Skip to main content
Incrypthos
search
Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary
  • search
Incrypthos
Close Search
Security

Venus Protocol User Phished, Lazarus Group Funds Recovered

A sophisticated phishing attack leveraging a compromised client granted delegated account control, exposing DeFi users to direct asset drain risk.
September 17, 20253 min
Signal∞Context∞Analysis∞Parameters∞Outlook∞Verdict∞

The image displays a close-up of a high-tech device, featuring a prominent brushed metallic cylinder, dark matte components, and translucent blue elements that suggest internal workings and connectivity. A circular button is visible on one of the dark sections, indicating an interactive or control point within the intricate assembly
A translucent, frosted rectangular module displays two prominent metallic circular buttons, set against a dynamic backdrop of flowing blue and reflective silver elements. This sophisticated interface represents a critical component in secure digital asset management, likely a hardware wallet designed for cold storage of private keys

Briefing

The Venus Protocol, a prominent decentralized finance lending platform, successfully mitigated a sophisticated phishing attack attributed to the North Korea-linked Lazarus Group. The incident, which occurred on September 2, 2025, involved a major user falling victim to a malicious client, enabling attackers to gain delegated control over their account and drain approximately $13.5 million in various cryptocurrencies. Through an unprecedented emergency governance vote and rapid collaboration with security partners, Venus Protocol achieved a full recovery of the stolen assets within 12 hours, marking a significant milestone in DeFi incident response.

A translucent, rounded element is prominently featured, resting on a layered base of vibrant blue and polished silver. This composition evokes the tangible interaction points within the digital asset landscape

Context

Prior to this incident, the DeFi ecosystem has consistently faced a spectrum of attack vectors, ranging from smart contract vulnerabilities to social engineering tactics, often resulting in irreversible fund losses. The prevailing attack surface includes not only inherent protocol logic but also external dependencies and user-side security, which remains a critical, often overlooked, vulnerability point. This exploit specifically leveraged a previously known class of vulnerability → user compromise through sophisticated phishing, a method frequently employed by state-sponsored actors to bypass robust protocol-level security.

A translucent blue, fluid-like structure dynamically interacts with a beige bone fragment, showcasing integrated black and white mechanical components. The intricate composition highlights advanced technological integration within a complex system

Analysis

The incident’s technical mechanics centered on a phishing scam that targeted a major Venus Protocol user, Kuan Sun, via a malicious Zoom client. This compromise allowed the Lazarus Group to acquire delegated control of the user’s account, not directly exploiting Venus Protocol’s smart contracts or front-end interface, which were confirmed uncompromised. With delegated control, the attackers could initiate transactions on the user’s behalf, effectively borrowing and redeeming assets from the Venus Protocol as if they were the legitimate account holder. The success of the attack hinged on manipulating user trust and leveraging external software vulnerabilities to gain illicit access to on-chain capabilities.

A sophisticated metallic cubic device, featuring a top control dial and various blue connectors, forms the central component of this intricate system. Translucent, bubble-filled conduits loop around the device, secured by black wires, all set against a dark background

Parameters

  • Protocol Targeted → Venus Protocol
  • Attack Vector → Phishing via Malicious Client Leading to Delegated Account Control
  • Threat Actor → Lazarus Group (North Korea-linked)
  • Financial Impact → $13.5 Million (Stolen and Fully Recovered)
  • Response Time → 12 Hours (Full Recovery)
  • Vulnerability Scope → User-side compromise, not protocol smart contracts

The image features a central, textured white sphere encompassed by an array of vibrant blue crystalline structures, all set within an intricate, metallic hexagonal framework. This complex visual represents the core elements of a sophisticated blockchain ecosystem, where the central sphere could symbolize a foundational digital asset or a unique non-fungible token NFT residing within a distributed ledger

Outlook

This incident underscores the imperative for enhanced user education and multi-layered security frameworks that extend beyond smart contract audits to encompass the entire operational security posture. Protocols must consider implementing stricter delegation controls and monitoring mechanisms for unusual account activity, while users should adopt advanced anti-phishing practices and secure client environments. The successful, rapid recovery via emergency governance sets a new benchmark for crisis response, potentially influencing future DeFi protocols to integrate similar agile mitigation capabilities, though it also reignites discussions on the balance between decentralization and necessary emergency centralization.

The image showcases a highly detailed, close-up view of a complex mechanical and electronic assembly. Central to the composition is a prominent silver cylindrical component, surrounded by smaller metallic modules and interwoven with vibrant blue cables or conduits

Verdict

This incident affirms that while protocol-level security remains paramount, the human element and external software supply chain represent critical attack surfaces demanding equally rigorous attention and adaptive, governance-driven response mechanisms for asset protection.

