SwapNet Exploit Drains $16.8M After Approval Flaw on Matcha Meta

CoincuInsights
ETH0,72%
ARB0,66%
BNB1,74%

In Brief

  • SwapNet exploit drains $16.8M after users disabled one-time approval protections.
  • Attacker swapped $10.5M USDC to ETH on Base before bridging to Ethereum.
  • Matcha Meta disables affected contracts as security firms flag wider DeFi risks.

A security breach linked to SwapNet led to losses of about $16.8 million, affecting users interacting through Matcha Meta. The incident mainly impacted users who disabled one-time approvals, thereby exposing persistent token permissions.

Blockchain security firm PeckShieldAlert identified the exploit and traced the initial fund movements. The attacker targeted SwapNet router contracts that retained unlimited approvals from affected user wallets.

On the Base network, the attacker exchanged roughly $10.5 million in USDC for about 3,655 ether. Soon after, the attacker began bridging the converted assets to the Ethereum mainnet to complicate tracking.

SwapNet operates as a liquidity router used by Matcha Meta to source pricing and deep liquidity. The exploit involved abusing existing approvals rather than breaching private keys or core infrastructure.

Matcha Meta, built by the 0x team, confirmed the issue and immediately disabled affected SwapNet contracts. The platform also removed the option allowing users to grant direct approvals to third-party aggregators.

Investigation Expands as Security Firms Flag Wider Risks

Further analysis suggested the exploit stemmed from an arbitrary call vulnerability within SwapNet contracts. This flaw allowed attackers to transfer approved tokens without requesting new permissions.

Security firm BlockSec reported that multiple contracts across chains suffered losses exceeding $17 million. Affected networks included Ethereum, Arbitrum, Base, and BNB Chain, increasing the incident’s scope.

Separately, CertiK estimated that stolen funds near $13.3 million in USDC from related activity.
Some contracts involved remained closed-source and unverified at deployment.

Matcha Meta later confirmed that 0x core contracts were not affected by the incident.
Users relying on one-time approvals through 0x infrastructure remained unaffected.

The incident renewed scrutiny around persistent token approvals in decentralized finance.
Unlimited permissions offer convenience but increase exposure during smart contract failures.

Meanwhile, on-chain investigator ZachXBT criticized Circle’s delayed response to freeze remaining USDC. Roughly $3 million reportedly remained at addresses eligible for freezing during the response window.

The breach adds to a growing list of DeFi security failures early in 2026. Industry data shows stolen crypto funds reached record levels in recent years, increasing pressure on protocol security practices.

DISCLAIMER: The information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

RootData Issues Transparency Alert, 5 DEXs Including Hydration and Hyperbot Missing Core Information

RootData posted a transparency alert on Twitter, pointing out missing information on multiple decentralized exchanges and calling on projects to update their information to improve transparency scores. The scoring system measures information completeness on a scale from A to F, with lower scores indicating higher risk of misconduct, requiring investors to exercise caution.

GateNews30m ago

Huione associated address transferred 200,000 USDT to a certain CEX, and withdrew 1.78 million pieces one month ago.

Gate News reported that on March 25, according to BlockSec Phalcon monitoring, an address that has been continuously receiving funds from the illegal trading platform Huione transferred 200,000 USDT to a certain CEX. The address had previously withdrawn a total of 1.78 million USDT in 3 batches from a certain CEX approximately one month ago.

GateNews3h ago

Elite University Graduate and notorious market maker in the crypto industry dies by suicide! KOL reveals: pressure allegedly from a notorious market manipulator

Network3 founder Rock reportedly took his own life last year, with the community pointing to multiple pressures from the community, team, and investors. KOLs noted that Rock's optimistic personality became a weakness in the crypto space, and the pressure he faced may have been related to market maker Web3Port, which caused multiple tokens to collapse due to one-sided selling. The incident has sparked deep reflection on the crypto entrepreneurship environment.

CryptoCity3h ago

A certain CEX clarifies: Polymarket user attempting to manipulate BP coin price is not an insider

A certain CEX reported that traders hold large open positions on Polymarket, with expectations that BP's FDV will exceed $200 million after TGE, driving up BP's price. The CEX's investigation confirmed that these traders are unrelated to them, and they maintain a zero-tolerance stance toward insider trading.

GateNews7h ago
Comment
0/400
No comments