July 15, Arcadia Finance, a liquidity management platform for decentralized crypto exchanges, was exploited, resulting in a loss of about $3.6 million in crypto assets. The hackers targeted one of the platform’s key features, the rebalancer on the Base network.
On July 15 2025, Arcadia Finance, a liquidity management platform for decentralized crypto exchanges, was exploited, resulting in a loss of about $3.6 million in crypto assets. The hackers targeted one of the platform’s key features, the rebalancer on the Base network. A 10% reward will be granted if the information provided leads to the recovery of stolen funds. Anyone with relevant intel — including names, locations, or verifiable evidence — is encouraged to contact us.
July 14th 2025 - 09:22:03 AM UTC - Attacker Triggers Circuit Breakers
The presumed exploiter deployed 2 malicious contracts through address 0xeF35e80Bd9e806A47d468f25CD38a1e63541caB4
.
Contract 1: 0x87730d2c2A2D453d3E2248Fd7360D31FEf9c7f04
Contract 2: 0x35a717e88583B2CC1789912C92A57C202ae7d585
These contracts triggered the circuit breakers of the Arcadia Finance core protocol in real time when Contract 1 was deployed, thanks to a Hexagate alert. The protocol was fully paused at 09:22:13 AM UTC.
The team was notified straight away and assessed the deployed contracts by 0xeF35. Upon review by the core team, together with external security experts, these contracts in their current state were evaluated as very suspicious yet not harmful to the protocol and its users.
Simulations on forked networks were performed to mimic the state of the unpaused protocol and assess all possible function calls in the two contracts. No non-reverting actions were found and additional tests and deploy scripts to mimic these contracts were written to confirm additional vectors.
Simulations of all function calls on the malicious contracts in non-paused state:
https://www.tdly.co/shared/simulation/bf611343-ccdd-4684-acd9-3ec62c95239a
https://www.tdly.co/shared/simulation/a680d742-0225-4479-b4e7-b4bdceb43de8
https://www.tdly.co/shared/simulation/eb9a3f30-98aa-4308-8cf3-444080c6ccb5
After careful review the decision was made to unpause the majority of the protocol, keeping only borrows paused to mitigate any further attempts to exploit Arcadia lending pools.
July 14th 2025 - 13:05 AM UTC - Protocol Is Partially Unpaused
The unpause is executed, approximately 4 hours after the circuit breakers were triggered. After this unpause, the protocol remained locked for additional borrows, as the two deployed contracts had a vector entry into the lending pools. The team continued to write additional tests specific for any path these contracts touched.
The protocol pausing and unpausing played a significant role in the subsequent attack the next day. Arcadia is designed to be resilient against rogue developers and includes a mechanism to prevent developers from pausing the protocol indefinitely and locking all user funds. Only after a fixed “coolDownPeriod” can the protocol be paused again. During the “coolDownPeriod”, the protocol cannot be paused again, even if the circuit breaker is triggered by a new threat. The attacker used this mechanism to its advantage, his initial trigger of the circuit breakers acting as bait to lock the protocol into an unpaused state. This prevented the team from pausing the protocol, when the real attack began.
July 15th 2025 - 04:05 AM UTC - Attacker Starts His Exploit
At 04:05 AM July 15th, exploiter 0x0fa54E967a9CC5DF2af38BAbC376c91a29878615 began a series of transactions that led to the eventual exploit as detailed further.
The team was notified at 04:05 AM when the malicious contract was deployed thanks to a Hexagate alert. But even though this tried to trigger the circuit breakers, due to the pause-unpause limitation, the protocol could not be sufficiently paused to prevent stolen funds.
SEAL Alliance was contacted at 04:25 AM and our security partners where brought up to speed while the root cause was actively investigated.
At 04:25 AM, an initial message from the core team was sent on Discord urging users to revoke permissions to asset managers. Direct messages were sent to users of whom the core team knew their accounts might be at risk, followed by a general message on X at 04:57 AM.
The team decreased asset exposures to zero, causing the attackers current flow of exploit transactions to be momentarily halted. However, the attacker adapted his exploit transactions to circumvent this measure.
At 10:36 AM, an initial message was sent to the exploiter, offering a 10% white-hat bounty upon returning the funds within 24 hours, and offering a public bounty for that amount after.
The exploiter currently holds $3.6m in ETH, on ETH Mainnet and Base.
The exploit worked as follows:
The attacker created a number of Arcadia Accounts, which were used as his attack base. https://basescan.org/tx/0xeb1cbbe6cf195d7e23f2c967542b70031a220feacca010f5a35c0046d1a1820a
The attacker then combined a series of functions in a flashaction to interact with his Accounts, with the Rebalancer contracts and with Morpho:
https://dashboard.tenderly.co/tx/0x06ce76eae6c12073df4aaf0b4231f951e4153a67f3abc1c1a547eb57d1218150 Example transaction
The Attack in more detail.
The root cause of the exploit is the fact that the malicious attacker could hijack the msg.sender of the Asset Manager to call a target Arcadia Account, who had set the Asset Manager as allowed asset manager.
To mitigate this vulnerability, a check should have been performed that the router is not an Arcadia Account. Or even better, the swap via a router should have been called from an intermediate smart contract, that has no permissions anywhere on Arcadia Contracts.