Cryip
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features
No Result
View All Result
Cryip
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features
No Result
View All Result
Cryip
No Result
View All Result
Home News Security & Hacks

TrustedVolumes Exploited for $5.87 Million in Ethereum Hack as Repeat Attacker Returns

TrustedVolumes, a 1inch market maker, suffered a $5.87 million Ethereum exploit after attackers abused flaws in its custom RFQ swap infrastructure.

by Saravana Kumar Mahendran
May 7, 2026
in Security & Hacks
0 0
TrustedVolumes Exploit
Share on FacebookShare on Twitter

A significant exploit has hit TrustedVolumes, a key liquidity provider and resolver for the leading DEX aggregator 1inch. The attack occurred in the early hours of May 7, draining approximately $5.87 million in crypto assets. The attacker quickly consolidated the stolen funds into roughly 2,513 ETH.

This incident is particularly concerning because it involves the same operator responsible for the March 2025 hack on 1inch’s Fusion V1, which also affected TrustedVolumes. The TrustedVolumes team has publicly confirmed the exploit. While most funds were returned in the previous case, this time the vulnerability lies in a different component – a custom RFQ (Request for Quote) swap proxy contract controlled by TrustedVolumes.

#PeckShieldAlert @trustedvolumes has been exploited for ~$5.9M, including $3.02M $ETH,$1.37M $WBTC & 1.47M stablecoins, the exploiter has swapped the stolen funds for 2.513K $ETH pic.twitter.com/HZ1LGlZJcC

— PeckShieldAlert (@PeckShieldAlert) May 7, 2026

What Exactly Happened

According to real-time alerts from blockchain security firms Blockaid and PeckShield, the attacker exploited TrustedVolumes’ resolver contract at 0x9bA0CF1588E1DFA905eC948F7FE5104dD40EDa31 through a custom RFQ swap proxy contract (0xeEeEEe53033F7227d488ae83a27Bc9A9D5051756).

Key details of the exploit:

  • Exploiter Address: 0xC3EBDdEa4f69df717a8f5c89e7cF20C1c0389100
  • Primary Exploit Transaction: 0xc5c61b3ac39d854773b9dc34bd0cdbc8b5bbf75f18551802a0b5881fcb990513

Stolen Assets:

  • 1,291.16 WETH (approx. $3.02 million)
  • 16.939 WBTC (approx. $1.37 million)
  • 1,268,771 USDC + 206,282 USDT (approx. $1.47 million)

The attacker leveraged a flaw in the custom proxy that allowed unauthorized draining of funds from the resolver. Within hours, all assets were swapped into ETH.

Why This Exploit Stands Out

TrustedVolumes is a key liquidity provider and resolver deeply integrated into 1inch’s RFQ and Fusion ecosystem. Resolvers are critical for efficiently filling large orders with competitive pricing. When such an important infrastructure provider is compromised, it raises serious questions about the security of intent-based trading systems and custom proxy implementations across DeFi.

This event adds to a growing list of sophisticated DeFi exploits already seen in 2026. Recently, the crypto community also witnessed the $1.78M Moonwell exploit, which highlighted how insecure smart contract practices and rushed development workflows can create dangerous attack surfaces for protocols handling user funds. Both incidents reinforce the growing concern that even experienced DeFi teams remain vulnerable when custom contract logic and privileged permissions are not continuously stress-tested.

The most alarming aspect here is the repeat attacker pattern. The same actor who exploited an outdated Fusion V1 component in March 2025 has now returned, targeting a different but related custom implementation. This indicates a sophisticated, patient operator who actively researches and monitors specific targets.

It serves as a clear reminder: A single past hack does not make any team “battle-tested.” Instead, it can place them on a dedicated attacker’s watchlist for future opportunities.

Impact and Practical Advice

End-user funds on 1inch itself appear safe, as the exploit was limited to TrustedVolumes’ own controlled resolver contracts. However, users who have interacted with TrustedVolumes or used 1inch Fusion routes are strongly advised to revoke approvals immediately via tools like Revoke.cash.

