Breaking 13:15 Honor 600 introduces AI feature that turns photos into videos 13:00 Education: Girls losing ground in mathematics, Unesco warns 12:30 ADB launches $70 billion plan to boost energy and digital infrastructure in Asia-Pacific 12:15 Abu Dhabi Oil Giant Adnoc commits $55 billion to new projects by 2028 12:00 Slovakia’s Prime Minister Robert Fico to attend Victory Day parade in Moscow 11:45 Kidnapping of opposition lawyer and politician in Bamako sparks concern over repression 11:30 Clarence Thomas reaches milestone as his conservative influence on the US Supreme Court endures 11:15 Unidentified drone suspected of airspace violation near finnish-Russian border 11:00 Marco Rubio in Rome and the Vatican to initiate a “Thaw” in relations 10:45 Rio goes Shakira Mode: Giant concert by the Latin star on Copacabana Beach 10:30 Django and Zorro crossover project set for new film adaptation 10:15 Wigs play a vital role in traditional Japanese kabuki theatre 10:00 OPEC+ meets amid tensions after UAE exit shakes oil alliance 09:45 Taiwan’s president visits Eswatini as China escalates rhetoric 09:30 Former French cinema chief faces appeal trial in sexual assault case 09:15 US revokes visas of Costa Rican newspaper leaders amid press freedom concerns 09:00 Deep-sea shipwreck discovery sheds new light on 16th-century Mediterranean trade 08:45 Man charged in Australia over killing of Indigenous child 08:30 Peru launches electoral audit after disputed presidential vote 08:15 US plans troop reduction in Germany as Trump signals deeper cuts 08:00 Spain seeks continued representation on ECB Executive Board 07:36 HM King Mohammed VI appoints crown prince as military staff coordinator 17:00 Two people killed by gunfire in Saône-et-Loire, homicide investigation opened 16:45 Republicans raise concerns over Trump plan to reduce U.S. troops in Germany 16:30 Lost Oscar statue found on Lufthansa flight after security mix-up 16:15 Oil tanker hijacked off Yemen coast and taken toward Somalia 16:00 Spotify launches “verified” label for human artists amid rise of AI-generated music 15:45 Robert Downey Jr. questions the rise of influencers as future stars 15:30 Zelenskyy calls for stronger relations with Slovakia amid diplomatic tensions 15:15 Saint-denis mayor calls for anti-racism March in June 15:00 US sees no need for airline bailout amid rising fuel costs 14:45 Thyssenkrupp pauses steel unit sale talks with Jindal 14:30 Le Pen calls for windfall tax on TotalEnergies if fuel price caps fall short 14:15 Madonna unveils “bring your love” duet with Sabrina Carpenter 14:00 Gaza flotilla activists detained after interception in international waters 13:45 Major wildfire near Dutch military training ground brought under control 13:30 Taiwan maintains ties with 12 diplomatic allies amid growing pressure

Shibarium bridge exploit drains $2.4M, exposing critical vulnerabilities

Tuesday 16 September 2025 - 12:20
By: Dakir Madiha
Shibarium bridge exploit drains $2.4M, exposing critical vulnerabilities

The Shibarium Layer-2 network suffered a devastating flash-loan attack, resulting in the loss of $2.4 million in assets. The breach, which alarmed the Shiba Inu (SHIB) community, exploited governance mechanisms and validator controls, highlighting significant security risks within cross-chain bridges.

The attack occurred when an unidentified actor borrowed approximately 4.6 million BONE tokens, temporarily acquiring majority control of validator signing keys on the Shibarium bridge. This enabled the attacker to withdraw ETH and vast amounts of SHIB tokens, with losses estimated between $2.3 and $2.4 million, including hundreds of ether and billions of SHIB.

How the attack unfolded

Blockchain monitors first detected unusual validator activity on the network, revealing how the attacker leveraged the borrowed BONE tokens to manipulate validator approvals. Analysts described the method as “ingenious,” as it bypassed traditional smart-contract vulnerabilities, instead exploiting governance mechanics and validator consensus.

This attack underlines the increasing risks faced by decentralized finance (DeFi) bridges, which centralize liquidity and governance power, making them prime targets for exploits.

Shiba Inu developers’ response

In the wake of the breach, Shiba Inu’s development team acted swiftly to mitigate further damage. Staking and unstaking functions were paused, and the implicated BONE tokens were frozen. Additionally, critical funds were transferred to a multisignature-controlled hardware wallet to prevent unauthorized withdrawals.

The developers announced collaborations with external security firms to investigate the exploit and strengthen validator key management. While users were temporarily unable to stake or unstake BONE, the team reassured the community with regular updates, urging patience as forensic tracing continued.

Exchanges and monitoring firms are also tracking the stolen funds for potential recovery. However, experts warn that retrieval efforts in cross-chain thefts are often slow and only partially successful.

Impact on DeFi and the SHIB ecosystem

The Shibarium exploit is another reminder of the vulnerabilities in DeFi bridges, which consolidate liquidity and governance in ways that can be exploited by attackers with temporary capital access.

The incident has shaken investor confidence, with native tokens tied to the Shibarium ecosystem, including BONE and SHIB, experiencing price volatility. Increased trading volumes reflected investor uncertainty as they reassessed the risks associated with the network.

While transparent responses from developers can limit financial and reputational damage, trust in the ecosystem remains fragile.

Future reforms and recovery efforts

Investigators are tracing the stolen assets, with the Shibarium team confirming plans to release regular updates as audits and forensic investigations progress. Community-led tracing initiatives and bounties have been launched, though outcomes remain uncertain.

The breach is likely to spur structural reforms in DeFi bridge security. Proposed measures include stricter validator key controls, limits on governance voting during critical windows, and enhanced bridge designs to reduce single points of failure.

For users, the incident reinforces the importance of cautious custody. Experts recommend minimizing bridge usage, double-checking contract addresses, and relying solely on official communication channels for updates.

Shibarium developers and their security partners are expected to release a detailed post-mortem in the coming days, outlining the failures that led to the attack and the steps planned to prevent future incidents.


  • Fajr
  • Sunrise
  • Dhuhr
  • Asr
  • Maghrib
  • Isha

This website, walaw.press, uses cookies to provide you with a good browsing experience and to continuously improve our services. By continuing to browse this site, you agree to the use of these cookies.