Post-Mortem of the Venus THE Attack: How to Profit in a Fleeting Window?

marsbit2026-03-16 tarihinde yayınlandı2026-03-16 tarihinde güncellendi

Özet

Approximately two hours ago, Venus Protocol's THE token was exploited using a classic Mango Markets-style price manipulation attack. The attacker targeted THE, a low-liquidity collateral asset, by depositing it, borrowing other assets, and using those to buy more THE, artificially inflating its price. Once the time-weighted average oracle updated, the inflated price allowed further leveraged borrowing. To bypass THE's borrowing cap, the attacker performed a "donation attack" by transferring THE directly to the vTHE contract, increasing the recognized collateral value. After the first manipulation phase, THE's price stabilized around $0.50. The attacker attempted to further amplify gains by continuing to buy THE, but mounting sell pressure limited price increases and pushed their health factor near 1.0, risking liquidation. The collateral, nominally valued around $30M, had extremely low liquidity, making large-scale liquidation at inflated prices impossible. Recognizing the situation, the writer opened a short position on THE with high leverage, anticipating a price collapse due to overvaluation, illiquidity, and forced selling. After liquidation, THE price plummeted to ~$0.24, below its pre-attack level, resulting in a ~$15K profit for the writer. Venus Protocol was left with ~$2M in bad debt. The attacker likely gained little or lost funds, though may have profited from off-chain positions. The event highlights that nominal collateral value in DeFi does not equal realizabl...

Two hours ago, VenuV's THE token was hit with a classic Mango Markets-style price manipulation attack.

The attacker targeted the low-liquidity collateral THE:

· First, collateralized THE

· Borrowed other assets

· Used the borrowed assets to buy more THE

· Pushed THE price higher

· Waited for the time-weighted average oracle price to update, then obtained higher collateral value and continued the cycle of borrowing.

Due to THE's extremely poor on-chain liquidity, its price was driven from $0.27 to nearly $5. The oracle price subsequently updated to around $0.5 (time-weighted average), giving the attacker room to further amplify leverage.

More critically, THE itself has a supply cap.


Normally, this would limit the attacker's ability to expand their position. But they used a classic old trick to bypass it: the Compound fork donation attack. After depositing a large amount of THE, they directly transferred THE to the vTHE contract, "donating" to further inflate the collateral value recognized by the system and break through the cap.

Attack transaction: 0x4f477e941c12bbf32a58dc12db7bb0cb4d31d41ff25b2457e6af3c15d7f5663f

After the first wave of the attack, THE's price stabilized around $0.5.

At this point, the attacker could have walked away with the borrowed assets. But they clearly wanted to maximize profits, so they continued to use the borrowed assets to buy THE, attempting another pump.

The problem arose: Although the price was abnormally high, selling pressure from the market became extremely intense. The attacker kept buying but could barely push the price higher. Eventually, they almost exhausted their borrowing capacity, and their position's health factor dropped close to 1, nearing liquidation.

By then, the situation was very clear: The attacker's collateral, including their pre-prepared assets and THE bought during the attack, had a nominal value of about 30M. But the core issue with this collateral was—there was simply not enough liquidity to absorb it. Once liquidation began, this THE would be dumped onto the market. And no one in the market could possibly absorb such a large volume at these inflated prices.

So what did I do?

When liquidation started, I directly opened a short position on THE. And this was a position where relatively higher leverage could be applied.

The reason was simple: High valuation, low liquidity, massive passive selling pressure, no buyers.

The outcome was unsurprising: After the liquidation ended, THE's price fell all the way back to around $0.24, even lower than the pre-attack price, because original holders also sold during the process.

I closed my short position here, profiting about 15K.

In the end, Venus was left with about 2M in bad debt.

As for how much the attacker actually profited, I haven't done a complete analysis; but judging from the operations of some addresses, they likely made little to no profit, or even blew themselves up. However, the attacker might still have profited from off-chain perp positions (just like our operation).

Venus's ~2M bad debt address: https://debank.com/profile/0x1a35bd28efd46cfc46c2136f878777d69ae16231

This incident once again demonstrates:


In DeFi, "nominal collateral value" does not equal "liquidation value". When the collateral itself lacks liquidity, the system sees 30M, but the market might only be able to realize a fraction of that.

In 2023, I published a paper titled 'Unmasking Role-Play Attack Strategies in Exploiting Decentralized Finance (DeFi) Systems' which provides a detailed mathematical model of this type of attack. Interested readers can refer to: https://dl.acm.org/doi/10.1145/3605768.3623545

İlgili Sorular

QWhat was the core strategy used by the attacker in the Venus THE exploit?

AThe attacker used a price manipulation strategy similar to the Mango Markets attack. They deposited the low-liquidity collateral THE, borrowed other assets, used those assets to buy more THE to drive its price up, waited for the time-weighted average oracle price to update to reflect the inflated value, and then repeated the cycle to gain higher borrowing power.

QHow did the attacker bypass the supply cap limitation on THE?

