SIR.trading DeFi Protocol Loses $355K in Hack Targeting Ethereum’s Transient Storage

0

TLDR

  • SIR.trading DeFi protocol lost its entire $355K TVL in a hack on March 30, 2025
  • The attack exploited a vulnerability in the protocol’s Vault contract by manipulating a callback function
  • This may be one of the first real-world attacks targeting Ethereum’s transient storage feature introduced in the Dencun upgrade
  • The stolen funds were transferred to an address funded through Railgun, an Ethereum privacy solution
  • Despite the setback, the protocol’s founder (Xatarrer) indicated interest in continuing the project

Ethereum-based DeFi protocol SIR.trading was completely drained of funds in a hack on March 30, 2025. The attack resulted in the loss of approximately $355,000, which represented the protocol’s entire total value locked (TVL).

The hack was first detected by blockchain security firms TenArmorAlert and Decurity. Both companies posted warnings on X (formerly Twitter) to alert users of the breach.

SIR.trading, which stands for Synthetics Implemented Right, was designed as “a new DeFi protocol for safer leverage.” The platform aimed to address common challenges in leveraged trading such as volatility decay and liquidation risks.

The protocol’s founder, known only by the pseudonym Xatarrer, described the incident as “the worst news a protocol could receive.” Despite this major setback, Xatarrer suggested the team plans to continue developing the protocol.

Security experts have described the attack as “clever.” It specifically targeted a callback function in the protocol’s Vault contract that leverages Ethereum’s transient storage feature.

According to an analysis by Decurity, the attacker was able to replace the real Uniswap pool address with an address they controlled. This allowed them to redirect funds from the vault to their own address.

TenArmorAlert explained that by repeatedly calling this callback function, the hacker drained the protocol’s entire TVL. The stolen funds have reportedly been deposited into an address funded through Railgun, an Ethereum privacy solution.

Exploiting Ethereum’s New Feature

SupLabsYi from blockchain security firm Supremacy provided more technical details about the attack. They noted that it may demonstrate a security flaw in Ethereum’s transient storage feature.

Transient storage was added to Ethereum with the Dencun upgrade last year. This feature allows for temporary storage of data and leads to lower gas fees than regular storage options.

Security researchers believe this may be one of the first attacks to exploit vulnerabilities in this new feature. SupLabsYi warned that “this isn’t merely a threat aimed at a single instance of uniswapV3SwapCallback.”

The vulnerability seems related to how the SIR.trading contract verified transactions. Typically, smart contracts should only permit transactions from trusted sources like a Uniswap pool.

However, the contract relied on transient storage, which resets only after a transaction ends. The hacker exploited this by overwriting important security data while the transaction was still running.

According to blockchain researcher Yi, the attacker brute-forced a unique vanity address. This enabled the contract to register their fake address as legitimate.

The hacker then used a custom contract to drain all funds from SIR.trading’s vault. Xatarrer has reached out to Railgun for assistance in potentially tracking or recovering the stolen funds.

Interestingly, SIR.trading’s documentation did warn users about potential risks. It stated that despite being audited, its smart contracts could still contain bugs that might lead to financial losses.

The documentation specifically highlighted the platform’s vaults as a particular area of vulnerability. It warned that “undiscovered bugs or exploits in SIR’s smart contracts could lead to fund losses.”

This incident raises questions about the security of transient storage in Ethereum. Security experts caution that unless developers implement stronger safeguards in their smart contracts, similar attacks could occur in the future.

The post SIR.trading DeFi Protocol Loses $355K in Hack Targeting Ethereum’s Transient Storage appeared first on Blockonomi.

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

Bitte geben Sie den Coingecko Free Api Key ein, damit dieses Plugin funktioniert

Subscribe To The Latest Crypto News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.