Skip to content

Matcha Meta Exploit Drained $16.8M Via Compromised Router

Warning sign with Matcha Meta logo. Matcha Meta Exploit Drained $16.8M Via Compromised Router

A recent DEX aggregator Matcha Meta exploit has been reported with a U$D 16.8 million value loss. The critical vulnerability was identified with the SwapNet router contract. This incident was confirmed and informed, and funds were drained from affected users who had opted out of the Matcha Meta one-time approval safety feature.

How the SwapNet Router Vulnerability Was Exploited

The attack exploited a critical, yet common, DeFi weakness: persistent token approvals. Matcha Meta offers a security feature called “0x One-Time Approval,” which only grants temporary permission for a trade. For instance, users who manually disabled this feature gave standing, unlimited approval to underlying aggregator contracts, including SwapNet.

The attacker took advantage of this vulnerability found within SwapNet’s router to drain funds from user accounts that had already pre-approved wallets. After the attack took place, on-chain analysis revealed that the hacker exchanged funds for around U$D 10.5 million worth of USDC and used these funds to buy a total of 3,655 ETH on the Base platform. After purchasing the ETH, the attacker utilized a bridge to transfer stolen ETH back to the Ethereum mainnet, a typical obfuscation tactic.

Matcha Meta Exploit Drained $16.8M Via Compromised Router: A vulnerability in the third-party SwapNet router siphoned funds from users who disabled one-time approvals.
Matcha Meta Exploit Drained $16.8M Via Compromised Router. (source: Certik)
Matcha Meta Exploit Drained $16.8M Via Compromised Router: A vulnerability in the third-party SwapNet router siphoned funds from users who disabled one-time approvals.
Matcha Meta Exploit Drained $16.8M Via Compromised Router (Source: EtherScan)

Why This Incident Highlights a Systemic DeFi Risk

This Matcha Meta exploit highlights the dangers of systemic DeFi risk. The use of a third-party router by Matcha exemplifies how one weak link in a transaction path can weaken security for all users. While no direct contract was compromised in the core 0x protocol, Matcha was forced to cancel/remove the option for users to give direct access to aggregator contracts after identifying the attack. 

Moreover, this action, while necessary, also highlights the tension between user control (opting out of security features) and platform-enforced safety in a permissionless DeFi ecosystem.

Disclaimer: All content provided on Times Crypto is for informational purposes only and does not constitute financial or trading advice. Trading and investing involve risk and may result in financial loss. We strongly recommend consulting a licensed financial advisor before making any investment decisions.

A Web3 Journalist at TimesCrypto with a knack for turning complex ideas into engaging stories. With a solid Tech background, Alan has led teams to create and refine impactful projects across industries, working in firms such as IBM, Cisco Systems, and Telecom. He’s passionate about Blockchain, Finance, Science, bringing a unique blend of technical expertise and creative flair to every piece he writes. When he’s not crafting content, you’ll find him diving deep into research or just having some fun!

Zoomable Image