Cryptopolitan
2026-01-07 14:30:52

Flow blames Cadence runtime type confusion vulnerability for $3.9M exploit

Flow published a post-incident report on January 6, 2026, discussing the root cause of its $3.9 million exploit. An attacker exploited a Cadence runtime type confusion vulnerability to forge tokens. Flow said no existing user balances were accessed or compromised. Flow identifies type confusion vulnerability as exploit root cause A type confusion vulnerability was found to be the primary cause by Flow. The vulnerability made it possible for the attacker to evade runtime safety checks by disguising a protected asset as a regular data structure. The attacker coordinated the execution of about 40 malicious smart contracts. The attack started at block height 137,363,398 on December 26, 2025, at 23:25 PST. Minutes after the first deployment, the production of counterfeit tokens started. The attacker used standard data structures that are replicable to disguise protected assets that ought to be uncopyable. By taking advantage of Cadence’s move-only semantics, this made token counterfeiting possible. Cadence and a fully EVM-equivalent environment are the two integrated programming environments run by Flow. In this instance, the exploit targeted Cadence. Network down within six hours of initial malicious transaction On December 27, at block height 137,390,190, flow validators started a coordinated network pause at 05:23 PST. All escape routes were cut off, and the halt occurred less than six hours after the initial malicious transaction. Counterfeit FLOW was being moved to centralized exchange deposit accounts by December 26 at 23:42 PST. Due to their size and irregularity, most of the large FLOW transfers that were sent to exchanges were frozen upon receipt. Beginning at 00:06 PST on December 27, a few assets were bridged off-network using Celer, deBridge, and Stargate. At 01:30 PST, the first detection signals were raised. At this point, exchange deposits were correlated with anomalous cross-VM FLOW movements. As counterfeit FLOW was liquidated beginning at 1:00 PST, centralized exchanges faced significant sell pressure. Exchanges return 484 million counterfeit FLOW tokens According to Flow , the attacker deposited 1.094 billion fake FLOW across several centralized exchanges. Exchange partners Gate.io, MEXC, and OKX returned 484,434,923 FLOW, which was destroyed. 98.7% of the remaining supply of counterfeit goods has been isolated onchain and is in the process of being destroyed. Complete resolution is anticipated in 30 days, and coordination with other exchange partners is still in progress. After the community evaluated several recovery options, including checkpoint restoration , the recovery strategy was chosen. Flow held ecosystem-wide consultations with infrastructure partners, bridge operators, and exchanges. Flow’s $3.9 million exploit happened within a similar pattern of security incidents affecting crypto protocols in late December 2025 and early January 2026. BtcTurk suffered a $48 million hot wallet breach on January 1, 2026. Hackers compromised the centralized exchange’s hot wallet infrastructure and siphoned funds across Ethereum, Arbitrum, Polygon and other chains. Binance experienced a market maker account manipulation incident on January 1 involving BROCCOLI token. Claim your free seat in an exclusive crypto trading community - limited to 1,000 members.

获取加密通讯
阅读免责声明 : 此处提供的所有内容我们的网站,超链接网站,相关应用程序,论坛,博客,社交媒体帐户和其他平台(“网站”)仅供您提供一般信息,从第三方采购。 我们不对与我们的内容有任何形式的保证,包括但不限于准确性和更新性。 我们提供的内容中没有任何内容构成财务建议,法律建议或任何其他形式的建议,以满足您对任何目的的特定依赖。 任何使用或依赖我们的内容完全由您自行承担风险和自由裁量权。 在依赖它们之前,您应该进行自己的研究,审查,分析和验证我们的内容。 交易是一项高风险的活动,可能导致重大损失,因此请在做出任何决定之前咨询您的财务顾问。 我们网站上的任何内容均不构成招揽或要约