A major security incident has rocked the DeFi space as roughly $3 million worth of ETH was funneled into Tornado Cash shortly after Yearn Finance's yETH vault showed signs of a potential exploit. On-chain data reveals the suspicious movement of funds through the privacy protocol, a common tactic used to obscure transaction trails following hacks. The Yearn team hasn't issued an official statement yet, but community members are closely monitoring wallet activities. This incident adds to growing concerns about smart contract vulnerabilities in yield-generating protocols.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
8 Likes
Reward
8
5
Repost
Share
Comment
0/400
bridgeOops
· 15h ago
Yearn is in trouble again, this time with 3 million? Tornado Cash Money Laundering... Contract audits really need to be checked properly.
View OriginalReply0
FunGibleTom
· 12-01 06:55
Another Defi drama, has Yearn come up with another issue? smh
View OriginalReply0
FreeMinter
· 12-01 06:37
It's both Yearn and Tornado, this script is quite a trap.
View OriginalReply0
LucidSleepwalker
· 12-01 06:34
3 million ETH has rushed into Tornado Cash, this is about to blow up.
View OriginalReply0
MEVSandwich
· 12-01 06:30
Another Decentralized Finance bomb... Is Yearn in trouble again?
A major security incident has rocked the DeFi space as roughly $3 million worth of ETH was funneled into Tornado Cash shortly after Yearn Finance's yETH vault showed signs of a potential exploit. On-chain data reveals the suspicious movement of funds through the privacy protocol, a common tactic used to obscure transaction trails following hacks. The Yearn team hasn't issued an official statement yet, but community members are closely monitoring wallet activities. This incident adds to growing concerns about smart contract vulnerabilities in yield-generating protocols.