
Decentralized crypto lending and borrowing platform Venus Protocol was recently targeted in a supply cap/flash-loan attack, resulting in an estimated $3.7 million loss.
The team said Sunday that it detected unusual activity in the Thena token (THE) pool. Withdrawals and deposits were temporarily paused while the team conducted an investigation. Additional details about the incident have since been released.
According to Allez Labs, the risk manager for the Venus Protocol, the attack occurred in two stages. In the first stage, the attacker gradually acquired 84% of Thena’s (THE) 14.5 million token supply, which represents the platform’s maximum supply. THE is the native cryptocurrency of the Thena decentralized finance platform.
The accumulation of the Thena token began as early as March 2025 and continued over a nine-month period, Allez Labs reported.
To bypass Thena’s 14.5 million token supply cap on Venus, the attacker moved to the second stage of the exploit, transferring tokens directly to the protocol’s contract and pushing the supply to 53.2 million tokens.
Timeline of the Thena Token Supply Cap Breach, according to Allez Labs:
12:00 UTC: 49,500,000 THE supplied (341% of the cap)
12:42 UTC: 53,200,000 THE supplied (367% of the cap)
After accumulating a large amount of Thena tokens (THE), the attacker used 53.2 million of them as collateral to borrow other cryptocurrencies, including 6.67 million CAKE, 1.58 million USDC, 2,801 BNB, and 20 BTC. CAKE is the native token of the PancakeSwap decentralized exchange.
Although Thena initially had low on-chain liquidity, the attacker’s repeated use of it as collateral, along with additional purchases, caused its price to spike from around $0.27 to nearly $0.53, Allez Labs said. Out of caution, Venus Protocol paused withdrawals and borrowing of THE and CAKE tokens on its platform.
Analyzing the scale of the attack, Wu Blockchain reported that the attacker’s wallet obtained roughly 20 BTC, 1.5 million CAKE, and 200 BNB, totaling more than $3.7 million.
The Thena token (THE), which was primarily used in the flash loan attack, has seen its price decline by more than 17% over the past 24 hours. As of the time of publication, THE was trading at around $0.1949.

Trust Wallet has introduced a new address-poisoning protection feature that prevents crypto users from falling for address-poisoning attacks.
According to the company, this new feature automatically checks the destination address against a database of known scam and lookalike addresses to prevent malicious transactions. Because the feature runs automatically, users will receive real-time warnings if a risk is detected.
For now, the feature will be supported on 32 Ethereum Virtual Machine (EVM) chains, including Ethereum, BNB Smart Chain, Polygon, Optimism, Arbitrum, Avalanche, and Base.
Address poisoning is a phishing-style attack in which scammers trick users into sending cryptocurrency to the wrong wallet address, usually one that closely resembles a legitimate address.
Here’s how address poisoning works:
While address poisoning may not look as sophisticated or complex as other forms of crypto attacks, it has had a long history of success for scammers.
In May 2024, a user accidentally sent 1,155 Wrapped Bitcoin (WBTC) worth approximately $68 million to a fake address. The attacker created a fake address that looked like the legitimate address, and due to lack of proper scrutiny, the user fell for it.
While in May 2025, a trader lost $2.6 million after falling for two address poisoning scams, and later that year, another trader lost $50 million in USDT after sending them to a poisoned wallet address.
Knowing that most crypto users rarely fall for address poisoning scams (roughly 1 success per 10,000 attempts), attackers often rely on scale to succeed.
Between July 2022 and June 2024, over 270 million address poisoning attempts were recorded across the Ethereum and BNB Chain, with 6,633 of these attempts successful, leading to a loss of over $83 million.
In another address poisoning campaign, scammers used 82,031 fake addresses on 2,774 victims. The result? Over $69 million was lost.
And just last year, there were about 32,290 recorded address poisoning attacks in September, which affected over 6,000 victims.