Orange Finance - Rekt
Orange Finance squeezed out $843.5k to kick off 2025.
Private keys - the gift that keeps on giving to opportunistic hackers hunting for low-hanging fruit.
Somewhere between Tuesday night's darkness and Wednesday morning's light, Orange Finance's admin keys slipped through fingers like digital butter, leaving their Arbitrum-based protocol ripe for plucking.
Christmas may be over, but someone still found their way into Orange's stocking, upgrading contracts and draining funds faster than a New Year's champagne toast.
The protocol's damage control playbook unfolded predictably - another private key compromise, another protocol's funds finding a new home.
When will DeFi protocols learn that private keys make better presents for hackers than security solutions?
Credit: Orange Finance, Peckshield
The digital heist unfolded like clockwork on a quiet Tuesday night.
Orange Finance's team found themselves watching helplessly as their admin access slipped into unauthorized hands.
The attacker, armed with a compromised private key, wasted no time exercising their newfound powers.
A swift contract upgrade later, and Orange Finance's protocols transformed into well-oiled extraction machines.
"The contract is no longer Orange," the team announced grimly.
PeckShield quickly amplified the warning, urging users to steer clear of the compromised protocols and revoke their approvals.
But it was too late, the protocol was already squeezed to a pulp.
Here is how they got juiced…
Attacker Address: 0x496e5a7ba67735c7ee5eb81ef07b65b909a31345
Attack Contract: 0x17c8eA17F174B5fa49D5090933ff28cE2DF10a3c
The Attack Sequence as follows…
Initial Token Sweep: 0x093673927fc38783d37717b4bd14693c29035fceff6a0c7747db21e88c4ea28f
SYK Rewards Drain: 0x855625c6775b0acd5048b0c94466f76c3c361e2269445e66ae7ae352f04f538f
Vault Access Removal: 0x14535a9c8e7d5fa2c94de52067a3cf93369273517532e0a06871ddceb3e67dd7
Stryke Position Burns:
Batch 1: 0xad0d094c8ea32110ee3bc00d9ba040a79f5ba411296cef5e9b4d25a2c2e2a888
Batch 2: 0x1bab3323ed9d1bdea9f57809e47b93b0fc0cd154e003e96812c333dedd74c500
Asset Transfers (WETH-USDC): 0xecd160e3027b7bdd23423358f68b25eaaee08a9156f745390e14c7b7e9363195
Approval Exploitation: 0xe31cc5011c7c4ee0720674a38147f9d4765f09e138c4f1d15c45079e2b5507b3
Final Token Swaps: 0x38e5199e52eb602b48c7b63e818939908590d341e0b348c208decab146d0e556
Attacker move funds to another address:
0xeB0f537A7a1C3E38d4F57026982c11F6886233D7
Then makes their exit through Stargate:
0x02bb823d37158314680e39354d690f9182c540f6f345bacc5f4c147b60483876
The protocol’s juice was squeezed and bottled—here’s the final pulp tally:
Uniswap WETH-USDC: $135,709.63
Uniswap USDC-ARB: $100,278.28
Uniswap USDC-WBTC: $83,546.96
Uniswap BOOP-WETH: $20,109.71
Pancake WETH-USDC: $259,376.45
Pancake USDC-ARB: $65,917.20
Pancake USDC-WBTC: $146,541.50
Sushi WETH-USDC: $15,519.62
Sushi USDC-WBTC: $4,414.83
OrangeDistributor: $12,142.71614
Deposit losses: $783,966.93
Losses due to approvals: $47,447.26
Unclaimed SYK reward losses: $12,142.71614
Total losses: $843,556.90
With the damage done and assets flowing out, Orange Finance shifted into recovery mode.
Their initial response followed the familiar incident response playbook: a warning to users against protocol interaction, instructions for contract approval revocations, and finally, a negotiation attempt with their attacker.
"If you respond positively to our offer within 24 hours, we guarantee that no law enforcement agencies will be involved, and the matter will be treated as a white-hat hack."
Their follow-up investigation revealed a string of operational failures - not only no monitoring framework and inadequate processes for privileged access, but most critically, their supposedly secure multi-sig wallet configured to execute with a single signature.
Now Orange Finance promises a detailed spreadsheet documenting each user's losses, as if tabulating the damage makes it hurt less.
Meanwhile, their investigation into how the private key leaked continues - presumably right after they figure out why leaving a door unlocked might lead to theft.
How many more protocols need to learn that a multi-sig wallet is only as strong as its configuration?
Private key compromises continue to plague DeFi with mechanical regularity, each incident following the same script - vulnerability, exploit, investigation, report.
Yet protocols keep treating basic security like an optional upgrade rather than the foundation it needs to be.
Orange Finance's follow-up investigation reads like a "what not to do" manual in protocol security.
No monitoring framework, no proper access controls, and a multi-sig wallet with all the security of a garden fence.
All while users watch their funds vanish faster than their faith in Web3.
The team promises spreadsheets tracking losses and investigations into leaked keys, but these administrative band-aids can't stop the bleeding of bad security practices.
When your contract is "no longer Orange," how long until your whole protocol starts to rot?
REKT serves as a public platform for anonymous authors, we take no responsibility for the views or content hosted on REKT.
donate (ETH / ERC20): 0x3C5c2F4bCeC51a36494682f91Dbc6cA7c63B514C
disclaimer:
REKT is not responsible or liable in any manner for any Content posted on our Website or in connection with our Services, whether posted or caused by ANON Author of our Website, or by REKT. Although we provide rules for Anon Author conduct and postings, we do not control and are not responsible for what Anon Author post, transmit or share on our Website or Services, and are not responsible for any offensive, inappropriate, obscene, unlawful or otherwise objectionable content you may encounter on our Website or Services. REKT is not responsible for the conduct, whether online or offline, of any user of our Website or Services.
you might also like...
GemPad - Rekt
The perfect digital heist - missing reentrancy guards on Gem Pad let an attacker snatch roughly $1.9 million in locked tokens across three chains. Several protocols left wondering if their lock box provider should have checked their own locks first.
False Prophet
Alpaca Finance lost millions by allegedly using manual CoinGecko price updates instead of real oracles. When questioned, they asked "which faster oracle would you have used?" Turns out F5 isn't a reliable price feed. Who knew?
Clober Dex - Rekt
$500k vanished from Clober DEX when code changes met one of DeFi's oldest vulnerabilities. The twist? The exploit code wasn't there during the audits. Some security lessons write themselves.