Bunni Drained $8.4 Million Exploiting Custom Liquidity Logic Custom liquidity distribution functions with subtle rounding errors create critical arithmetic vulnerabilities that enable catastrophic flash-loan exploits.
  • A bisected sphere contrasts a digital system's exterior and interior. The left half features a smooth, light blue surface with engineered indentations, resembling validator nodes or smart contract entry points. The right half reveals a translucent, darker blue interior, where white cloud-like structures, representing dynamic on-chain data processing and transaction throughput, swirl within a complex network architecture. A central dark aperture suggests an oracle or core execution environment, illustrating DLT protocol layers. Venus Protocol User Compromised via Phishing, Funds Recovered by Governance A sophisticated phishing attack targeting a high-value user's delegated account control highlights critical user-side vulnerability in DeFi.
  • A spherical digital asset, deep blue with swirling white patterns, represents a tokenized asset within a distributed network. It is securely encapsulated by a robust, metallic silver framework, symbolizing cryptographic security and immutable ledger protection. This intricate structure, featuring solid bands and perforated grilles, suggests a sophisticated consensus mechanism safeguarding blockchain data. The design evokes a secure node or an oracle's protected data stream, emphasizing asset custody and smart contract integrity. Venus Protocol User Phished, $13.5m Recovered via Governance User-level phishing compromising delegated account control remains a critical vector for unauthorized asset manipulation within DeFi protocols.
  • A dark blue digital asset, possibly a wrapped token, partially enveloped by a translucent, light blue protocol layer. This layer exhibits dynamic fluidity, with numerous tiny white data points or transaction particles suspended within its structure. The visual metaphor suggests DeFi interoperability and the intricate mechanics of a liquidity pool. The interaction highlights smart contract execution and the on-chain governance influencing asset encapsulation. This abstract representation underscores the complex blockchain architecture facilitating cross-chain bridging and layer 2 scaling solutions. KyberSwap Elastic Drained Fifty-Six Million Exploiting Concentrated Liquidity Logic A systemic logic flaw in concentrated liquidity pool tick calculations allowed double liquidity counting, enabling a multi-chain $56M asset drain.
  • A sophisticated technological mechanism features a transparent blue cylindrical component on the left, showcasing intricate internal structures resembling data pathways or circuitries. This section connects to a textured, segmented white module, appearing to facilitate a critical juncture or processing step. Further right, a metallic cylinder with subtle indicators suggests a control or measurement unit. This setup conceptually illustrates a blockchain infrastructure module, emphasizing data integrity during transaction finality. The glowing blue elements represent active node operation within a decentralized network, highlighting secure protocol layer interactions. Crypto Markets Rebound on Strong Fed Rate Cut Hopes Crypto markets are showing renewed strength, with Bitcoin leading a rebound as investors anticipate a significant Federal Reserve interest rate cut.
  • A close-up view features two distinct, highly engineered components poised for connection against a blurred, deep blue backdrop. The right module, predominantly white with hexagonal facets, presents a complex internal mechanism, suggesting a modular blockchain architecture. Its counterpart on the left, rendered in brushed silver, exhibits intricate detailing and precise alignment. This visual metaphor illustrates critical blockchain interoperability challenges and solutions, emphasizing secure cross-chain bridge mechanisms. The scene evokes the seamless protocol integration essential for robust Web3 infrastructure and efficient distributed ledger technology synchronization. BNP Paribas, UBS Pilot Tokenized Fund Subscriptions with SWIFT Integration SWIFT messaging triggers blockchain smart contracts for tokenized fund settlement, establishing a critical interoperability layer to unlock illiquid institutional assets.
  • A close-up view reveals a robust mechanical assembly featuring a central black cylindrical component, resembling a control input, anchored to a bright blue metallic plate with silver screws. An intricate web of black, blue, and silver cables, some braided, others smooth, intertwine around the core, signifying complex interdependencies. This intricate DLT architecture suggests a sophisticated system facilitating network synchronization and secure communication, crucial for robust smart contract execution and maintaining data integrity within a corporate crypto environment. Venus Protocol User Phished, $13.5 Million Recovered by Governance A sophisticated phishing attack leveraging a malicious client compromised a user's delegated account control, exposing DeFi to social engineering vulnerabilities.
  • The image showcases a luminous, translucent blue-grey amorphous structure enveloping a vibrant, solid blue sphere. This abstract rendering visually represents a DeFi liquidity pool where digital assets are tokenized and secured within a smart contract. The fluid, protective form symbolizes the protocol's robust security mechanisms and interoperability within a decentralized network. The core sphere embodies a governance token or native cryptocurrency, highlighting its asset custody and yield farming potential, reflecting dynamic blockchain interactions. Yearn Legacy Pool Drained by Infinite Token Minting Logic Flaw A critical logic flaw in a legacy stableswap contract allowed an attacker to mint unauthorized yETH, compromising $9M in deposited assets.
  • A sophisticated cutaway view reveals the internal mechanics of a white and grey cylindrical device. Within, a central metallic shaft engages with dynamic streams of granular blue and white material. The particles are actively being processed, symbolizing continuous data aggregation and transaction validation within blockchain infrastructure. This mechanism illustrates robust decentralized processing maintaining network state and executing smart contract logic, where diverse digital assets are transformed through cryptographic hashing operations, ensuring integrity and token liquidity across interoperability protocols. Catizen Telegram Mini-App Decisively Validates SocialFi Gaming with 3.5 Million Daily Users The protocol leveraged Telegram's native distribution to abstract wallet friction, achieving a user scale that redefines Web3 gaming's acquisition funnel.

Tags:

Account DelegationDeFi SecurityDigital AssetsFund RecoveryGovernance VoteLazarus GroupPhishing AttackSupply ChainThreat MitigationUser Compromise

Incrypthos

Stop Scrolling. Start Crypto.

About

Contact

LLM Disclaimer

Terms & Conditions

Privacy Policy

Cookie Policy

Encrypthos
Encrypthos

Blockchain Knowledge

Decrypthos
Decrypthos

Cryptocurrency Foundation

Incryphos Logo Icon
Incrypthos

Cryptospace Newsfeed

© 2026 Incrypthos

All Rights Reserved

Founded by Noo

Build on Noo-Engine

Source: The content on this website is produced by our Noo-Engine, a system powered by an advanced Large Language Model (LLM). This information might not be subject to human review before publication and may contain errors.
Responsibility: You should not make any financial decisions based solely on the content presented here. We strongly urge you to conduct your own thorough research (DYOR) and to consult a qualified, independent financial advisor.
Purpose: All information is intended for educational and informational purposes only. It should not be construed as financial, investment, trading, legal, or any other form of professional advice.
Risk: The cryptocurrency market is highly volatile and carries significant risk. By using this site, you acknowledge these risks and agree that Incrypthos and its affiliates are not responsible for any financial losses you may incur.
Close Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary

Cookie Consent

We use cookies to personalize content and marketing, and to analyze our traffic. This helps us maintain the quality of our free resources. manage your preferences below.

Detailed Cookie Preferences

This helps support our free resources through personalized marketing efforts and promotions.
Analytics cookies help us understand how visitors interact with our website, improving user experience and website performance.
Personalization cookies enable us to customize the content and features of our site based on your interactions, offering a more tailored experience.