MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Font ResizerAa
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Reading: Checkpoint Details on How Attackers Drained $128M from Balancer Pools Within 30 Minutes
Share
Font ResizerAa
MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Search
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Have an existing account? Sign In
Follow US
© Market Alert News. All Rights Reserved.
  • bitcoinBitcoin(BTC)$66,010.00-3.56%
  • ethereumEthereum(ETH)$1,991.01-2.70%
  • tetherTether(USDT)$1.00-0.01%
  • binancecoinBNB(BNB)$609.80-2.46%
  • rippleXRP(XRP)$1.32-1.58%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$82.69-3.33%
  • tronTRON(TRX)$0.3101380.28%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.031.47%
  • dogecoinDogecoin(DOGE)$0.090017-1.22%
Blockchain Security

Checkpoint Details on How Attackers Drained $128M from Balancer Pools Within 30 Minutes

Last updated: November 6, 2025 8:45 pm
Published: 5 months ago
Share

On November 3, 2025, blockchain security monitoring systems detected a sophisticated exploit targeting Balancer V2’s ComposableStablePool contracts.

An attacker executed a precision loss vulnerability to drain $128.64 million across six blockchain networks in under 30 minutes.

The attack leveraged a rounding error in the _upscaleArray function combined with carefully crafted batchSwap operations, allowing the attacker to artificially suppress BPT (Balancer Pool Token) prices and extract value through repeated arbitrage cycles.

The exploitation occurred primarily during smart contract deployment, with the attacker’s constructor executing over 65 micro-swaps that compounded precision loss to devastating effect.

This incident represents a watershed moment for DeFi security, demonstrating how mathematical vulnerabilities in core protocol functions can be weaponized through automation and precise parameter tuning.

The attack’s sophistication lay not in exploiting a novel vulnerability type, but in recognizing how negligible rounding errors become catastrophic when amplified through dozens of operations in atomic transactions.

Check Point researchers noted that the attack exploited a fundamental weakness in how Balancer’s ComposableStablePools handle small-value swaps.

When token balances are pushed to specific rounding boundaries, particularly the 8-9 wei range, Solidity’s integer division causes significant precision loss.

The researchers identified that individual swaps produce negligible errors, but within a single batchSwap transaction containing 65 operations, these losses compound dramatically, creating exploitable arbitrage opportunities.

The attacker’s technical execution revealed a three-stage pattern repeated 65 times atomically. First, large BPT amounts were swapped for underlying tokens to push specific token balances to critical rounding boundaries.

Second, small swaps involving boundary-positioned tokens triggered precision loss through the _upscaleArray function’s mulDown operation, causing the invariant D (representing total pool value) to be underestimated and BPT price to drop artificially.

Third, the attacker purchased BPT at suppressed prices and immediately redeemed for underlying assets at full value, capturing the price discrepancy as profit.

Check Point analysts identified the exploit contract deployed at address 0x54B53503c0e2173Df29f8da735fBd45Ee8aBa30d operating with a sophisticated three-address structure designed for operational separation and fund management.

The vulnerability stemmed from the _upscaleArray function’s implementation, which performs integer division during balance scaling operations.

The mulDown function creates rounding errors that propagate directly to invariant calculations, ultimately determining BPT pricing.

The attacker’s constructor automatically executed the complete exploitation sequence targeting two Balancer pools simultaneously.

Analysis revealed 65 token transfers to Balancer’s Protocol Fees Collector, displaying characteristic patterns of iterative precision exploitation.

The stolen value accumulated in the contract’s internal balance through InternalBalanceChanged events: Pool 1 generated +4,623 WETH and +6,851 osETH, while Pool 2 contributed +1,963 WETH and +4,259 wstETH.

Following the initial theft, a secondary withdrawal function transferred the accumulated 6,586 WETH plus additional assets to the final recipient address.

This two-stage approach separated theft execution from fund extraction, demonstrating operational discipline and reducing detection surface during the critical exploitation window.

Read more on Cyber Security News

This news is powered by Cyber Security News Cyber Security News

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Like this:

Like Loading...

Related

Shenyu Reveals Massive $15B Bitcoin Seizure via Key Flaw
Wemade’s South Korean Won Stablecoin
Solana’s Growth Slows, While Ozak AI Surges Toward a $1 Target – Crypto Economy
MEXC Releases February Proof of Reserve Report, BTC Coverage Rises to 267%
Best Crypto Presales 2025: AlphaPepe Tops the List of High-Potential Launches – Crypto Economy

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Previous Article Experts Forecast MUTM’s 10x Growth Driven by V1 Protocol Success in Q4 2025
Next Article Economic Watch: How a tiny Chinese town spices up the world
© Market Alert News. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Prove your humanity


Lost your password?

%d