Truebit - Rekt

Five years of silence. One transaction. $26.2 million gone.
Truebit's proxy contract sat on Ethereum like a time capsule - unverified bytecode, no published audits, and a bonding curve that Banteg flagged as a "rug zone" back in 2021.
At the time, apparently the warning was not enough. Rekt covered it back then. But fast forward to almost 5 years later, someone finally took action on it.
On January 8th, 2026, Truebit became DeFi's first major bloodletting of the new year when an attacker minted over 240 million TRU tokens, burned them for real ETH, and repeated the cycle until 8,535 ETH had been siphoned into Tornado Cash.
The function they called to do it? Literally named "Attack."
Truebit’s token - TRU collapsed 100% in hours - from $0.16 to effectively zero - while the protocol's slogan mocked from their Twitter page: "Don't just trust, verify."
PeckShield traced the wallet to the same address that hit Sparkle protocol for 5 ETH - twelve days earlier. A serial hunter, methodically working through DeFi's abandoned architecture.
When your slogan demands verification but your code hides behind bytecode, who exactly was supposed to do the verifying?

Cyvers caught it first on January 8th - 8,535 ETH draining from TrueBit's Purchase contract in a single sweep.
Three minutes later, TheDeFiDan spotted what would become the exploit's dark punchline - the attacker's function was literally labeled "Attack" in the transaction call.
Security researchers piled in. William Li dropped preliminary analysis noting this was "a very old contract deployed ~5 years ago" and that "old contracts are getting more popular among attackers now."
BlockScope traced the attacker's funding back to November, suggesting weeks of preparation via Rhino.fi.
PeckShield's alert landed the hardest: The same wallet that drained Sparkle protocol twelve days prior. Not an opportunist - a specialist.
Two hours passed before TrueBit acknowledged anything.
The official response finally arrived: "Today, we became aware of a security incident involving one or more malicious actors. The affected smart contract is 0x764C64b2A09b09Acb100B80d8c505Aa6a0302EF2 and we strongly advise the public not to interact with this contract until further notice."
No technical details. No acknowledgment of the $26.2 million walking out the door. Just boilerplate and a promise to coordinate with law enforcement.
A second attacker had jumped in too - someone who allegedly celebrated in a group chat while extracting roughly $250,000 in copycat profits.
The TRU token didn't crash. It evaporated. From $0.16 to $0.000000018. Liquidity pools emptied faster than holders could exit, leaving wallets full of worthless tokens and DEX traders staring at 100% losses.
First major hack of 2026, and January wasn't even two weeks old.
But how does a pricing function on a five-year-old contract suddenly return zero for billion-token mint requests?
The Math That Couldn't Add
TrueBit's exploited contract was deployed in 2021 with a simple premise - mint TRU with ETH, burn TRU for ETH.
A bonding curve mechanic where minting got progressively more expensive as supply increased.
The selling side worked differently. TrueBit would buy back tokens at 12.5% of the highest minting price - a detail Banteg had flagged during TrueBit’s chaotic 2021 launch as a "rug zone."
Almost five years later, someone finally pulled the trigger.
The vulnerability lived in getPurchasePrice(uint256 amount) - the function calculating how much ETH a user needed to mint TRU tokens.
For normal inputs, it worked fine. For absurdly large inputs - amounts far beyond any reasonable supply - the math broke.
A classic issue in older Solidity. Compiler version v0.5.3 predates automatic overflow checks - addition operations don't verify whether results exceed maximum values.
SafeMath protected multiplication and division throughout the contract, but one addition slipped through unguarded.
When the attacker passed astronomical values into the minting function, that unprotected addition overflowed. The result wrapped around to near-zero.
Cost to mint 240,442,509 TRU tokens: essentially nothing.
The attack contract executed a brutal loop (Loop is in the Event Log):
Call getPurchasePrice() with a massive amount - receive zero as the cost.
Mint billions of TRU tokens for almost nothing.
Approve and transfer tokens to the Purchase contract.
Burn the tokens, receive real ETH at the 12.5% buyback rate.
Repeat with even larger amounts.
Five iterations in a single transaction. No price impact between steps because it all happened atomically.
No supply cap stopped it. No per-transaction limit slowed it. The contract just kept minting and burning until 8,535 ETH had migrated from the protocol's reserves to the attacker's wallet.
[AstraSecAI summarized it cleanly:](https://x.com/AstraSecAI/status/2009596295456174557) "A reminder that one missed check is all it takes."
The source code was never verified on Etherscan - only bytecode visible to the public.
Anyone wanting to audit it first had to decompile. The attacker clearly did their homework.
With the protocol drained and the math exposed, where did $26.2 million go next?
The Loot Trail
BlockScope traced the attacker's wallet funding back to November 2025. Weeks of prep work before pulling the trigger.
Attacker's Primary Address: 0x6c8ec8f14be7c01672d31cfa5f2cefeab2562b50
Funding Transaction (December 6, 2025): 0xf173f0ed341d3106c1f2eda4704a5e5e9e12c8cf896eb525948624841e7d7ad
Across Protocol delivered the seed money on December 6th. Whoever did this had patience - and a bridge.
The Victim - TrueBit Protocol: Purchase Contract: 0x764C64b2A09b09Acb100B80d8c505Aa6a0302EF2
Deployed roughly five years ago. Unverified bytecode. No published audits. Sitting on Ethereum like an unlocked vault.
Attack Contract: 0x1de399967b206e446b4e9aeeb3cb0a0991bf11b8
According to Extractor by Hacken, the malicious contract was deployed in the same block as the exploit via private mempool - block position 3 for deployment, position 4 for execution. No front-running opportunities. Clean sequencing.
Primary Attack Transaction: 0xcd4755645595094a8ab984d0db7e3b4aabde72a5c87c4f176a030629c47fb014
One transaction. Five mint-burn cycles. 8,535 ETH extracted. Contract left with approximately 16 ETH.
Post-exploit, the funds scattered immediately.
Original Attacker’s Wallet:
0x6C8EC8f14bE7C01672d31CFa5f2CEfeAB2562b50
Laundering Wallet 1: 0x273589ca3713e7becf42069f9fb3f0c164ce850a
Laundering Wallet 2 (Middle Man Wallet): 0x3b58192943ee6f9ae92d54dd1ef378cfd519862a
Laundering Wallet 3 (Another Middle Man Wallet): 0x62afdd1bd84f6b152572404be90679ae58eb4862
Laundering Wallet 4: 0xD12f6E0fa7FBF4e3A1c7996E3F0Dd26AB9031a60
Lookonchain confirmed on January 10th that the attacker deposited all 8,535 ETH into Tornado Cash - the entire haul is now laundered.
Tornado Cash Laundering Wallet:
0xD841C52B68c5dB133078ABa039bd9EAF19b0b135
Once the primary exploit landed on-chain, the vulnerability was public. MEV bots and copycat attackers piled in to grab whatever scraps remained.
The second attacker left a smaller footprint but they were not alone.
Second Attacker’s Wallet (~$253K - Not known to be involved in the first attack):
0xc0454E545a7A715c6D3627f77bEd376a05182FBc
How opportunistic, they saw the primary exploit land and jumped in for scraps.
PeckShield connected the primary wallet to something bigger: The same address drained Sparkle protocol twelve days earlier for approximately 5 ETH.
5 ETH to 8,535 ETH. A 1,700x escalation in under two weeks.
Not a one-time opportunist. But a possible hunter, working through a target list.
With half the funds already mixed and the other half sitting in known wallets, what does TrueBit's collapse tell us about DeFi's growing graveyard of abandoned code?
Relic Hunters
TrueBit isn't an isolated incident. It's the latest entry on a growing kill list.
Balancer bled $128 million on November 3rd when rounding errors in five-year-old Composable Stable Pools turned into a precision heist across multiple chains.
Yearn's yETH lost $9 million on November 30th - a forgotten stableswap pool with "novel math" that nobody maintained minted tokens to infinity.
Abracadabra watched $1.8 million walk out the door on October 4th through "deprecated" CauldronV4 contracts that were labeled as legacy but never actually turned off.
Aevo (formerly known as Ribbon Finance), surrendered $2.7 million in December via a proxy admin vulnerability in old vaults.
Rari Capital hemorrhaged ~$2 million in December from a multisig takeover on a protocol that had already ceased operations.
Now TrueBit joins the list at $26.2 million - bytecode nobody verified, audits nobody published, math nobody checked.
stormblessed, a former Yearn developer, voiced what others were thinking: “Another victim of legacy code? It’s going to keep happening."
The advice? “Teams should assume old code its being actively looked at and either deprecate/sunset or reaudit.”
Anthropic's research added fuel to the fire. Their AI agents, when pitted against 405 previously exploited smart contracts, autonomously achieved $4.5 million in successful exploits - including contracts deployed after the models' knowledge cutoff.
The bar for finding bugs in old code has never been lower. The rewards have never been higher.
TrueBit's attacker didn't need sophisticated new techniques. They needed patience, time to reverse-engineer unverified code, and a target list of contracts that nobody was watching anymore.
Five years of dormancy. One month of preparation. One transaction to drain it all.
No recovery plan has been announced. No compensation timeline. Their most recent update on January 9th mentioned they have “engaged additional resources to strengthen tracing and recovery.”
Maybe they should have engaged what really mattered - their own infrastructure.
How many more loaded contracts are sitting on Ethereum and other networks right now, waiting for someone curious enough to read the bytecode?

