Cryip
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features
No Result
View All Result
Cryip
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features
No Result
View All Result
Cryip
No Result
View All Result
Home News Security & Hacks

dTRINITY’s dLEND Protocol Exploit Drains Around $257K on Ethereum

An attacker exploited a flaw in the dLEND-dUSD pool on Ethereum, using a flash loan and an accounting error to create inflated collateral and borrow roughly $257,000 from the protocol.

by Saravana Kumar Mahendran
March 17, 2026
in Security & Hacks
0 0
dLEND Protocol Exploit
Share on FacebookShare on Twitter

Decentralized finance (DeFi) protocol dTRINITY has confirmed a security exploit affecting the Ethereum mainnet deployment of its lending platform dLEND, resulting in losses of approximately $257,061. The protocol, which markets itself as the world’s first subsidized stablecoin system, uses revenue generated from its stablecoin to provide interest rebates for borrowers. The dTRINITY team acknowledged the incident through its official X account, stating that the protocol on Ethereum has been temporarily paused while an investigation is underway. Further updates are expected after a complete review of the attack.The exploit was first highlighted by blockchain security monitoring account DeFiMon Alerts on X, which shared early on-chain analysis and transaction details related to the suspicious activity.

DeFi Loses $257K in Exploit
DeFi Loses $257K in Exploit

How the Exploit Happened

Initial security alerts and on-chain analysis indicate that the attacker leveraged a flash loan to manipulate the protocol’s internal accounting system.

According to the analysis:

  • The attacker first flash-loaned USDC from Morpho to gain temporary liquidity.
  • They deposited approximately $772 worth of USDC into the dLEND-dUSD liquidity pool.
  • Due to an inflated internal index or accounting error, the protocol incorrectly valued the deposit as roughly $4.8 million in collateral.
  • This artificial or “phantom” collateral allowed the attacker to borrow about 257,000 dUSD from the protocol.
  • Using a helper contract, the attacker then executed 127 repeated deposit and withdrawal cycles, draining the remaining USDC held within the protocol’s aToken accounting layer.

Targeted Pool and Addresses

The exploit specifically targeted the dLEND-dUSD pool, identified by the address:

  • Victim Contract:0x5cc741931d01cb1adde193222dfb1ad75930fd60

The suspected attacker’s wallet address is reported as:

  • Attacker Address:0x08cfdff8d8ed5f1326628077f38d4f90df6417fd9

The main exploit transaction hash has been identified as:

  • Transaction Hash:0xba5e1e36b0305772d35509c694782fb9118d4ecc

Impact and Protocol Status

At the time the exploit was detected, dTRINITY’s total value locked (TVL) was approximately $435,000. Early reports suggest that no funds outside the affected pool were directly impacted, though investigations are ongoing. dTRINITY operates a subsidized stablecoin ecosystem centered around dUSD, integrated with lending through dLEND, and backed by assets from protocols such as Frax and others.

This incident appears to be separate from a smaller exploit involving dLEND reported in 2025.

Ongoing Investigation

The dTRINITY team has not yet released details about fund recovery efforts or potential compensation plans for affected users. For now, the Ethereum deployment of the protocol remains paused, and users are advised not to interact with the contracts until official updates are provided. Further information is expected as the investigation continues.

A similar issue was recently seen in another DeFi lending platform after a token crash triggered major losses within the system. In that case, theVenus Protocol exploit left about $2.15 million in bad debt following sharp market volatility.

Disclaimer: Cryip is an independent media and research outlet providing news, data, and analysis on the cryptocurrency industry. Content is for informational and research purposes only and does not constitute financial, legal, tax, or investment advice. Cryptocurrency markets are volatile and past performance is not indicative of future results. References to specific assets, platforms, or incidents are for journalistic purposes only and do not imply endorsement, and readers assume full responsibility for their decisions.
Tags: Crypto Hacks

Related Posts

Aftermath Finance Exploit
Security & Hacks

Aftermath Finance Exploit: $1.14M USDC Drained from Sui Perpetuals Protocol

by Saravana Kumar Mahendran
April 29, 2026

Aftermath Finance, a popular decentralized perpetuals trading platform on the Sui Network, has suffered a security exploit. The team officially...

Read moreDetails
ZetaChain GatewayEVM Hack

ZetaChain GatewayEVM Hack: $300K Loss from Team Wallets, Cross-Chain Transactions Paused

April 28, 2026
North Korean AI Hack on Zerion

North Korean AI Hack Hits Zerion, $100K Lost in Social Engineering Attack

April 15, 2026
Polkadot Bridge Exploit

Polkadot Bridge Exploit Technical Incident Analysis

April 13, 2026
Hyperbridge Exploit

Polkadot Bridge Exploit: 1B Fake DOT Minted on Ethereum

April 13, 2026
SubQuery Staking Contract Exploit

SubQuery Staking Contract Exploit Triggers Withdrawals Pause

April 13, 2026
Weekly Crypto Market Overview April 06 – 12, 2026

Weekly Crypto Market Overview: April 06 – 12, 2026

April 13, 2026
Next Post
Royal Government of Bhutan Moves 596 BTC to Two Wallets, Total Transfers Reach 973 BTC

Royal Government of Bhutan Moves 596 BTC to Two Wallets, Total Transfers Reach 973 BTC

Cryip focuses on crypto research and on-chain analysis, supported by coverage of markets, regulation, security events, and blockchain ecosystems.

Recent Posts

  • Eric Trump Bitcoin Venture Collapse Investors Lose $500M While Insiders Profit
  • Aftermath Finance Exploit: $1.14M USDC Drained from Sui Perpetuals Protocol
  • HKMA Warns of Fake Hong Kong Stablecoins Like “HKDAP,” Says No Licensed Issuers Yet

Categories

  • AI × Crypto
  • Data & Dashboards
  • Market Updates
  • On-Chain Analysis
  • OpSec
  • Policy & Regulation
  • Post Mortems
  • Reports
  • Scams & Fraud
  • Security & Hacks
  • Stablecoins
  • Tokenomics
  • VC & Funding

Company

  • About Us
  • Contact Us
  • Editorial Standards & Integrity
  • Our Team
  • Privacy Policy
  • Review Methodology
  • Terms and Conditions
  • Trust, Disclosures & Independence

© 2026 Cryip - Research-Driven Crypto Analysis & News by Hashlays.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features

© 2026 Cryip - Research-Driven Crypto Analysis & News by Hashlays.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.