The post USPD stablecoin hack reveals clandestine proxy attack appeared on BitcoinEthereumNews.com. Investigators are still piecing together how the USPD stablecoin protocol was drained, as fresh on-chain data and security analyses continue to emerge. Over $1 million in liquidity drained from USPD The decentralized finance protocol US Permissionless Dollar suffered a severe security breach that enabled unauthorized stablecoin minting and the loss of more than $1 million in liquidity. According to an incident report shared on the protocol team’s official X account, the attacker deposited roughly 3,122 ETH as collateral on the platform. The report noted that the exploiter then used this collateral to trigger a bug that allowed them to mint approximately 98 million USPD tokens in a single transaction. Moreover, the faulty logic generated around ten times the appropriate token amount against the original deposit, massively inflating supply and breaking the system’s economic assumptions. This process also gave the attacker a path to drain an additional 237 stETH from the protocol’s collateral pools. The stolen stablecoins were then converted into about $300,000 worth of USDC via the decentralized exchange Curve, in what security analysts described as a rapid liquidity exit. However, most of the minted tokens remain a focus of ongoing stolen funds tracing efforts. USPD developers and several cybersecurity monitoring accounts, including PeckShield Alert, quickly warned users once the exploit was confirmed. The team urged community members: “Please DO NOT buy USPD. Revoke all approvals immediately,” stressing that the protocol had suffered both liquidity draining and major governance compromise. Clandestine proxy attack method used in the breach The protocol’s technical report said the breach relied on a complex vector called CPIMP, short for Clandestine Proxy In the Middle of Proxy. USPD explained that the attacker front-ran the proxy initialization during deployment on September 16, using a Multicall3 transaction to slip malicious steps into the setup. Using this method, the… The post USPD stablecoin hack reveals clandestine proxy attack appeared on BitcoinEthereumNews.com. Investigators are still piecing together how the USPD stablecoin protocol was drained, as fresh on-chain data and security analyses continue to emerge. Over $1 million in liquidity drained from USPD The decentralized finance protocol US Permissionless Dollar suffered a severe security breach that enabled unauthorized stablecoin minting and the loss of more than $1 million in liquidity. According to an incident report shared on the protocol team’s official X account, the attacker deposited roughly 3,122 ETH as collateral on the platform. The report noted that the exploiter then used this collateral to trigger a bug that allowed them to mint approximately 98 million USPD tokens in a single transaction. Moreover, the faulty logic generated around ten times the appropriate token amount against the original deposit, massively inflating supply and breaking the system’s economic assumptions. This process also gave the attacker a path to drain an additional 237 stETH from the protocol’s collateral pools. The stolen stablecoins were then converted into about $300,000 worth of USDC via the decentralized exchange Curve, in what security analysts described as a rapid liquidity exit. However, most of the minted tokens remain a focus of ongoing stolen funds tracing efforts. USPD developers and several cybersecurity monitoring accounts, including PeckShield Alert, quickly warned users once the exploit was confirmed. The team urged community members: “Please DO NOT buy USPD. Revoke all approvals immediately,” stressing that the protocol had suffered both liquidity draining and major governance compromise. Clandestine proxy attack method used in the breach The protocol’s technical report said the breach relied on a complex vector called CPIMP, short for Clandestine Proxy In the Middle of Proxy. USPD explained that the attacker front-ran the proxy initialization during deployment on September 16, using a Multicall3 transaction to slip malicious steps into the setup. Using this method, the…

USPD stablecoin hack reveals clandestine proxy attack

2025/12/06 01:53

Investigators are still piecing together how the USPD stablecoin protocol was drained, as fresh on-chain data and security analyses continue to emerge.

Over $1 million in liquidity drained from USPD

The decentralized finance protocol US Permissionless Dollar suffered a severe security breach that enabled unauthorized stablecoin minting and the loss of more than $1 million in liquidity. According to an incident report shared on the protocol team’s official X account, the attacker deposited roughly 3,122 ETH as collateral on the platform.

The report noted that the exploiter then used this collateral to trigger a bug that allowed them to mint approximately 98 million USPD tokens in a single transaction. Moreover, the faulty logic generated around ten times the appropriate token amount against the original deposit, massively inflating supply and breaking the system’s economic assumptions.

This process also gave the attacker a path to drain an additional 237 stETH from the protocol’s collateral pools. The stolen stablecoins were then converted into about $300,000 worth of USDC via the decentralized exchange Curve, in what security analysts described as a rapid liquidity exit. However, most of the minted tokens remain a focus of ongoing stolen funds tracing efforts.

USPD developers and several cybersecurity monitoring accounts, including PeckShield Alert, quickly warned users once the exploit was confirmed. The team urged community members: “Please DO NOT buy USPD. Revoke all approvals immediately,” stressing that the protocol had suffered both liquidity draining and major governance compromise.

