Balancer Protocol Faces Second Hack in a Month
Balancer Protocol, a leading decentralized finance (DeFi) protocol, has experienced its second hack within a month. Cybercriminals targeted the protocol’s front-end website, tricking users into approving malicious contracts and stealing funds from their wallets.
Blockchain Security Firms Confirm Stolen Amount
Although Balancer Protocol did not disclose the extent of the loss, blockchain security firms quickly tracked the hacker’s activities. PeckShield shared screenshots on Twitter showing that the hacker had stolen $238,000 worth of cryptocurrency. Another firm, ZachXBT, confirmed the transfer of stolen funds.
Smart Contract Remains Secure
Fortunately, the attacker only breached the front-end website and did not compromise the project’s smart contract. The platform representative, Cosme Fulanito, assured users of the vault’s 100% security.
User Warns About Scam Transaction
A victim of the hack warned others on Twitter about a scam transaction that occurs when users open the compromised website and are prompted to change their chain. After confirmation, their money disappears.
Balancer Protocol Highlights Need for Better Security Practices
This second attack on Balancer Protocol emphasizes the urgent need for improved security practices in DeFi projects. According to a report by PeckShield, DeFi firms lost nearly half a billion dollars in the first half of 2023, with Ethereum being the most affected blockchain.
Hot Take: Balancer Protocol Falls Victim to Second Hack in Less Than a Month
Balancer Protocol has once again fallen victim to a hack, this time targeting its front-end website. While the exact amount of stolen funds remains undisclosed, blockchain security firms have tracked the hacker’s activities. Fortunately, the project’s smart contract remains secure, ensuring the safety of users’ funds. However, this incident highlights the pressing need for better security practices within the DeFi space. With significant losses already incurred by various DeFi firms, it is crucial for protocols to strengthen their defenses and protect users’ assets from cybercriminals.