Breaking 11:20 Apple foldable iPhone screen enters mass production ahead of 2026 launch 10:50 Diesel shortages threaten farming across continents amid Iran conflict 10:20 United States offers $10 million reward for information on Iran leader 09:50 Yale researchers identify circular RNA that boosts HIV replication 08:50 Bitcoin miners face greater risk from falling BTC price than oil surge 08:20 Iraq faces salary crisis as oil exports collapse during Iran conflict 07:50 Iranian drone attacks decline but continue striking Gulf allies 07:20 European stocks record first consecutive weekly drop of 2026 amid Iran war 07:00 Mathematicians overturn 150 year geometry rule using torus surfaces 23:40 US judge reinstates union contract for 320,000 veterans’ agency workers 23:20 Egypt introduces five-year multiple-entry visa for Moroccan citizens 23:00 Berkshire Hathaway opposes shareholder proposal on workforce oversight, reports Buffett’s pay 22:20 US expands Venezuela sanctions waivers amid rising energy and fertilizer prices 22:00 Halkbank hires EY to review sanctions and anti-money laundering compliance 20:40 South Korea’s prime minister meets Donald Trump in Washington 20:20 Hyundai issues stop sale for some 2026 Palisade SUVs after safety incident 15:50 Stanford study finds aging occurs in bursts rather than gradual decline 15:20 CF Industries hits record high as Iran war disrupts global fertilizer supply 15:00 Switzerland maintains mandate for US trade negotiations, says minister 14:50 Euro falls to 2026 low as Middle East oil crisis pressures Europe 14:30 Traders anticipate possible Federal Reserve interest rate cut by September 14:20 Musk warns parents to keep ChatGPT away from children after Canada shooting lawsuit 14:07 Aluminum hits four year high as Gulf war disrupts global supply 13:50 Silo AI founder launches QuTwo to link enterprise AI with quantum computing 13:45 Netherlands adopts cautious stance on US and Israeli strikes against Iran 13:43 BofA strategist warns markets echo conditions before the 2008 financial crisis 13:15 Hungary calls on EU to reconsider sanctions on Russian oil after US decision 13:00 China urges US to halt new arms sales to Taiwan ahead of Trump visit 12:20 Crypto fear index exits extreme fear after 41 day market slump 11:50 U.S. dollar hits four month high as Middle East war drives safe haven demand

Shibarium bridge exploit drains $2.4M, exposing critical vulnerabilities

Tuesday 16 September 2025 - 12:20
By: Dakir Madiha
Shibarium bridge exploit drains $2.4M, exposing critical vulnerabilities

The Shibarium Layer-2 network suffered a devastating flash-loan attack, resulting in the loss of $2.4 million in assets. The breach, which alarmed the Shiba Inu (SHIB) community, exploited governance mechanisms and validator controls, highlighting significant security risks within cross-chain bridges.

The attack occurred when an unidentified actor borrowed approximately 4.6 million BONE tokens, temporarily acquiring majority control of validator signing keys on the Shibarium bridge. This enabled the attacker to withdraw ETH and vast amounts of SHIB tokens, with losses estimated between $2.3 and $2.4 million, including hundreds of ether and billions of SHIB.

How the attack unfolded

Blockchain monitors first detected unusual validator activity on the network, revealing how the attacker leveraged the borrowed BONE tokens to manipulate validator approvals. Analysts described the method as “ingenious,” as it bypassed traditional smart-contract vulnerabilities, instead exploiting governance mechanics and validator consensus.

This attack underlines the increasing risks faced by decentralized finance (DeFi) bridges, which centralize liquidity and governance power, making them prime targets for exploits.

Shiba Inu developers’ response

In the wake of the breach, Shiba Inu’s development team acted swiftly to mitigate further damage. Staking and unstaking functions were paused, and the implicated BONE tokens were frozen. Additionally, critical funds were transferred to a multisignature-controlled hardware wallet to prevent unauthorized withdrawals.

The developers announced collaborations with external security firms to investigate the exploit and strengthen validator key management. While users were temporarily unable to stake or unstake BONE, the team reassured the community with regular updates, urging patience as forensic tracing continued.

Exchanges and monitoring firms are also tracking the stolen funds for potential recovery. However, experts warn that retrieval efforts in cross-chain thefts are often slow and only partially successful.

Impact on DeFi and the SHIB ecosystem

The Shibarium exploit is another reminder of the vulnerabilities in DeFi bridges, which consolidate liquidity and governance in ways that can be exploited by attackers with temporary capital access.

The incident has shaken investor confidence, with native tokens tied to the Shibarium ecosystem, including BONE and SHIB, experiencing price volatility. Increased trading volumes reflected investor uncertainty as they reassessed the risks associated with the network.

While transparent responses from developers can limit financial and reputational damage, trust in the ecosystem remains fragile.

Future reforms and recovery efforts

Investigators are tracing the stolen assets, with the Shibarium team confirming plans to release regular updates as audits and forensic investigations progress. Community-led tracing initiatives and bounties have been launched, though outcomes remain uncertain.

The breach is likely to spur structural reforms in DeFi bridge security. Proposed measures include stricter validator key controls, limits on governance voting during critical windows, and enhanced bridge designs to reduce single points of failure.

For users, the incident reinforces the importance of cautious custody. Experts recommend minimizing bridge usage, double-checking contract addresses, and relying solely on official communication channels for updates.

Shibarium developers and their security partners are expected to release a detailed post-mortem in the coming days, outlining the failures that led to the attack and the steps planned to prevent future incidents.


  • Fajr
  • Sunrise
  • Dhuhr
  • Asr
  • Maghrib
  • Isha

This website, walaw.press, uses cookies to provide you with a good browsing experience and to continuously improve our services. By continuing to browse this site, you agree to the use of these cookies.