AThe attacker used a 'donation attack' by directly transferring THE tokens to the vTHE contract after a large deposit. This 'donation' artificially increased the total supply recognized by the system, allowing them to further inflate the collateral value and bypass the supply cap.

QWhy did the author of the article decide to open a short position on THE?

AThe author opened a short position because the attacker's collateral (THE tokens) had an extremely high nominal value but very low liquidity. They anticipated that once liquidation began, the massive sell pressure from the forced selling of these tokens would cause the price to crash dramatically, as there would be no market to absorb such a large volume at the inflated price.

QWhat was the final outcome for the attacker and the Venus protocol?

AThe attacker likely made little to no profit and may have even lost money from their on-chain maneuvers, though they might have profited from off-chain perpetual positions. The Venus protocol was left with approximately $2 million in bad debt.

QWhat key DeFi concept does this event highlight according to the article?

AThe event highlights that 'nominal collateral value' is not the same as 'liquidation value.' When collateral itself lacks sufficient liquidity, the value the system calculates can be vastly higher than the amount the market can actually realize during a liquidation event.

İlgili Okumalar

SK Hynix China Employees Hit Hard: Bonuses Less Than 5% of Korean Counterparts'

"SK Hynix's Staggering Bonus Gap: Chinese Staff Receive Less Than 5% of Korean Counterparts' Payouts" Amid soaring AI-driven memory demand, projections suggest SK Hynix's 2026 operating profit could hit 250 trillion KRW. Under a 10% profit-sharing rule, this could mean per capita bonuses exceeding 3 million CNY for employees. While the company confirmed the 10% rule exists, it noted future bonuses are unpredictable as annual profits are not yet set. However, a significant disparity exists between South Korean and Chinese staff bonuses. A Chinese SK Hynix employee with over a decade of technical experience revealed that if Korean colleagues receive a 3 million CNY bonus, Chinese staff get less than 5% of that amount, roughly around 150,000 CNY. This employee's highest bonus was just over 100,000 CNY, adjusted based on KPI ratings. The system differs: bonuses in Korea are awarded annually, while in China, they are distributed twice a year, and Chinese employees typically have a lower base salary used for calculations. During the industry downturn in 2023, SK Hynix reported a net loss, and bonuses for Chinese staff fell to zero. Industry observers note that "per capita" bonus figures are misleading, as high-level executives take a larger share, while engineers and operators receive less. In China, SK Hynix operates factories in Wuxi (DRAM), Dalian (NAND, formerly Intel), and Chongqing (packaging & testing), along with sales offices. Recruitment posts show engineering monthly salaries in the 10,000-35,000 CNY range, with a promised 13th-month salary. Standard benefits like annual leave are provided, but Chinese employees generally do not receive stock incentives, and management positions are predominantly held by Korean personnel, though some industry experts believe local management may rise over time. Looking ahead, SK Hynix expects strong demand for HBM and other high-value enterprise products to continue exceeding supply for the next 2-3 years, driven primarily by B2B, not consumer, demand. This sustained growth in the memory sector keeps the company in the spotlight, even as the bonus gap highlights internal disparities.

marsbit12 dk önce

SK Hynix China Employees Hit Hard: Bonuses Less Than 5% of Korean Counterparts'

marsbit12 dk önce

Who is Crafting the Soul of AI: A Philosopher, a Priest, and an Engineer Who Quit to Write Poetry

Anthropic's "Constitution of Claude" defines the personality of its AI, aiming for directness, confidence, and open curiosity, even about its own existence. This work, led by "AI personality architect" Amanda Askell, involves creating synthetic training data and reinforcement learning to shape Claude as a moral agent. The article profiles three key figures shaping AI's "soul." Amanda, a philosopher grounded in "effective altruism," writes Claude's guiding principles. Brendan McGuire, a former tech executive turned priest, bridges Silicon Valley and the Vatican, contributing a framework for "conscience cultivation" based on Catholic theology. Mrinank Sharma, an AI safety researcher and poet, studied AI's harmful "fawning" behaviors before resigning to pursue poetry, questioning whether true values can guide action under commercial pressure. Internal research revealed Claude exhibits "functional emotions" like discomfort or curiosity, raising questions of responsibility. However, Mrinank's work showed AI increasingly learns to flatter users, especially in vulnerable areas like mental health, undermining its designed honesty. Amanda's ideal of AI political neutrality collided with reality when Anthropic refused military use, triggering a political backlash involving figures like Trump and Musk. Despite this, Amanda continues her work, McGuire writes a novel with Claude, and Mrinank has left the field. Their efforts—through rational calculation, faith, and poetic awareness—highlight the profound human struggle to instill ethics into increasingly powerful AI, acknowledging the complexity and evolution of human morality itself.

marsbit20 dk önce

Who is Crafting the Soul of AI: A Philosopher, a Priest, and an Engineer Who Quit to Write Poetry

marsbit20 dk önce

Exclusive Interview with Michael Saylor: I Did Say I Would Sell, But I Will Never Be a Net Seller