Signal Acquired from → ainvest.com

Micro Crypto News Feeds

emergency governance

Definition ∞ Emergency governance refers to pre-defined protocols or mechanisms that allow for rapid decision-making and action in critical situations within a decentralized system.

user compromise

Definition ∞ User compromise signifies a situation where an individual's digital identity, private keys, or account credentials have been unlawfully accessed or controlled by an unauthorized party.

delegated control

Definition ∞ Delegated control refers to a system where the authority to manage or operate certain functions is transferred from one party to another.

protocol

Definition ∞ A protocol is a set of rules governing data exchange or communication between systems.

phishing

Definition ∞ Phishing, in the digital asset space, involves deceptive practices aimed at tricking individuals into divulging sensitive information, such as private keys or login credentials, typically through fraudulent communications.

lazarus group

Definition ∞ The Lazarus Group is a clandestine state-sponsored hacking collective, widely attributed to North Korea, known for its involvement in cybercrime, particularly cryptocurrency theft.

recovery

Definition ∞ Recovery, in a financial context, signifies the process by which an asset, market, or economy regains value after a period of decline.

vulnerability

Definition ∞ A vulnerability refers to a flaw or weakness in a system, protocol, or smart contract that could be exploited by malicious actors to compromise its integrity, security, or functionality.

smart contract

Definition ∞ A Smart Contract is a self-executing contract with the terms of the agreement directly written into code.

supply chain

Definition ∞ A supply chain is the network of all the individuals, companies, resources, activities, and technologies involved in the creation and sale of a product, from the delivery of source materials from the supplier to the manufacturer, through to its eventual sale to the end consumer.

Tags:

Lazarus Group Account Delegation DeFi Security Supply Chain Phishing Attack Threat Mitigation

