A recent exploit on the Balancer DeFi protocol’s v2 pools led to a staggering loss of over $128 million, underscoring persistent security challenges in the cryptocurrency landscape.
The Balancer decentralized finance (DeFi) protocol recently faced a significant attack. Its v2 pools were targeted, resulting in an estimated loss exceeding $128 million. Balancer, an automated market maker (AMM) built on Ethereum, confirmed the incident. Primarily, it hit the V2 Compostable Stable Pools. This attack highlights the ongoing security vulnerabilities within the DeFi sector, a constant magnet for large-scale cryptocurrency thefts.
Balancer officially confirmed the exploit at 7:48 AM UTC. They announced their v2 pools were targeted and issued warnings about potential scams and phishing attempts. The protocol’s team has stated they are actively collaborating with security researchers to grasp the full scope of the issue. They have also committed to releasing a comprehensive post-mortem report soon.
Unpacking the Attack: Theories on the Exploit
This exploit specifically impacted Balancer’s V2 Compostable Stable Pools. Notably, Balancer V3 pools and other V2 pools remained untouched. While Balancer has yet to release complete technical specifics, two main theories regarding the attack vector have emerged from the cybersecurity research community.
GoPlus Security suggested the exploit might have stemmed from a precision rounding error in the Vault’s swap calculations. This analysis posits that tiny discrepancies, caused by rounding down token amounts during each swap, could be compounded. Chaining multiple swaps using the batchSwap function would then lead to significant price distortions. The attacker then exploited these distortions.
An alternative theory, proposed by Aditya Bajaj, points to improper authorization and callback handling within Balancer’s V2 vaults. This perspective suggests a malicious contract was deployed to manipulate vault calls during pool initialization. This maneuver effectively circumvented security protocols, enabling unauthorized swaps and balance manipulations across interconnected pools. Despite these identified vulnerabilities, Balancer V2 has reportedly undergone 11 audits since 2021, with varying scopes, as noted by Suhail Kakar. That’s a lot of audits.
Broader Repercussions: The $128 Million Heist and Beyond
The most immediate impact of the incident is the theft of over $128 million in cryptocurrency. This makes it one of the largest cryptocurrency heists reported in recent times. Beyond the financial hit, the incident has undoubtedly shaken user trust in the security of DeFi protocols. This holds true even for those that have undergone multiple audits. Before the exploit, the Balancer BAL token held a market capitalization of approximately $65 million, according to CoinMarketCap. This indicates a substantial financial blow relative to its market valuation.
Adding insult to injury, a fraudulent message surfaced in the aftermath. Impersonating Balancer, this message offered the hacker a 20% white-hat bounty to return the stolen funds, as reported by PeckShieldAlert. This only complicated the situation further. Such fake messages create additional security risks for users who might fall victim to phishing attempts.
While no direct state-sponsored cyberwarfare attribution has been made for this specific incident, the broader context of large-scale financial cybercrime often associated with state actors remains critically relevant. For instance, cryptocurrency linked to North Korean thefts this year had already exceeded $2 billion as of October 3, 2025. This figure includes a staggering $1.5 billion Bybit attack reportedly attributed to the Lazarus Group, a detail highlighted by BleepingComputer. This contextual information underscores the persistent threat landscape for DeFi protocols. Well-resourced groups, often seeking to bypass sanctions or fund illicit operations, continuously target these platforms. It’s a high-stakes game.

