Back to Blog

Newsletter - March 2026

Code AuditingPhalcon Security
April 1, 2026
3 min read
Key Insights

Top 3 DeFi Incidents in March

Resolv Protocol: ~$80M

On March 22, 2026, Resolv suffered a security breach, resulting in $80M* in losses.

The root cause was compromised privileged infrastructure keys. Using the stolen key, the attacker abused a privileged swap-finalization flow and minted over 80M USR without equivalent collateral across three exploit transactions. While the root cause was straightforward, this incident revealed a broader lack of security controls, both on-chain and off-chain. The project enforced no strict validation during the minting approval, nor did it have monitoring strategies in place to detect and respond to the breach in time.

Notably, the impact extended far beyond the 80M in unauthorized USR minting. Because Resolv assets were widely used as collateral across multiple lending protocols, the depeg triggered broader contagion. As reported by Chaos Labs, on-chain curators using automated yield-seeking allocation lacked real-time risk controls and continued directing fresh capital into already impaired markets. What began as a localized exploit quickly escalated into a cross-protocol contagion event, leaving lending protocols with millions in bad debt.

*The loss is estimated based on USR’s pegged value of $1.

BitcoinReserveOffering: ~$2.7M

On March 5, 2026, the BitcoinReserveOffering contract on Ethereum was exploited for approximately $2.7M.

The root cause was a flawed business logic in the mint() function, which executed the minting logic twice when processing a full ERC-3525 SFT deposit. Because ERC-3525 inherits from ERC-721, safe transfers trigger an onERC721Received() callback. Inside the callback, the BRO token amount was calculated and minted to the caller. However, after the callback returned, the outer mint() resumed and performed a second minting operation, doubling the BRO issued per deposit. This allowed the attacker to inflate their BRO balance through repeated burn-and-mint cycles in an attack transaction.

To prevent similar issues, protocols should ensure asset accounting occurs exactly once per deposit operation, with state updates committed before any external call capable of triggering a callback. Additionally, invariant checks should be added to guarantee that minted amounts never exceed the underlying deposited value.

Venus Protocol: ~$2.15M

On March 15, 2026, Venus’s THE (Thena) market on BNB Chain suffered a donation attack combined with market manipulation. This incident resulted in approximately $2.15M in protocol bad debt, while the exploiter incurred a net on-chain loss of ~$4.7M.

Venus is a Compound V2 fork lending protocol. The affected market uses THE as its underlying assets, which have shallow on-chain liquidity. The donation attack was made possible because the market contract derives totalCash from the contract’s raw balance. This allowed the attacker to donate THE directly to the market, which increased totalCashand inflated the exchangeRate. With this inflated collateral, the attacker borrowed liquid assets, swapped them for more THE and raised THE’s market price. These obtained THE tokens were further donated into the market, continuously escalating the attack's impact.

This incident serves as a warning to the lending protocols on two fronts: accounting logic and risk configuration. Protocols should implement manipulation-resistant accounting mechanisms that accurately reflect asset values and cannot be skewed by donation attacks. Additionally, critical risk parameters such as supply caps, borrow caps, and LTV (Loan-to-Value) ratios must be carefully configured to limit protocol exposure.

For a detailed analysis, read our deep-dive post:

https://blocksec.com/blog/venus-thena-donation-attack

The information above is based on data as of 00:00 UTC, March 31, 2026.

This concludes the January security incidents brief. For more in-depth analysis of blockchain security incidents and Web3 security trends, you can explore our resources.

You can learn more in our Security Incidents Library.

Stay informed and stay secure!

Sign up for the latest updates
FATF’s New Stablecoin Report Signals a Shift to Secondary-Market Compliance
Knowledge

FATF’s New Stablecoin Report Signals a Shift to Secondary-Market Compliance

BlockSec interprets FATF’s March 2026 report on stablecoins and unhosted wallets, explains why supervision is shifting toward secondary-market P2P activity, breaks down the report’s main recommendations and red flags, and shows how on-chain monitoring, screening, and cross-chain tracing can help issuers and VASPs respond with stronger, more effective compliance controls.

Weekly Web3 Security Incident Roundup | Mar 16 – Mar 22, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 16 – Mar 22, 2026

This BlockSec weekly security report covers seven DeFi attack incidents detected between March 16 and March 22, 2026, across Ethereum, BNB Chain, Polygon, and Polygon zkEVM, with total estimated losses of approximately $82.7M. The most significant event was the Resolv stablecoin protocol's infrastructure-key compromise, which led to over $80M in unauthorized USR minting and cross-protocol contagion across lending markets. Other incidents include a $2.15M donation attack combined with market manipulation on Venus Protocol, a $257K empty-market exploit on dTRINITY (Aave V3 fork), access control vulnerabilities in Fun.xyz and ShiMama, a weak-randomness exploit in BlindBox, and a redemption accounting flaw in Keom.

Weekly Web3 Security Incident Roundup | Mar 9 – Mar 15, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 9 – Mar 15, 2026

This BlockSec weekly security report covers eight DeFi attack incidents detected between March 9 and March 15, 2026, across Ethereum and BNB Chain, with total estimated losses of approximately $1.66M. Incidents include a $1.01M AAVE incorrect liquidation caused by oracle misconfiguration, a $242K exploit on the deflationary token MT due to flawed trading restrictions, a $149K exploit on the burn-to-earn protocol DBXen from `_msgSender()` and `msg.sender` inconsistency, and a $131K attack on AM Token exploiting a flawed delayed-burn mechanism. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.

Best Security Auditor for Web3

Validate design, code, and business logic before launch. Aligned with the highest industry security standards.

BlockSec Audit

Get Real-Time Protection with Phalcon Security

Audits alone are not enough. Phalcon Security detects attacks in real time and blocks threats mid-flight.

phalcon security