At a Glance
- Makina Finance lost 1,299 ETH in a January 20 flash-loan exploit
- Attacker borrowed 280 million USDC to manipulate the DUSD/USDC pool oracle
- $4.13 million drained before funds split between two wallets
- Why it matters: Another oracle-manipulation attack underscores ongoing DeFi security gaps
Makina Finance became the latest DeFi casualty after an attacker used a 280 million USDC flash loan to distort pricing data and siphon $4.1 million from its DUSD/USDC Stableswap pool.
How the Attack Unfolded
Blockchain security firm PeckShieldAlert first flagged the breach on X, reporting that roughly 1,299 ETH-about $4.13 million-had been stolen from the protocol.
On-chain records show the hacker:
- Took out a 280 million USDC flash loan
- Funneled 170 million USDC to manipulate the MachineShareOracle
- Swapped 110 million USDC through the pool to extract $5 million in value
A MEV bot operating from address 0xa6c2 front-ran the malicious transaction, draining the 1,299 ETH before the attacker could complete the final moves. The stolen assets were later split:

| Destination address | Amount held |
|---|---|
| 0xbed2 | $3.3 million |
| 0x573d | $880,000 |
Protocol Response
Makina Finance addressed users on social media:
> “Gmak, early this morning we received reports regarding an incident with the $DUSD Curve pool.”
The team stressed that only DUSD liquidity-provider positions on Curve were affected; other assets and deployments remain untouched. Underlying assets stored in the protocol’s machines are secure, they added.
As a protective step, security mode has been activated across all machines while the investigation continues. Liquidity providers in the DUSD Curve pool have been urged to withdraw funds.
Wider DeFi Fallout
The incident follows last week’s Truebit Protocol breach, which cost the project $26.5 million in ETH. In that case, the attacker exploited a smart-contract pricing flaw to mint TRU tokens at no cost. No recovery plan has been announced, and the stolen funds still sit on-chain.
Security vendors SlowMist and Certik have since published post-mortems warning that outdated Solidity versions pose systemic risks. They recommend wrapping calculations with the SafeMath library to prevent integer-overflow vulnerabilities.
Key Takeaways
- Oracle manipulation remains a popular attack vector when pricing data can be distorted with large flash loans
- MEV bots can front-run malicious transactions, complicating fund recovery
- Protocols relying on single oracles face heightened risk
- Outdated Solidity versions continue to expose DeFi projects to known exploits
Sophia A. Reynolds reported for News Of Los Angeles.

