CrediX Finance, a lending protocol built on the Sonic blockchain, suffered a $4.5 million exploit on August 4, 2025, just weeks after its launch in July. What initially appeared to be a security breach has since evolved into strong suspicions of an exit scam, with the protocol's team completely disappearing after promising full recovery of stolen funds. The incident highlights critical vulnerabilities in decentralized finance (DeFi) governance systems. It raises serious questions about insider involvement, particularly given the methodical preparation that preceded the attack and the team's subsequent vanishing act.
0x0cc3520951a2b41281dcc9a0d37ef3f7f139b75675d83ae72e3b8e903334f35e
. This was done by a potentially compromised or possibly CrediX’s own admin EOA (0x0dd010513F7abB8F9c628dC164a24D953BCA09Cf
). As a result, the attacker account (0xF321683831Be16eeD74dfA58b02a37483cEC662e
) was granted several high-impact privileges :The attacker, an insider, held high-level roles including POOL_ADMIN_ROLE
, BRIDGE_ROLE
, EMERGENCY_ADMIN_ROLE
, RISK_ADMIN_ROLE
, and ASSET_LISTING_ADMIN_ROLE
, giving them unrestricted control over the protocol. No smart contract vulnerability was exploited; instead, the protocol’s core functionality was abused through concentrated administrative privileges.
The attacker converted multiple borrowed assets into USDC and bridged them to Ethereum via the deBridge protocol. 300 ETH has been laundered through Tornado Cash, while the remaining ETH is still held across the following Ethereum addresses:
CrediX's post-attack response followed a concerning pattern that ultimately led to exit scam accusations:
Initial Response (August 4-5, 2025): CrediX initially acknowledged the breach and took its website offline to prevent additional deposits. The team promised that All users' funds will be recovered in full within 24-48 hours and claimed they had reached a successful parley with the exploiter, who agreed to return funds in exchange for payment from the protocol's treasury.
Communication Breakdown (August 8, 2025): Rather than fulfilling their recovery promises, the CrediX team completely disappeared. The protocol's website remained offline, their X (Twitter) account went inactive, and their official Telegram channel was deleted. No recovery plan was ever published, and no funds were returned to users.
Stability DAO stepped in to coordinate recovery efforts, announcing plans to file a formal legal report with authorities. The DAO confirmed it had obtained KYC information for two CrediX team members and would include this in their legal submission to cybercrime units.
The CrediX Finance incident underscores the critical risks posed by excessive centralization of administrative privileges in DeFi protocols. This was not a case of exploiting a technical flaw in smart contracts but rather a deliberate abuse of governance authority, most likely by an insider or with insider collusion. The well-orchestrated granting of high-impact roles, rapid execution of the exploit, and subsequent disappearance of the team strongly indicate an exit scam. This event highlights the urgent need for stricter access controls, multi-signature governance, and transparent operational oversight to safeguard protocol integrity and user assets in decentralized finance.
At QuillAudits, we specialize in uncovering such governance risks before they turn into multimillion-dollar disasters. Through comprehensive smart contract audits and rigorous administrative privilege assessments, we help DeFi projects build resilient security frameworks that protect both protocol assets and community trust.
Your weekly dose of Web3 innovation and security, featuring blockchain updates, developer insights, curated knowledge, security resources, and hack alerts. Stay ahead in Web3!