WikiBit 2026-04-17 06:03Rhea Finance has been hit by a suspected exploit, with blockchain security firm CertiK reporting tha
Rhea Finance has been hit by a suspected exploit, with blockchain security firm CertiK reporting that at least $7.6 millionhas been extracted from the protocol.
The incident was flagged on 16 April, with early findings suggesting the attacker manipulated liquidity pools using fake token contracts. At the time of writing, the Rhea Finance team has not issued a public response.
Exploit linked to fake tokens and oracle manipulation
According to CertiK, the attacker created fraudulent token contracts and added liquidity to newly formed pools. This activity likely misled the protocols oracle and validation mechanisms, allowing the attacker to extract funds.
Source: X
Such attacks typically rely on distorting price feeds or liquidity signals. This enables attackers to exploit discrepancies between perceived and actual asset values within the protocol.
While full technical details have yet to be confirmed, the reported method points to a form of oracle manipulation, a recurring vulnerability in decentralized finance systems.
On-chain impact and platform exposure
CertiK estimates that approximately $7.6 millionhas been drained so far, though the figure may change as more data emerges.
Data from DefiLlama shows Rhea Finance currently holds around $128 millionin total value locked [TVL], suggesting the exploit represents a notable portion of platform liquidity.
Source: DefiLlama
The movement of funds has been tracked on-chain, with the attacker routing assets through multiple addresses, a common tactic used to obscure transaction trails following exploits.
Team yet to respond as investigation continues
Rhea Finance has not commented publicly on the incident, leaving details around the exploit, potential containment measures, and recovery efforts unclear.
The lack of immediate communication places the focus on third-party tracking and on-chain analysis as the situation develops.
The exploit adds to a growing list of attacks targeting DeFi protocols through manipulation of liquidity and pricing mechanisms. Also, it highlights persistent risks in systems reliant on external data inputs.
Final Summary
Disclaimer:
The views in this article only represent the author's personal views, and do not constitute investment advice on this platform. This platform does not guarantee the accuracy, completeness and timeliness of the information in the article, and will not be liable for any loss caused by the use of or reliance on the information in the article.
0.00