Cryptocurrency meme coin platform Odin.fun suffers $7 million loss due to liquidity exploit
In a recent incident, the cryptocurrency trading platform Odin.fun fell victim to a liquidity manipulation attack, resulting in the loss of approximately 58.2 BTC, equivalent to around $7 million. This attack, confirmed by third-party security researchers, exploited vulnerabilities in the platform's automated market-making (AMM) system.
The attackers artificially inflated the price of a meme coin called SATOSHI within the liquidity pool on Odin.fun. By exploiting the AMM's price formula, which depends on token ratios, they were able to withdraw more valuable assets like Bitcoin at inflated prices. This sudden withdrawal caused a significant drop in Odin.fun's Bitcoin reserves.
Liquidity manipulation attacks are a type of exploit that targets smart contracts or automated liquidity market-making tools in decentralised exchanges or DeFi platforms. These attacks often leverage shallow or poorly secured liquidity pools, making them particularly dangerous for platforms with less established security measures.
In this case, Ari Redbord of TRM Labs suggested that the attack on Odin.fun was due to a flaw introduced during an AMM update. The identity of the perpetrators remains unknown, but they are believed to be primarily linked to groups in China.
Odin.fun, a Bitcoin-based meme coin launchpad, launched in January 2025 to allow users to trade Bitcoin Runes, a type of fungible Bitcoin-based token. However, the platform's treasury is not large enough to cover the losses, and while the remaining funds stored in the platform are safe, the incident has raised concerns about the security and transparency of such platforms.
This is not an isolated incident. In 2022, DeFi platform Mango Markets lost around $116 million to a similar exploit. As the DeFi sector continues to grow, so too does the risk of such attacks, with criminals often targeting new or lightly audited protocols tied to high-volatility trading.
In light of the attack, Odin.fun has paused its operations and plans to resume next week after a full audit of its code. s0xToolman, a pseudonymous analyst at DeFi auditing tool Bubblemaps, commented on the simplicity of the exploit and said there's no excuse for the team not to know this could happen.
In response, Odin.fun's partners OKX and Binance are communicating with Chinese authorities regarding the incident. As the cryptocurrency market continues to evolve, it's crucial for platforms to prioritise security measures to protect themselves from such attacks.
Read also:
- Musk announces intention to sue Apple for overlooking X and Grok in the top app listings
- Innovative Company ILiAD Technologies Introduces ILiAD+: Boosting Direct Lithium Extraction Technology's Efficiency Substantially
- Nuclear Ambitions at a U.S. Airport Spark Controversy, With Opposition Swelling
- Haval H6 Hybrid Analysis: Delving into Engine Performance and Fuel Efficiency