SwapNet Exploit Drains $16.8M After Approval Flaw on Matcha Meta

CoincuInsights
ETH3,33%
ARB0,39%
BNB2,53%

In Brief

  • SwapNet exploit drains $16.8M after users disabled one-time approval protections.
  • Attacker swapped $10.5M USDC to ETH on Base before bridging to Ethereum.
  • Matcha Meta disables affected contracts as security firms flag wider DeFi risks.

A security breach linked to SwapNet led to losses of about $16.8 million, affecting users interacting through Matcha Meta. The incident mainly impacted users who disabled one-time approvals, thereby exposing persistent token permissions.

Blockchain security firm PeckShieldAlert identified the exploit and traced the initial fund movements. The attacker targeted SwapNet router contracts that retained unlimited approvals from affected user wallets.

On the Base network, the attacker exchanged roughly $10.5 million in USDC for about 3,655 ether. Soon after, the attacker began bridging the converted assets to the Ethereum mainnet to complicate tracking.

SwapNet operates as a liquidity router used by Matcha Meta to source pricing and deep liquidity. The exploit involved abusing existing approvals rather than breaching private keys or core infrastructure.

Matcha Meta, built by the 0x team, confirmed the issue and immediately disabled affected SwapNet contracts. The platform also removed the option allowing users to grant direct approvals to third-party aggregators.

Investigation Expands as Security Firms Flag Wider Risks

Further analysis suggested the exploit stemmed from an arbitrary call vulnerability within SwapNet contracts. This flaw allowed attackers to transfer approved tokens without requesting new permissions.

Security firm BlockSec reported that multiple contracts across chains suffered losses exceeding $17 million. Affected networks included Ethereum, Arbitrum, Base, and BNB Chain, increasing the incident’s scope.

Separately, CertiK estimated that stolen funds near $13.3 million in USDC from related activity.
Some contracts involved remained closed-source and unverified at deployment.

Matcha Meta later confirmed that 0x core contracts were not affected by the incident.
Users relying on one-time approvals through 0x infrastructure remained unaffected.

The incident renewed scrutiny around persistent token approvals in decentralized finance.
Unlimited permissions offer convenience but increase exposure during smart contract failures.

Meanwhile, on-chain investigator ZachXBT criticized Circle’s delayed response to freeze remaining USDC. Roughly $3 million reportedly remained at addresses eligible for freezing during the response window.

The breach adds to a growing list of DeFi security failures early in 2026. Industry data shows stolen crypto funds reached record levels in recent years, increasing pressure on protocol security practices.

DISCLAIMER: The information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Gerelateerde artikelen

Bisq Protocol Attacked, 11 BTC Stolen on May 4; Compensation Plan Under DAO Vote

According to Bisq, the protocol was attacked on May 4 due to missing verification mechanisms, resulting in approximately 11 BTC being stolen, primarily from altcoin trades. The platform is discussing compensation options for affected users, who can choose between Bitcoin or BSQ token reimbursement p

GateNews4u geleden

Reuters Links Nobitex Founders to Iran's Elite Kharrazi Family; Exchange Handles 70% of Iran's Crypto

According to a Reuters investigation published Friday, May 2, Nobitex, Iran's dominant crypto exchange with roughly 11 million users, was founded by brothers Ali and Mohammad Kharrazi, members of a family related by marriage to all three of Iran's supreme leaders. The brothers registered the company

GateNews12u geleden

Reuters: Nobitex Founded by Elite Iranian Political Family, Handles 70% of Nation's Crypto Activity

According to a Reuters investigation published Friday, Nobitex, Iran's dominant crypto exchange with roughly 11 million users, was founded by brothers Ali and Mohammad Kharrazi, members of a family with close ties to Iran's supreme leaders. The brothers registered the company in 2018 under an altern

GateNews22u geleden

Purrlend Loses $1.52M on HyperEVM and MegaETH After 2/3 Multisig Compromise

According to ChainCatcher, Purrlend suffered a security breach on HyperEVM and MegaETH on May 3, losing approximately $1.52 million. Attackers compromised the team's 2/3 multisig wallet and granted themselves the BRIDGE_ROLE permission, using it to mint unbacked pUSDm and pUSDC tokens that were

GateNews22u geleden

Nobitex, Iran's Dominant Crypto Exchange, Founded by Elite Political Family Connected to Supreme Leaders

According to a Reuters investigation published Friday, Nobitex, Iran's dominant crypto exchange, was founded by brothers Ali and Mohammad Kharrazi from an elite political family connected by marriage to all three supreme leaders of the Islamic Republic. The exchange claims roughly 11 million users a

GateNews05-03 01:19

MEV Robot Converts $0.22 to $696,000 via Meteora ANB Pool Exploit

According to SolanaFloor, an MEV robot exploited a vulnerability in Meteora's ANB pool to convert $0.22 USDC into $696,000 USDC in a single transaction. The ANB token fell 99% following the attack.

GateNews05-02 09:30
Opmerking
0/400
Geen opmerkingen