DeFi protocol Abracadabra lost $1.8 million after an attacker exploited a simple logic mistake in its batch function. Analysts at Hacken say the attacker already laundered funds via Tornado Cash. In early October, Abracadabra, a DeFi lending protocol that lets…DeFi protocol Abracadabra lost $1.8 million after an attacker exploited a simple logic mistake in its batch function. Analysts at Hacken say the attacker already laundered funds via Tornado Cash. In early October, Abracadabra, a DeFi lending protocol that lets…

Abracadabra $1.8m hack repeats earlier fork flaw, Hacken reveals

2025/10/09 20:38
4 min read

DeFi protocol Abracadabra lost $1.8 million after an attacker exploited a simple logic mistake in its batch function. Analysts at Hacken say the attacker already laundered funds via Tornado Cash.

Summary
  • Abracadabra lost almost $2 million after an attacker exploited a simple logic mistake in its batch function, similar to an attack on a forked project days earlier.
  • The attacker bypassed a safety flag meant to check if borrowers had enough collateral and drained six Cauldrons in one go before swapping the stolen MIM for ETH and routing it through Tornado Cash.
  • This isn’t the first time Abracadabra’s code has been targeted, but the incident highlights how a small unimplemented function can let hackers take advantage, even when the same flaw was visible in a fork.

In early October, Abracadabra, a DeFi lending protocol that lets people borrow its stablecoin MIM using deposited tokens as collateral and suffered multiple hacker attacks before, this time once again lost about $1.8 million after an attacker used a simple logic mistake in the protocol’s batch function to borrow without putting up any collateral, in the same way a forked project had been hit just days before, analysts at blockchain security firm Hacken said in a research note shared with crypto.news.

Abracadabra launched as a way for people to use interest-bearing tokens as collateral and borrow a U.S. dollar-pegged token called Magic Internet Money, or MIM. The system is built around two pieces: Cauldrons, which handle the borrowing rules, and DegenBox, the shared vault that actually holds tokens. In short: you put up collateral in a Cauldron, and the DegenBox keeps track of the money behind the scenes.

The short version of what went wrong is this: a safety flag that’s supposed to force a final check on whether a borrower actually has collateral got turned off inside a single transaction. As Hacken’s report lays out, the attacker “exploited a logic flaw in Abracadabra’s cook() function where they could borrow MIM tokens and then immediately reset the validation flag that was supposed to check if they had enough collateral.” That allowed a one-shot, uncollateralized borrow across multiple Cauldrons.

Under the microscope

Here’s how the flow worked, in plain terms. Abracadabra uses a batched function called cook() so users can do several actions in one transaction. Say, deposit collateral and borrow in the same click. One of those actions, like the “borrow” step, sets a flag named needsSolvencyCheck to true, meaning “at the end of this transaction, check that the borrower is safe.”

Abracadabra $1.8m hack repeats earlier fork flaw, Hacken reveals - 1

But another action that can be run inside the same batch calls “_additionalCookAction(…).” As Hacken points out, that function was declared as “virtual” and never was implemented, so by default it returned an empty object where everything was set to false, including that needsSolvencyCheck flag.

As a result, the attacker called the borrow action, then called the default action that reset the flag, and at the end, the protocol never checked solvency.

The analysts say the attacker hit six Cauldrons in one go, taking roughly 1.79 million MIM and swapping it for ETH. Attackers exploited vulnerability, and systematically went through six different Cauldrons and drained each one “using the same technique with a dedicated cook function call,” the analysts explained.

Abracadabra $1.8m hack repeats earlier fork flaw, Hacken reveals - 2

After swapping, the attacker routed funds through Tornado Cash, a crypto mixing protocol, mostly 10 ETH each, sending gradually over the following day.

And this isn’t the first time Abracadabra’s CauldronV4 code has been involved in trouble. Other incidents earlier this year used different edge cases in the same family of contracts. What’s interesting now is how fast the forked deployment reacted.

According to the report, a fork called Synnax paused or un-whitelisted its CauldronV4 master on its own DegenBox days before the Abracadabra drain, so basically the fork team pulled the emergency brake after spotting the same weak pattern, suggesting that the risk was visible to teams watching the code, if not fixed.

Market Opportunity
DeFi Logo
DeFi Price(DEFI)
$0.00027
$0.00027$0.00027
-10.89%
USD
DeFi (DEFI) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Shiba Inu Faces Growing Risks as Leadership Instability Concerns Holders

Shiba Inu Faces Growing Risks as Leadership Instability Concerns Holders

TLDR Shiba Inu faces growing risks due to leadership instability and the absence of its lead developer, Shytoshi Kusama. The lack of identifiable leadership raises trust issues, hindering Shiba Inu’s ability to attract institutional investors. Shibarium’s transaction volume has significantly declined, sparking concerns about its ability to support decentralized finance (DeFi) growth. A recent $3 [...] The post Shiba Inu Faces Growing Risks as Leadership Instability Concerns Holders appeared first on CoinCentral.
Share
Coincentral2025/09/18 06:14
Vitalik: Staking means defending the blockchain, and there will inevitably be resistance when exiting

Vitalik: Staking means defending the blockchain, and there will inevitably be resistance when exiting

PANews reported on September 18th that in response to the discussion about the waiting time for staking, Ethereum co-founder Vitalik Buterin said: "Staking means taking on the solemn responsibility of defending the blockchain. Exit resistance is part of the protocol. This is not to say that the current staking queue design is optimal, but to say that if the relevant parameter settings are naively reduced, the credibility of the chain will be greatly reduced from the perspective of those nodes that are not often online." Data from the validatorqueue website shows that as of now, the number of ETH in the Ethereum PoS network exit queue is 2,496,141, with a waiting time of approximately 43 days and 8 hours. During the same period, the number of ETH waiting to be activated is 464,626, with an estimated activation delay of approximately 8 days and 2 hours.
Share
PANews2025/09/18 07:39
Why PEPE May Become the Most Important Meme Coin of This Cycle

Why PEPE May Become the Most Important Meme Coin of This Cycle

Pepe has moved back into focus during a period when the wider crypto market feels slow and uncertain. Conversation around PEPE price now centers on long-term relevance
Share
Captainaltcoin2026/02/11 16:00