Stablecoin Bank Hacked – Hackers Stolen $49.5M in Attack


In a high-profile security breach, decentralized finance protocol @0xinfini suffered a $49.5 million USDC theft, marking one of the largest stablecoin exploits of the year. 

The attacker executed a multi-stage laundering operation, converting stolen USDC to DAI, purchasing 17,696 ETH ($2,800 per unit), and funneling funds to wallet 0xfcc8…6e49 within 75 minutes. 

The incident precipitated immediate market dislocations: USDC depegged 0.2% to $0.998, DAI gained 0.05%, and ETH prices swung 2% amid surging volumes.

Blockchain analysts warn that the hacker’s 17,696 ETH hoard worth approximately $49.5 million—poses systemic liquidation risks if dumped on exchanges.

Attack Vector and Fund Movement

The exploit targeted @0xinfini’s smart contract infrastructure, though the precise vulnerability remains under audit. Blockchain intelligence firm Lookonchain traced the attacker’s path:

  • 15:45 UTC: 49.5M USDC drained from @0xinfini reserves
  • 15:47 UTC: Full amount swapped to DAI via Curve Finance’s USDC/DAI pool
  • 15:53 UTC: DAI converted to 17,696 ETH across Uniswap V3 and Balancer pools
  • 16:00 UTC: ETH transferred through three intermediary wallets before consolidation at 0xfcc8…6e49

This rapid asset rotation exploited cross-dex liquidity, with the hacker capturing slippage-adjusted prices through algorithmic routing. 

The final ETH transfer utilized Tornado Cash’s newly upgraded privacy pools, complicating chain surveillance.

Market Impact Analysis

The breach triggered cascading effects across crypto markets:

USDC Stability: The 0.2% depeg reflected $1.5 billion in panic redemptions within 60 minutes, per CoinGecko data. Market makers widened USDC/USDT spreads to 15 basis points, double the 30-day average.

DAI Demand Surge: The hacker’s 49.5M DAI purchase drove its RSI to 55 (overbought threshold), while MACD indicators flashed bullish divergence.

ETH Volatility: Despite the 2% price spike, derivatives data revealed elevated put/call ratios (1.25 vs. 0.89 weekly average), signaling bearish hedging.

Trading volumes exploded: $1.5 billion USDC changed hands (+300% hour-over-hour), while ETH futures open interest jumped $800 million. Glassnode tracked a 10% spike in active ETH addresses, suggesting speculative accumulation.

Technical Indicators

Technical analysts highlight critical thresholds:

  • USDC: RSI at 45 with bearish MACD crossover; support at $0.995 via Fibonacci retracement
  • ETH: Overbought RSI (70) but bullish MACD; key resistance at $2,850 (2024 high)

The hack exposes vulnerabilities in cross-protocol collateralization. @0xinfini’s $2.1 billion TVL includes $890 million USDC-backed loans—a 23% reserve drawdown that could trigger undercollateralized positions. 

Compound and Aave’s USDC borrowing rates spiked to 18% APY as lenders scrambled to withdraw liquidity.

Though no direct AI involvement, machine learning models likely amplified volatility. CoinMarketCap detected abnormal volume spikes in AI tokens:

  • Fetch.ai ($FET): 10M volume (+5%) with 12% short interest reduction
  • SingularityNET ($AGIX): Funding rates flipped positive on Binance, indicating long bias

Security-focused projects like Ocean Protocol ($OCEAN) saw muted response, suggesting markets haven’t priced in broader audit risks.

Strategic Implications

The exploit underscores persistent smart contract risks in DeFi’s Layer 2 ecosystems. As the hacker’s ETH remains dormant, traders should:

  • Monitor 0xfcc8…6e49 for exchange deposits via Arkham Intelligence
  • Limit USDC exposure with DAI/USDT basis trades
  • Watch ETH options gamma at $2,800 strike for volatility signals

This breach may accelerate regulatory proposals for stablecoin issuers, particularly regarding reserve auditing and circuit breaker mechanisms.

For now, markets prepare for potential ETH sell-pressure—a $49.5 million overhang equivalent to 18% of Coinbase’s daily spot volume.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here





Source link