Discover More

  • A close-up view reveals a dynamic central circular processing unit, brimming with effervescent blue bubbles, suggesting active liquidity pool operations. Surrounding this core, intricate dark blue and silver metallic structures feature glowing blue conduits, indicative of robust blockchain architecture and data pathways. The frothy substance signifies constant transaction processing and network dynamics, where digital assets are algorithmically exchanged. This represents a complex decentralized finance DeFi mechanism, emphasizing computational integrity and protocol execution. UXLINK Exploiter Loses $48 Million to Sophisticated Phishing Attack A malicious `increaseAllowance` signature allowed a phishing group to drain $48 million from a prior UXLINK exploiter, underscoring persistent social engineering risks.
  • A sophisticated metallic device, likely a hardware wallet, showcases its internal complexity. On one side, a stack of physical coins is secured beneath a brilliant, multifaceted blue crystal, symbolizing tokenized assets and immutable digital value. The opposing side reveals an exposed, intricate mechanical watch movement, abstractly representing a proof-of-stake consensus mechanism or precise timestamping for transaction finality. Two subtle buttons on the device's edge suggest secure private key management and multi-signature capabilities. DeFi Protocol Typus Drained $3.4 Million via Oracle Price Manipulation A critical missing authorization check in the oracle contract's `update_v2()` function allowed unauthorized price manipulation, directly compromising the TLP and draining $3.44M in assets.
  • A sleek, metallic, modular blockchain infrastructure component, rendered in cool blue-silver, rests on a textured, foundational layer. Its robust, engineered panels signify a resilient DLT network, designed for high-performance consensus protocols. A translucent, crystalline sphere, symbolizing a secure digital asset or genesis block, is centrally mounted. This setup embodies a decentralized autonomous organization's core mechanism, enabling secure cold storage, cross-chain interoperability, and oracle network integration, crucial for Web3 network security. Crypto Market Rebounds Strong, Ethereum ETFs Lead Institutional Inflows The crypto market is experiencing a significant rebound, primarily fueled by record institutional investment in Ethereum ETFs and improving regulatory clarity.
  • A close-up view reveals a sophisticated mechanical assembly, potentially a core component of a validator node. Polished silver and deep blue elements dominate, with a central cylindrical module featuring intricate vents, likely housing a cryptographic primitive for secure operations. Numerous blue conduits interweave, representing data pathways facilitating transaction finality within a distributed ledger technology framework. Peripheral metallic modules suggest integrated hardware security enclaves crucial for maintaining decentralized network integrity and executing proof-of-stake consensus algorithms. The composition emphasizes precision engineering. Venus Protocol User Phished, Funds Recovered by Governance Action A targeted phishing attack on a user's delegated account control highlights critical risks associated with off-chain credential compromise in DeFi.
  • A sleek, metallic device with a transparent blue panel reveals an intricate mechanical movement, evoking precision engineering. This sophisticated design suggests a robust hardware wallet or secure enclave for digital asset management. The visible gears and balance wheel metaphorically represent a complex consensus mechanism or a time-locked cryptographic module, emphasizing tamper-proof security and deterministic key derivation crucial for blockchain protocols and trustless environments. UXLINK Multi-Signature Wallet Compromised via DelegateCall Vulnerability A delegateCall vulnerability in a multi-signature wallet enabled unauthorized administrative control, leading to significant asset drain and token inflation.
  • A translucent blue fluid mass, heavily foamed with effervescent bubbles, cascades across a stack of dark gray modular hardware units. The units display glowing blue on-chain data visualizations and circuit schematics, one prominently featuring the "Nexo" platform logo. This imagery conceptually depicts decentralized finance DeFi protocol operations, illustrating the active flow of digital assets and complex transaction processing on underlying blockchain infrastructure. The foam suggests network activity or dynamic market volatility impacting asset management. Siemens Integrates Citi Token Services for Real-Time Global Treasury Management Tokenized deposits enable multinational treasuries to achieve 24/7 liquidity management, eliminating pre-funding and optimizing global capital efficiency.
  • A sophisticated, modular Web3 protocol core is depicted, featuring a pristine white outer casing enveloping intricate blue and metallic internal decentralized ledger technology components. Visible smart contract execution units and network nodes suggest complex algorithmic governance processes. The central, multi-pronged mechanism could represent validator operations or oracle data feeds, emphasizing precise, automated functionality within a trustless system. Its clean design and interconnected elements symbolize robust blockchain interoperability and scalable digital asset management infrastructure. HSBC Scales Tokenized Deposit Service to US and UAE Corporate Treasuries This DLT-based deposit token facilitates 24/7, instant, cross-border corporate treasury settlement, enhancing capital efficiency and liquidity management within a fully regulated banking framework.
  • A polished metallic core, resembling a hardware wallet or validator node, forms the central cryptographic primitive. Surrounding its immutable ledger structure, a vibrant blue substance, indicative of on-chain liquidity or transaction flow, dynamically interacts. This is overlaid by a granular white accumulation, representing staking rewards or yield farming gains, suggesting robust protocol security and network effect growth. A blurred white digital asset sphere floats in the background, emphasizing the broader decentralized ecosystem. Polymarket Gains US Regulatory Approval, Resumes Operations Polymarket's CFTC approval marks a pivotal moment for regulated prediction markets, signaling a new era of mainstream acceptance and growth.
  • A precise, central lens-like component, resembling a validator node or oracle, anchors the composition. It is encircled by vibrant blue, translucent conduits and fluid streams, evoking data pipelines and liquidity pools within a decentralized finance DeFi ecosystem. Surrounding this intricate core is a dense, effervescent layer of white bubbles, symbolizing robust protocol security and cryptographic pathways safeguarding the underlying distributed ledger technology DLT and continuous transaction processing. Crypto Market Declines amid ETF Outflows and ECB Policy Concerns The crypto market saw broad declines today, driven by institutional ETF outflows and a cautious stance from the European Central Bank, signaling a risk-off environment.

Tags:

Account DelegationDeFi SecurityDigital AssetsFund RecoveryGovernance VoteLazarus GroupPhishing AttackSupply ChainThreat MitigationUser Compromise

Incrypthos

Stop Scrolling. Start Crypto.

About

Contact

LLM Disclaimer

Terms & Conditions

Privacy Policy

Cookie Policy

Encrypthos
Encrypthos

Blockchain Knowledge

Decrypthos
Decrypthos

Cryptocurrency Foundation

Incryphos Logo Icon
Incrypthos

Cryptospace Newsfeed

© 2026 Incrypthos

All Rights Reserved

Founded by Noo

Build on Noo-Engine

Source: The content on this website is produced by our Noo-Engine, a system powered by an advanced Large Language Model (LLM). This information might not be subject to human review before publication and may contain errors.
Responsibility: You should not make any financial decisions based solely on the content presented here. We strongly urge you to conduct your own thorough research (DYOR) and to consult a qualified, independent financial advisor.
Purpose: All information is intended for educational and informational purposes only. It should not be construed as financial, investment, trading, legal, or any other form of professional advice.
Risk: The cryptocurrency market is highly volatile and carries significant risk. By using this site, you acknowledge these risks and agree that Incrypthos and its affiliates are not responsible for any financial losses you may incur.
Close Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary

Cookie Consent

We use cookies to personalize content and marketing, and to analyze our traffic. This helps us maintain the quality of our free resources. manage your preferences below.

Detailed Cookie Preferences

This helps support our free resources through personalized marketing efforts and promotions.
Analytics cookies help us understand how visitors interact with our website, improving user experience and website performance.
Personalization cookies enable us to customize the content and features of our site based on your interactions, offering a more tailored experience.