"Don't just trust, verify" aged like milk left on a bonding curve.
TrueBit launched in chaos back in 2021 - stealth deployment, confused investors, Banteg warning about rug zones in their tokenomics.
Five years later, that chaos came home to collect $26.2 million.
No audits published. No source code verified. No team watching the old contracts while they built whatever came next.
The attacker did exactly what the slogan demanded. They verified. They found the overflow. They extracted every last ETH the math would give them.
DeFi keeps shipping new products while legacy infrastructure rots in production. Balancer, Yearn, Abracadabra, Aevo, and Rari Capital - the archives have become a shopping list for anyone with patience and a decompiler.
TrueBit's contract sat dormant for almost half a decade. One attacker. One transaction. One month of planning for a lifetime payout.
The hunter who drained TrueBit started with 5 ETH from Sparkle and graduated to 8,535 ETH in under two weeks. They're still out there, and odds are they might not be done shopping.
If legacy code is worth killing, maybe it's worth a bounty to find out who's doing the killing?

REKT作为匿名作者的公共平台,我们对REKT上托管的观点或内容不承担任何责任。
捐赠 (ETH / ERC20): 0x3C5c2F4bCeC51a36494682f91Dbc6cA7c63B514C
声明:
REKT对我们网站上发布的或与我们的服务相关的任何内容不承担任何责任,无论是由我们网站的匿名作者,还是由 REKT发布或引起的。虽然我们为匿名作者的行为和发文设置规则,我们不控制也不对匿名作者在我们的网站或服务上发布、传输或分享的内容负责,也不对您在我们的网站或服务上可能遇到的任何冒犯性、不适当、淫秽、非法或其他令人反感的内容负责。REKT不对我们网站或服务的任何用户的线上或线下行为负责。