🚀 #GateNewbieVillageEpisode5 ✖️ @Surrealist5N1K
💬 Stay clear-headed in a bull market, calm in a bear market.
Share your trading journey | Discuss strategies | Grow with the Gate Family
⏰ Event Time: Nov 5 10:00 – Nov 12 26:00 UTC
How to Join:
1️⃣ Follow Gate_Square + @Surrealist5N1K
2️⃣ Post on Gate Square with the hashtag #GateNewbieVillageEpisode5
3️⃣ Share your trading experiences, insights, or growth stories
— The more genuine and insightful your post, the higher your chance to win!
🎁 Rewards
3 lucky participants → Gate X RedBull Cap + $20 Position Voucher
If delivery is unavailable, th
Another DeFi protocol hacked? Lending protocol Moonwell suspected of being attacked by hackers, with losses exceeding $1 million
DeFi Lending Protocol Moonwell Reportedly Under Hacker Attack Today (4th Afternoon)
Security agencies BlockSec and CertiK issued alerts simultaneously, indicating that the protocol was targeted by a flash loan attack due to abnormal oracle prices, resulting in a loss of over $1 million.
(Background: Cross-chain bridge Garden Finance was hacked, losing approximately $5.5 million, with an official offering a 10% bounty for hackers to return the funds.) (Additional context: The veteran DeFi protocol Balancer has experienced six security incidents over five years, with total losses exceeding hundreds of millions of dollars.)
The decentralized lending protocol Moonwell, built on the Base and Optimism chains, was reportedly attacked this afternoon (4th). Security monitoring agencies BlockSec Phalcon and CertiK issued alerts earlier today, pointing out that the protocol’s smart contracts were subjected to a series of suspicious transactions. Current estimates indicate losses exceeding $1 million.
BlockSec Phalcon First Alerts: MEV Bots Suspected of Automated Attack
BlockSec Phalcon posted on X today:
Alert! Our system detected a series of suspicious transactions targeting @MoonwellDeFi’s smart contracts on #Base and #Optimism.
Analysis shows an issue with the off-chain oracle’s token price feed (rsETH / ETH), which was exploited—possibly by a MEV bot—leading to losses over $1 million. The prices used by the protocol appear to have been incorrectly updated.
BlockSec Phalcon emphasized that they are currently unable to contact the Moonwell team directly and urged users to stay vigilant.
CertiK Reveals Attack Details: Borrowed 0.02 with 20x Leverage
Following this, the well-known blockchain security firm CertiK also issued a detailed alert:
We detected multiple exploit transactions on @MoonwellDeFi’s lending contracts. The attacker was able to repeatedly borrow over 20 wstETH with only about 0.02 wrstETH borrowed via flashloan and deposited, due to a faulty oracle reporting wrstETH prices as high as approximately $5.8 million, ultimately earning 295 ETH (about $1 million).
#CertiKInsight
We have detected multiple exploit transactions on @MoonwellDeFi lending contract. The exploiter was able to repeatedly borrow over 20 wstETH with only ~0.02 wrstETH flashloaned and deposited due to the faulty oracle that returns wrstETH price of ~5.8 million dollars, and… pic.twitter.com/130RHsUe4J — CertiK Alert )@CertiKAlert November 4, 2025
Not the First Crisis: Moonwell’s Security Record Adds Another Incident
In fact, Moonwell has faced multiple security challenges in the past, but this incident is the most severe recently. Specifically, in December 2024, Moonwell was targeted by a flash loan attack resulting in approximately $320,000 USDC in losses; in January 2024, following the Nomad bridge hack, the protocol faced a $2.3 million US dollar bad debt issue in the FRAX pool.
At the time of writing, Moonwell’s official response has not yet been released. The community is calling on the team to suspend related lending pools immediately and initiate an investigation. Participants in DeFi are advised to review their wallet activity to prevent further losses.
Related Reports:
This article was originally published on BlockTempo, a leading blockchain news media outlet.