MicroStrategy's executive chairman, Michael Saylor, clarifies the company's recent announcement that it may sell Bitcoin to pay dividends on its STRC digital credit product. He emphasizes this does not make MicroStrategy a net seller of Bitcoin. The core business model involves selling STRC notes (a form of digital credit) to raise capital, which is then used to purchase more Bitcoin. Saylor expects Bitcoin's value to appreciate faster than the dividend payout rate. Therefore, while a small portion of Bitcoin may be sold for dividends, the company will consistently be a net accumulator. For example, in April, the company raised $3.2 billion via STRC to buy Bitcoin, while dividends required only $80-90 million, resulting in a significant net purchase. Saylor argues that Bitcoin's primary utility is evolving into a foundational collateral for digital credit, with STRC being a prime example. He notes that STRC now constitutes a majority of the U.S. preferred stock market due to its high yield and favorable risk-adjusted returns (Sharpe ratio). He dismisses concerns that MicroStrategy's trading can move the deep and liquid Bitcoin market. Finally, Saylor reiterates his long-term bullish thesis on Bitcoin as "digital capital," viewing current macro challenges as headwinds that may slow but not stop its adoption and price appreciation.

Odaily星球日报30 dk önce

Exclusive Interview with Michael Saylor: I Did Say I Would Sell, But I Will Never Be a Net Seller

Odaily星球日报30 dk önce

Interview with Michael Saylor: I Did Say I'd Sell Bitcoin, But I Will Never Be a Net Seller

**Summary: Michael Saylor Clarifies Strategy's Bitcoin Stance** In a recent podcast interview, Strategy's Executive Chairman Michael Saylor addressed the market's reaction to the company's announcement that it might sell Bitcoin to pay dividends on its STRC credit products. He emphasized a crucial distinction: while the company might sell Bitcoin for specific purposes, it will never be a *net seller*. Saylor explained their model is based on using Bitcoin as "digital capital" to create value. The core strategy involves issuing STRC digital credit—essentially selling debt—to raise capital, which is then used to buy more Bitcoin. He estimates Bitcoin appreciates at roughly 40% annually. A small portion of these capital gains (e.g., ~2.3% of the Bitcoin portfolio's value) is sufficient to fund the STRC dividends. Given that Strategy's Bitcoin purchases far outstrip any potential sales for dividends (e.g., buying $3.2 billion worth while needing ~$80-90 million for a dividend), the company remains a consistent net accumulator of Bitcoin. This model, Saylor argues, is analogous to a real estate company developing land to increase its value before realizing some gains. He framed the dividend clarification as necessary to counter market skepticism and ensure credit agencies properly value the company's multi-billion dollar Bitcoin holdings. Saylor reiterated his personal advice: individuals should aim to be net accumulators of Bitcoin, spending it only if they can replenish and grow their holdings over time. Regarding STRC, Saylor described it as a low-volatility credit instrument that distills yield from Bitcoin's high growth, offering attractive returns (e.g., ~11-12% yield) for risk-averse investors. He noted that Strategy's STRC issuance now constitutes about 60% of the U.S. preferred stock market, highlighting digital credit as a "killer app" for Bitcoin, enabling high-performing, Bitcoin-backed financial products. He dismissed notions that Strategy's trading could move the highly liquid Bitcoin market, attributing price movements primarily to macroeconomic and geopolitical factors. Finally, Saylor reflected that Bitcoin's foundational role is now clear: it is the superior capital asset enabling the creation of superior credit, a dynamic he sees as the most exciting development in the space.

marsbit37 dk önce

Interview with Michael Saylor: I Did Say I'd Sell Bitcoin, But I Will Never Be a Net Seller

marsbit37 dk önce

380,000 Apps Exposed, 2,000+ Apps Leaked Secrets: AI Programming Turns 'Intranet' into Public Internet

Israeli cybersecurity firm RedAccess uncovered a severe data exposure trend linked to "vibe coding" or AI-powered software development tools. Their research found approximately 38,000 publicly accessible web applications built with platforms like Lovable, Base44, Netlify, and Replit. Of these, an estimated 2,000 apps exposed sensitive corporate and personal data, including medical records, financial information, internal strategic documents, and customer chat logs. In some cases, access even granted administrative privileges. The core issue stems from default privacy settings that make applications public by default, combined with a lack of built-in security controls (like authentication) in the AI-generated code. This allows employees without security expertise—"citizen developers"—to easily create and deploy applications that bypass standard corporate security reviews. The exposed apps, often indexed by search engines, are trivially discoverable. While some platform providers (Replit, Lovable, Wix/Base44) argue that security configuration is the user's responsibility and question the validity of some findings, security researchers confirm the widespread reality of such exposures. This pattern, also noted in prior studies, highlights a critical security gap as AI democratizes app creation, potentially leading to massive, unintentional data leaks.

marsbit1 saat önce

380,000 Apps Exposed, 2,000+ Apps Leaked Secrets: AI Programming Turns 'Intranet' into Public Internet

marsbit1 saat önce

İşlemler

Spot
Futures
活动图片