Nearly $13 million stolen from Abracadabra Finance in crypto heist

Avatar

The cryptocurrency platform Abracadabra Finance lost about $13 million worth of digital currency to hackers on Tuesday morning.  

The company did not respond to requests for comment confirming the amount of stolen cryptocurrency but acknowledged the incident in a message on social media. 

The crypto lending platform said the issue was sourced back to a product it calls “cauldrons” — isolated lending markets that allow users to borrow against a variety of cryptocurrencies. 

“Core contributors and security engineers are investigating the issue in depth and will provide more information as soon as available,” the company said, adding that each cauldron had been audited by a security company called Guardian. 

“While having multiple systems in place, the exploit was caught only after the attacker executed several transactions.”

Abracadabra Finance said it is in the process of calculating the damage and is working with Guardian and other companies to examine the incident. The blockchain security company Chainalysis is tracking the stolen funds. 

The company also offered a bug bounty to the hacker of 20% of the stolen funds. Abracadabra Finance’s website was replaced with a message saying the company’s front end is not currently available.

Multiple blockchain security firms said 6,260 Ethereum coins were stolen in the attack, valued at about $12.9 million. Several companies tied the attack to the decentralized exchange GMX — which provides the coins that served as collateral for Abracadabra Finance’s cauldrons. 

GMX representatives released multiple statements on X and Telegram claiming they were not affected. 

“To clarify, no issues have been identified with GMX contracts, and they are not affected by this unfortunate situation,” the company said. 

In many attacks on cryptocurrency platforms, hackers have to first transfer in funds before they can withdraw. At least one of the blockchain security firms, Slow Mist, said the funds used to initially launch the attack were sourced back to Tornado Cash. 

The Treasury Department removed sanctions on Tornado Cash last week after a federal appeals court ruled the agency had exceeded its authority in trying to penalize the company for being used by North Korean hackers seeking to launder funds stolen from cryptocurrency firms.

NewsNews BriefsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Malaysia PM says country rejected $10 million ransom demand after airport outages

Next Post

Alleged Snowflake hacker consents to extradition from Canada after US charges

Related Posts

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February]

This week, our news radar shows that every new tech idea comes with its own challenges. A hot AI tool is under close watch, law enforcement is shutting down online spots that help cybercriminals, and teams are busy fixing software bugs that could let attackers in. From better locks on our devices to stopping sneaky tricks online, simple steps are making a big difference.  Let’s take a
Avatar
Read More

Rockstar2FA Collapse Fuels Expansion of FlowerStorm Phishing-as-a-Service

An interruption to the phishing-as-a-service (PhaaS) toolkit called Rockstar 2FA has led to a rapid uptick in activity from another nascent offering named FlowerStorm. "It appears that the [Rockstar2FA] group running the service experienced at least a partial collapse of its infrastructure, with pages associated with the service no longer reachable," Sophos said in a new report published last
Avatar
Read More

CISA and FDA Warn of Critical Backdoor in Contec CMS8000 Patient Monitors

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Food and Drug Administration (FDA) have issued alerts about the presence of hidden functionality in Contec CMS8000 patient monitors and Epsimed MN-120 patient monitors. The vulnerability, tracked as CVE-2025-0626, carries a CVSS v4 score of 7.7 on a scale of 10.0. The flaw, alongside two other issues, was reported to CISA
Avatar
Read More