On April 6, 2025, between 12:00 AM and 4:00 AM UTC, Filament Finance was targeted in a coordinated exploit that resulted in the loss of approximately $572,000 worth of user funds.
The attacker manipulated Filament’s on-chain order book through spoofed order placements and self-liquidation loops, ultimately draining the majority of protocol deposits.
The exploit took advantage of the protocol’s thin liquidity and execution logic:
The core issue stemmed from inadequate circuit breakers in the liquidation logic and a lack of guardrails against multi-account manipulation.
Funds were dispersed across numerous wallets and bridged out shortly after being extracted.
Notable hashes include:
The attack was sophisticated in nature and team is working to apply certain changes to the architecture. The reason behind the attack was the vulnerability in how the protocol maps collateral from the liquidated positions. In order to prevent this, the protocol should have differentiated the mappings for active and liquidated collateral which would have prevented collateral to inflate.
Moreover, safety guards should be implemented like halting trading in case of high orderbook imbalances. Also shared liquidity model in this case increased the scope of attack. There should be mechanism to avoid liquidity sharing like reviewing large withdrawals from the pool.
This exploit underscores a recurring theme in DeFi: the exploitation of market mechanics, not smart contract bugs.
The protocol's logic behaved as programmed—but its economic design and absence of manipulation protections made it vulnerable.
Protocols must now treat economic exploits as first-class threats—not just coding bugs.
Real-time monitoring, simulation of adversarial behaviors, and rigorous attack modeling should be essential in every protocol's security stack.
Your weekly dose of Web3 innovation and security, featuring blockchain updates, developer insights, curated knowledge, security resources, and hack alerts. Stay ahead in Web3!