sDOLA LlamaLend suffers flash loan price manipulation attack, losing approximately $240,000

ChainCatcher reports that sDOLA LlamaLend was subjected to a flash loan price manipulation attack, resulting in a loss of approximately $240,000, including 6.74 WETH and 227,325 DOLA.

The attacker used flash loans and donations to manipulate the sDOLA price, raising the exchange rate from 1.189 DOLA to 1.353 DOLA per 1 sDOLA. This price fluctuation caused multiple accounts in the crvUSD Controller to have health factors below 0, triggering liquidation conditions. After the attack contract received rewards as a liquidator, it exchanged assets, repaid the flash loan, and profited.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

X mulls new rules for first-time crypto posts amid tortoise scam

Social media platform X is considering implementing new rules for first-time user posts about crypto in an effort to crack down on scammers using phishing attacks to gain access to accounts. Nikita Bier, the head of product at the platform formerly known as Twitter, made the announcement on

Cointelegraph1h ago

Elon Musk's X Is Making Big Changes to Combat Crypto Scams

In brief Social media platform X is working on new changes to combat crypto scams on the platform. The platform will attempt to lock down accounts that are posting about crypto for the first time, particularly those with large followings. The change comes as financial scams continue to

Decrypt2h ago

Elon Musk's X to deploy scam kill switch by auto-locking first-time crypto mentioners

Social media platform X will auto-lock accounts that mention cryptocurrency for the first time, requiring additional verification to deter crypto phishing scams. This new measure aims to eliminate incentives for attacks that hijack accounts to promote fraudulent tokens.

CoinDesk6h ago

Drift Protocol Hack Drains $285M, Hitting Solana DeFi Hard

The Drift Protocol exploit on April 1, 2026, drained $285 million through admin control, triggering a sharp decline in Solana DeFi. Attackers manipulated oracle pricing and governance, leading to rapid asset withdrawals and cross-chain fund transfers, complicating recovery efforts.

CryptoFrontNews6h ago

X takes a harsh approach: if an account chats about cryptocurrency for the first time, it will “automatically lock” and request verification; the product lead blasted Google for tolerating phishing emails.

X (formerly Twitter) will implement new protective measures. If a user posts content related to cryptocurrency for the first time, the account will automatically be locked and prompted for identity verification to prevent hackers from using the account to carry out scams. X product lead Nikita Bier also criticized Google for tolerating phishing emails, emphasizing that this move can eliminate 99% of hackers’ motivations.

動區BlockTempo6h ago

X rolls out a new anti–crypto phishing mechanism: token-issuance content accounts created for the first time will be automatically locked and required to verify

X platform product lead Nikita Bier announced that it will roll out new measures against crypto phishing scams. The account that is first to publish relevant content will be locked and will need to complete identity verification. It is expected to eliminate 99% of malicious actors’ motives. He also pointed out that Google failed to effectively block phishing emails.

GateNews7h ago
Comment
0/400
No comments