Clandestine proxy attack method used in the breach

The protocol’s technical report said the breach relied on a complex vector called CPIMP, short for Clandestine Proxy In the Middle of Proxy. USPD explained that the attacker front-ran the proxy initialization during deployment on September 16, using a Multicall3 transaction to slip malicious steps into the setup.

Using this method, the exploiter silently seized administrative privileges before the deployment scripts had fully executed. That said, instead of acting immediately, they waited for months before starting to mint coins without authorization. The attacker deployed a “shadow” implementation contract that forwarded all calls to USPD’s audited code, masking the malicious changes behind a familiar interface.

Within this hidden implementation, the attacker gradually introduced event payload manipulation and storage slot spoofing. This combination deceived Etherscan into displaying the original audited contract, even though the live proxy pointed to their own backdoored logic. This camouflage, USPD said, “allowed the attacker to hide in plain sight for months, bypassing verification tools and manual checks” and finally upgrade the proxy, mint about 98M USPD and drain roughly 232 stETH.

A blockchain analyst later echoed the protocol team’s breakdown of the incident. According to their post, flawed proxy initialization during deployment opened the door: the exploiter claimed admin rights, installed the shadow implementation, and used metadata spoofing so block explorers kept showing the supposedly safe audited contract. However, behind that facade, the cpimp exploit details made clear that privileged minting logic had been subverted.

USPD launches investigation and opens talks with attacker

In the immediate aftermath, USPD said it is working with law enforcement agencies and whitehat security groups to track the money trail and freeze assets where possible. “We have flagged the attacker’s addresses with all major CEXs and DEXs to freeze the flow of funds,” the team wrote, signaling a coordinated response to the uspd protocol hack.

At the same time, the protocol signaled willingness to pursue a bug bounty negotiation instead of a purely punitive route. It publicly offered to settle if the attacker returns the funds, minus a standard 10% bug bounty. Moreover, USPD pledged to halt all law enforcement action if the exploiter accepts and either contacts the team directly or returns 90% of the stolen assets on-chain.

The protocol’s statement to its community reflected both frustration and determination. “We are devastated that despite rigorous audits and adherence to best practices, we fell victim to this emerging and highly complex attack vector. We are doing everything in our power to recover assets,” USPD said, describing the case as a stark warning about the evolving sophistication of clandestine proxy attack techniques.

According to CoinMarketCap, the protocol’s native USPD stablecoin has so far maintained its intended peg to the U.S. dollar. However, trading activity has weakened notably, with 24-hour volume dropping by 20% to around $2.56 million. Analysts note that secondary liquidity stresses could still appear if confidence erodes further.

Other DeFi protocols still recovering from November exploits

The USPD incident comes as multiple decentralized finance platforms are still recovering from their own serious breaches. Last Monday, Yearn Finance disclosed an exploit affecting its liquid-staking index token yETH, in which the attacker minted what was effectively an unlimited number of tokens and stole about $3 million in ETH.

Yearn Finance had already endured a separate $9 million exploit in its yETH stableswap pool on November 30. However, the team has begun to claw back capital. So far, it has successfully recovered around $2.39 million, which is earmarked to be returned to affected depositors as part of a structured remediation plan.

Another DeFi project, Balancer, is also in recovery mode after a v2 breach that caused losses of roughly $128 million. The protocol has announced plans to reimburse approximately $8 million to liquidity providers. Moreover, these high-profile cases, combined with the USPD exploit, are reinforcing calls for more robust proxy initialization procedures and on-chain verification standards across the sector.

Overall, the USPD hack underscores how advanced proxy-based exploits, complex deployment races, and liquidity draining strategies are reshaping the risk profile for DeFi stablecoin protocols, even when they have undergone rigorous audits.

Source: https://en.cryptonomist.ch/2025/12/05/uspd-stablecoin-proxy-attack/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Missed Bitcoin’s ICO? BullZilla’s Explosive Stage 13 Surge Is Your Second Shot

