SlowMist Monthly Security Report: April Estimated Losses at $26.4 Million

SlowMist
6 min readMay 1, 2025

Overview

In April 2025, the total loss from Web3 security incidents reached approximately $26.4 million. According to statistics from SlowMist’s Hacked database (https://hacked.slowmist.io), a total of 18 hacking incidents occurred, resulting in losses of around $21.11 million. Of this, $17.89 million was frozen or recovered. The causes of these incidents include contract vulnerabilities, social engineering, insider misconduct, and private key leaks. In addition, according to the Web3 anti-scam platform Scam Sniffer, there were 7,565 phishing victims this month, with a total loss of $5.29 million.

https://dune.com/scam-sniffer/april-2025-scam-sniffer-scam-report

Major Security Incidents

KiloEx

On April 15, 2025, decentralized perpetual contract trading platform KiloEx was attacked, resulting in losses of approximately $8.44 million. Following the incident, SlowMist promptly conducted an investigation and issued a security alert. Fortunately, with the proactive efforts of the project team and coordinated response from SlowMist and others, all stolen assets were successfully recovered within 3.5 days, bringing the incident to a satisfactory conclusion.

According to KiloEx’s analysis report, the attack stemmed from a flaw in the contract’s permission validation mechanism. The TrustedForwarder contract inherited from OpenZeppelin’s MinimalForwarderUpgradeable contract. However, the execute method was not overridden in TrustedForwarder, making it an accessible function without proper permissions. The attacker exploited this by directly calling OpenZeppelin’s original execute method. The payload of the execute method involved calling the delegateExecutePositions function, which only validated whether msg.sender == trustedForwarder, without verifying whether the actual initiator was a keeper. As a result, the attacker bypassed permission checks and executed a sequence of trades—opening positions at extremely low prices and closing them at higher prices—to complete the attack.

https://x.com/SlowMist_Team/status/1911991384254402737

Loopscale

On April 26, 2025, the modular DeFi lending protocol Loopscale, built on Solana, was attacked, resulting in the theft of approximately 5.7 million USDC and 1,200 SOL — about 12% of the platform’s total funds. The root cause of the incident was identified as an isolation issue in Loopscale’s pricing mechanism for RateX-based collateral. On April 29, according to Loopscale’s official Twitter, after successful negotiations, the 5,726,725 USDC and 1,211 SOL stolen on April 26 were fully returned, and no user deposits were lost.

https://x.com/LoopscaleLabs/status/1917212052029931624

ZKsync

According to the incident analysis report published by ZKsync (https://zksync.mirror.xyz/W5vPDZqEqf2NuwQ5x7SyFnIxqqpE1szAFD69iaaBFnI), on April 13, a compromised admin account minted unclaimed tokens from the Merkle distribution contract for the June 17, 2024 ZK token airdrop. The attacker successfully controlled 111,881,122 ZK tokens, valued at approximately $5 million at the time. This incident was limited to three specific Merkle distribution contracts related to the June 2024 ZK airdrop. The root cause was the compromise of an admin key. On April 23, following a “safe harbor” proposal by the ZKsync Security Council, the attacker returned all funds, resolving the incident.

https://x.com/TheZKNation/status/1915110305790660939

R0AR

On April 16, 2025, R0AR was attacked, resulting in losses of approximately $780,000. According to analysis by the SlowMist security team, the root cause was a backdoor in the contract. During deployment, the R0ARStaking contract directly modified storage slots to tamper with the balance (user.amount) of a specified address. The attacker then used an emergency withdrawal function to drain all funds from the contract. R0AR founder and CEO Dustin explained the incident during an AMA, stating that the developer in question had embedded malicious code into the staking contract, enabling them to execute the emergency withdrawal and drain the liquidity pool. Around 490 ETH worth of tokens were stolen. According to on-chain AML and tracing tool MistTrack, the stolen funds were transferred into Tornado.

https://x.com/SlowMist_Team/status/1912417097269014825

Pattern Analysis and Security Recommendations

This month, stolen funds from three hacking incidents were fully recovered. It is clear that post-incident on-chain tracing and negotiation remain among the most critical response strategies. Effective on-chain communication in a timely manner often leads to a more efficient recovery of losses. We previously published Establishing On-Chain Communication After an Incident and SlowMist: Emergency Response Guide for Stolen Funds — On-Chain Messaging (BTC Edition). Readers interested in these resources can click to view.

On another note, with the rapid development of large models, various new AI tools are continuously emerging. Tools implementing the currently representative MCP (Model Context Protocol) standard are gradually becoming key bridges between large language models (LLMs) and external tools and data sources. However, the rapid adoption of MCP has also introduced new security challenges. This month, the SlowMist security team released a series of MCP security-themed articles. Project teams are advised to refer to these articles for self-assessments and risk mitigation, and to prepare defenses in advance.

The widespread application of AI in blockchain has also introduced new potential risks. In 2024, SlowMist disclosed the first real-world case in history of asset theft caused by AI poisoning, indicating that AI-based attacks are no longer theoretical. Such attack methods may continue to evolve in the future. Moreover, in the dark forest of blockchain, it is essential not only to defend against AI-driven attacks but also to have the capability to determine whether an attack was AI-driven. This is not just an extension of external threat prevention, but also a crucial step in identifying and managing internal behavior and potential sources of risk.

In conclusion, the events covered in this article represent the major security incidents of the month. For more blockchain security incidents, please visit the SlowMist Hacked database (https://hacked.slowmist.io).

About SlowMist

SlowMist is a blockchain security firm established in January 2018. The firm was started by a team with over ten years of network security experience to become a global force. Our goal is to make the blockchain ecosystem as secure as possible for everyone. We are now a renowned international blockchain security firm that has worked on various well-known projects such as HashKey Exchange, OSL, MEEX, BGE, BTCBOX, Bitget, BHEX.SG, OKX, Binance, HTX, Amber Group, Crypto.com, etc.

SlowMist offers a variety of services that include but are not limited to security audits, threat information, defense deployment, security consultants, and other security-related services. We also offer AML (Anti-money laundering) software, MistEye (Security Monitoring) , SlowMist Hacked (Crypto hack archives), FireWall.x (Smart contract firewall) and other SaaS products. We have partnerships with domestic and international firms such as Akamai, BitDefender, RC², TianJi Partners, IPIP, etc. Our extensive work in cryptocurrency crime investigations has been cited by international organizations and government bodies, including the United Nations Security Council and the United Nations Office on Drugs and Crime.

By delivering a comprehensive security solution customized to individual projects, we can identify risks and prevent them from occurring. Our team was able to find and publish several high-risk blockchain security flaws. By doing so, we could spread awareness and raise the security standards in the blockchain ecosystem.

--

--

SlowMist
SlowMist

Written by SlowMist

SlowMist is a Blockchain security firm established in 2018, providing services such as security audits, security consultants, red teaming, and more.

No responses yet