A severe cyberattack has hit the decentralized finance sector, compromising the Trusted Volumes trading protocol. As a result of this attack, the platform has lost approximately $5.9 million. The stolen assets include significant quantities of Ethereum (ETH), Wrapped Bitcoin (WBTC), and various stablecoins.
What led to the security breach?
The cyberattack was made possible by a critical vulnerability in the protocol’s signature verification algorithm. Reports from SlowMist and PeckShield, experts in blockchain security, indicate that the attacker managed to bypass the digital signature checks necessary for order validation, allowing them to carry out unauthorized transactions.
How does Trusted Volumes function?
Trusted Volumes serves as a decentralized finance protocol designed to facilitate trading by employing a Request for Quote (RFQ) model. Unlike traditional automated market maker systems, this protocol enables direct order exchanges between parties, necessitating precise cryptographic verification for transactional integrity.
The stability of this process was undermined by vulnerabilities in its fillOrder function, thus exposing critical weaknesses in security.
PeckShield’s assessment places the total financial loss at $5.9 million, with stolen resources identified as including 1,291 ETH ($3.02 million), 16.94 WBTC ($1.37 million), 1.26 million USDC, and 206,000 USDT.
How did the attackers proceed post-theft?
Post-breach analysis shows that the hackers swiftly transferred the acquired funds via decentralized exchanges in an effort to obscure the transaction trail. The blockchain data reveals connections of the stolen assets to multiple exchange accounts.
The attack on Trusted Volumes brings attention to the persistent vulnerabilities within DeFi platforms. It underscores the necessity for continuous auditing of signature verification mechanisms to prevent unauthorized transactions.
Users of the platform currently face escalated risks. Experts strongly recommend that users scrutinize the technical and security integrity of any DeFi services before authorizing significant transactions.
The incident serves as a stark reminder to the DeFi community about the pressing need for enhanced security strategies. As investigations continue, the company seeks to unveil any further security loopholes.