Missed Bitcoin’s ICO? BullZilla’s Explosive Stage 13 Surge Is Your Second Shot

The post Missed Bitcoin’s ICO? BullZilla’s Explosive Stage 13 Surge Is Your Second Shot appeared on BitcoinEthereumNews.com. Crypto Projects Bitcoin early believers made millions, and BullZilla Stage 13 is giving a new chance for those hunting the best crypto presales to buy with explosive ROI potential. Do cryptocurrency opportunities really come twice, or does lightning only strike once for those hunting the best crypto presales to buy? The world still talks about Bitcoin’s earliest days when the price hovered near pennies, and only a small circle of curious technophiles understood what was coming. Those early believers stacked thousands of coins when the market barely noticed them. Today, that tiny window sits in history as proof that early entries can build life-changing gains. Bitcoin’s rise from cents to tens of thousands of dollars remains the most prominent example of missed fortunes in the digital asset world. The story now moves into a new chapter as BullZilla climbs through its presale with a setup that feels familiar to anyone who watched Bitcoin explode long after ignoring it at the bottom. With the presale live, BullZilla brings a structure that pulls in traders searching for the best crypto presales to buy while regret-filled communities ask whether this could be their redemption moment. Stage 13 Zilla Sideways Smash shows the project heating up and attracting attention from those who once wished for a second chance at early prices before the next massive wave takes off. BullZilla Presale at a glance Stage: Stage 13 (Zilla Sideways Smash) Phase: 3 Current Price: $0.00033905 Presale Tally: Over $1M+ Raised  Token Holders: Over 3700 Tokens Sold: Over 32 B  Current ROI: ($1,454.75% ) from Stage 13C to the Listing Price of $0.00527 ROI until Stage 13C for the Earliest Joiners: $5,796.52% $1000 Investment =2.949 million $BZIL Tokens Upcoming Price Surge = 1.96% increase in 13D from 0.00033905 to 0.00034572 Join the BullZilla presale now while…
Share
BitcoinEthereumNews2025/12/10 07:15
US SEC Chairman: Many types of cryptocurrency ICOs are not under the SEC's jurisdiction.

US SEC Chairman: Many types of cryptocurrency ICOs are not under the SEC's jurisdiction.

PANews reported on December 10th, citing The Block, that SEC Chairman Paul Atkins stated at the Blockchain Association's annual policy summit on Tuesday that many types of Initial Coin Offerings (ICOs) should be considered non-securities transactions and are outside the jurisdiction of Wall Street regulators. He explained that this is precisely what the SEC wants to encourage, as these types of transactions, by their definition, do not fall under the category of securities. Atkins specifically mentioned the token taxonomy he introduced last month, which divides the crypto industry into four categories of tokens. He pointed out last month that network tokens, digital collectibles, and digital instruments should not be considered securities in themselves. On Tuesday, he further stated that ICOs involving these three types of tokens should also be considered non-securities transactions, meaning they are not subject to SEC regulation. Atkins also mentioned that, regarding initial coin offerings (ICOs), the SEC believes the only type of token it should regulate is tokenized securities, which are tokenized forms of securities already under SEC regulation and traded on-chain. He further explained that ICOs span four themes, three of which fall under the jurisdiction of the CFTC. The SEC will delegate these matters to the CFTC, while focusing on regulating tokenized securities.
Share
PANews2025/12/10 07:16
China Blocks Nvidia’s RTX Pro 6000D as Local Chips Rise

China Blocks Nvidia’s RTX Pro 6000D as Local Chips Rise

The post China Blocks Nvidia’s RTX Pro 6000D as Local Chips Rise appeared on BitcoinEthereumNews.com. China Blocks Nvidia’s RTX Pro 6000D as Local Chips Rise China’s internet regulator has ordered the country’s biggest technology firms, including Alibaba and ByteDance, to stop purchasing Nvidia’s RTX Pro 6000D GPUs. According to the Financial Times, the move shuts down the last major channel for mass supplies of American chips to the Chinese market. Why Beijing Halted Nvidia Purchases Chinese companies had planned to buy tens of thousands of RTX Pro 6000D accelerators and had already begun testing them in servers. But regulators intervened, halting the purchases and signaling stricter controls than earlier measures placed on Nvidia’s H20 chip. Image: Nvidia An audit compared Huawei and Cambricon processors, along with chips developed by Alibaba and Baidu, against Nvidia’s export-approved products. Regulators concluded that Chinese chips had reached performance levels comparable to the restricted U.S. models. This assessment pushed authorities to advise firms to rely more heavily on domestic processors, further tightening Nvidia’s already limited position in China. China’s Drive Toward Tech Independence The decision highlights Beijing’s focus on import substitution — developing self-sufficient chip production to reduce reliance on U.S. supplies. “The signal is now clear: all attention is focused on building a domestic ecosystem,” said a representative of a leading Chinese tech company. Nvidia had unveiled the RTX Pro 6000D in July 2025 during CEO Jensen Huang’s visit to Beijing, in an attempt to keep a foothold in China after Washington restricted exports of its most advanced chips. But momentum is shifting. Industry sources told the Financial Times that Chinese manufacturers plan to triple AI chip production next year to meet growing demand. They believe “domestic supply will now be sufficient without Nvidia.” What It Means for the Future With Huawei, Cambricon, Alibaba, and Baidu stepping up, China is positioning itself for long-term technological independence. Nvidia, meanwhile, faces…
Share
BitcoinEthereumNews2025/09/18 01:37