New Gold Protocol Suffers $2M Flash Loan Breach

Updated at: October 9, 20257 Mins Read

Author:

On September 17, 2025, the NewGold Protocol (NGP), a DeFi project on the BNB Chain, suffered a major exploit resulting in the loss of approximately $2 million in user funds. Launched with promises of "DeFi 3.0" innovation and sustainability, NGP emphasized security as "non-negotiable." However, the attack exposed critical vulnerabilities in its smart contract design, including reliance on a manipulable price oracle and flawed transfer logic. The exploit involved flash loan manipulation, leading to the drainage of liquidity pools and a subsequent 88% crash in the NGP token price.

Hack Analysis

The attacker initially acquired NGP tokens across multiple EOAs by swapping funds on PancakeSwap. These funds were originally sourced through Tornado Cash.

Screenshot 2025-09-20 at 3.25.57 PM.png

The attacker then took out a BTCB flash loan via Moolah and used it as collateral on Venus Protocol to borrow vUSDT.

Screenshot 2025-09-20 at 3.56.21 PM.png

Next, the attacker executed multiple flash loans of BSC-USD from PancakeSwap, drawing liquidity from different pairs.

Screenshot 2025-09-20 at 3.58.38 PM.png

Using these funds, the attacker swapped BSC-USD for NGP in the PancakeSwap pool, but set the recipient address as the dead wallet. Since the dead wallet was whitelisted in the NGP protocol, this allowed the attacker to bypass the maxBuyAmountUsdt restriction.

Screenshot 2025-09-20 at 4.01.17 PM.pngScreenshot 2025-09-20 at 3.51.57 PM.pngComponent 32.png

Within the NGP protocol, when tokens are sold, a 35% transaction fee is applied. Instead of deducting tokens from the seller’s balance and transferring the remainder, the protocol directly reduces tokens from the liquidity pool and then syncs the pool. This design flaw significantly diminished available liquidity.

Component 33.png

Exploiting this vulnerability, the attacker used their initially acquired NGP tokens to perform a relatively small swap, which nevertheless drained the entire BSC-USD liquidity from the pool. After repaying all borrowed assets, the attacker walked away with approximately $2M in profit.

Screenshot 2025-09-20 at 4.29.31 PM.png

Root Cause

The exploit stemmed from two primary vulnerabilities in the NGP smart contract:

  • Vulnerable Price Oracle: The getPrice() function relied exclusively on PancakeSwap pool reserves without integrating external oracles (e.g., Chainlink) or safeguards against manipulation. This made it susceptible to flash loan attacks that temporarily altered pool balances.
     
  • Flawed Fee and Transfer Mechanism: The 35% sales fee was deducted directly from the pool's balance rather than from the transferred amount, combined with a sync() Call that the updated reserves post-deduction. This created a self-destructive loop when exploited with manipulated reserves, leading to pool depletion.

These issues highlight inadequate threat modeling and a lack of robust Oracle integration in the protocol's design.

Relevant Address and Transactions

0xc2066e0dff1a8a042057387d7356ad7ced76ab90904baa1e0b5ecbc2434df8e1
 


Funds Flow After Attack

The attacker first exchanged the stolen BSC-USD for ETH through KyberSwap, effectively converting the compromised funds into a more liquid and widely used asset.

Screenshot 2025-09-20 at 2.50.55 PM.png

Next, the attacker bridged the newly acquired ETH from the BNB Chain to the Ethereum mainnet using the Across protocol, moving assets across chains to obscure the trail.

Screenshot 2025-09-20 at 2.52.17 PM.png

Finally, the attacker laundered the bridged ETH through Tornado Cash, leveraging the mixer’s anonymity features to conceal transaction history and make tracing the funds significantly more difficult.

Screenshot 2025-09-20 at 2.53.10 PM.png

Post Attack Mitigation

Following the exploit, the NewGold Protocol team acknowledged the incident in a public statement on September 20, 2025, expressing their intent to continue the project and work toward a relaunch.

However, no concrete measures or recovery assistance, such as contract actions, audits, or restitution plans, have been provided. Users remain without clear guidance, and trading continues to be affected due to the drained liquidity.
 

Conclusion

The NewGold Protocol exploit underscores the persistent risks in DeFi projects, particularly those relying on single-source price oracles and untested fee mechanisms. This incident resulted in a $2 million loss and eroded user trust due to the team's lack of response. To prevent similar vulnerabilities, protocols should integrate multi-source oracles, implement flash loan protections (e.g., time-weighted average prices), and conduct thorough smart contract audits. The attack serves as a reminder of the importance of robust design and transparent post-incident handling in the DeFi ecosystem.

Subscribe to our Newsletter

Your weekly dose of Web3 innovation and security, featuring blockchain updates, developer insights, curated knowledge, security resources, and hack alerts. Stay ahead in Web3!