Short-term market reaction may include temporary nervousness around the $1INCH token and RFQ-related liquidity. TrustedVolumes has acknowledged the exploit and is expected to offer a bug bounty, similar to the previous incident.

Key Lessons for the Crypto Community

  • Custom proxy contracts and elevated permissions remain high-risk areas even in audited systems.
  • Real-time security monitoring tools can significantly limit damage.
  • Regular approval revocation is essential hygiene in DeFi.
  • Teams with previous incidents must maintain ongoing heightened security vigilance.

This story is still developing. On-chain movements of the stolen ETH will be closely watched in the coming hours.

In the fast-moving world of DeFi, assuming any protocol is “trusted” by name alone has repeatedly proven risky. Stay vigilant, monitor your wallet permissions, and treat every smart contract interaction with caution.

Disclaimer: Cryip is an independent media and research outlet providing news, data, and analysis on the cryptocurrency industry. Content is for informational and research purposes only and does not constitute financial, legal, tax, or investment advice. Cryptocurrency markets are volatile and past performance is not indicative of future results. References to specific assets, platforms, or incidents are for journalistic purposes only and do not imply endorsement, and readers assume full responsibility for their decisions.
Tags: Crypto Hacks

Related Posts

Aave Fights to Unfreeze $71M ETH as Kelp DAO Hack Moves to Court
Market Updates

Aave Fights to Unfreeze $71M ETH as Kelp DAO Hack Moves to Court

by Sathish Kumar Kaliraj
May 5, 2026

$71 million in ETH frozen on Arbitrum following a crypto exploit Aave requests court to lift freeze or require $300...

Read moreDetails
Wasabi Protocol Hit by Multi-Chain Exploit

Wasabi Protocol Hit by Multi-Chain Exploit, Over $5 Million Drained

April 30, 2026
Aftermath Finance Exploit

Aftermath Finance Exploit: $1.14M USDC Drained from Sui Perpetuals Protocol

April 29, 2026
ZetaChain GatewayEVM Hack

ZetaChain GatewayEVM Hack: $300K Loss from Team Wallets, Cross-Chain Transactions Paused

April 28, 2026
North Korean AI Hack on Zerion

North Korean AI Hack Hits Zerion, $100K Lost in Social Engineering Attack

April 15, 2026
Polkadot Bridge Exploit

Polkadot Bridge Exploit Technical Incident Analysis

April 13, 2026
Hyperbridge Exploit

Polkadot Bridge Exploit: 1B Fake DOT Minted on Ethereum

April 13, 2026
Next Post
OpenTrade Raises $17 Million as Stablecoin Infrastructure Investment Accelerates

OpenTrade Raises $17 Million as Stablecoin Infrastructure Investment Accelerates

Cryip focuses on crypto research and on-chain analysis, supported by coverage of markets, regulation, security events, and blockchain ecosystems.

Recent Posts

  • GothFerrari Sentenced in $250M Crypto Crime Ring and Hardware Wallet Theft Case
  • OpenTrade Raises $17 Million as Stablecoin Infrastructure Investment Accelerates
  • TrustedVolumes Exploited for $5.87 Million in Ethereum Hack as Repeat Attacker Returns

Categories

  • AI × Crypto
  • Data & Dashboards
  • Market Updates
  • On-Chain Analysis
  • OpSec
  • Policy & Regulation
  • Post Mortems
  • Reports
  • Scams & Fraud
  • Security & Hacks
  • Stablecoins
  • Tokenomics
  • VC & Funding

Company

  • About Us
  • Contact Us
  • Editorial Standards & Integrity
  • Our Team
  • Privacy Policy
  • Review Methodology
  • Terms and Conditions
  • Trust, Disclosures & Independence

© 2026 Cryip - Research-Driven Crypto Analysis & News by Hashlays.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features

© 2026 Cryip - Research-Driven Crypto Analysis & News by Hashlays.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.