Skip to main content
6 min read

$56M Stolen, 13 Exploits, 4 Supply Chain
Attacks — March 2026 Was a Bloodbath for Web3 Security

March 2026 saw over $56 million drained across 13 on-chain exploits and 4 critical supply chain attacks targeting developers. From the $25M ResolvLabs minting catastrophe to North Korean npm malware and zero-click Python backdoors — here's the full breakdown.

AUTOSEC.DEVAUTOSEC.DEV
$56M Stolen, 13 Exploits, 4 Supply Chain Attacks — March 2026 Was a Bloodbath for Web3 Security
  • Coverage Period: March 1–31, 2026
  • Total On-Chain Losses: ~$56,000,000+
  • Security Events Tracked: 13
  • Vulnerability Alerts Issued: 4
  • Most Devastating Incident: ResolvLabs — $25M
  • Emerging Threat: Developer toolchain supply chain poisoning

Key Takeaway

March 2026 delivered a clear message: attackers are now operating on two fronts simultaneously — exploiting DeFi protocol logic on-chain while poisoning the very tools developers use to build. The convergence of Web3 exploits and Web2 supply chain attacks marks a dangerous new chapter. No one — from protocols managing billions to solo developers running npm install — was safe.


By The Numbers: On-Chain Carnage

March saw 13 distinct security incidents across Ethereum, BSC, Polygon zkEVM, and HypeEVM, collectively draining over $56 million. Here's what happened:

DateProjectLossAttack Vector
Mar 2Inverse Finance~$240KPrice Manipulation
Mar 3UniswapV4 Router04~$42KPrivilege Bypass (Inline Assembly)
Mar 5Inugami~$8.75KStaking Logic Flaw
Mar 5sillytuna (Address Poisoning)~$24MAddress Poisoning
Mar 6Solv Protocol~$2.73MDouble-Minting (Reentrancy)
Mar 10Gondi~$230KNFT Authorization Flaw
Mar 12DBXen~$150KERC-2771 Identity Confusion
Mar 12bonk.fun$0 (Contained)Domain Hijacking
Mar 16Venus Protocol~$3.7MLow-Liquidity Collateral Manipulation
Mar 17dTRINITY~$257KFirst-Deposit Inflation
Mar 18Keom Protocol~$94KRedemption Logic Error
Mar 23ResolvLabs~$25MMinting Logic Vulnerability
Mar 31InfinitySix~$270KOracle/TWAP Manipulation

The Big Three: Incidents That Shook the Industry

1. ResolvLabs — $25M Evaporated in a Single Transaction

The largest exploit of the month. An attacker turned 200,000 USDC into 80 million $USR by exploiting a critical minting logic flaw. Because direct $USR liquidity was thin, the attacker laundered through $wstUSR staking pools and converted everything to ETH. The $USR stablecoin lost 80% of its peg within hours. The attacker's wallet still holds ~11,400 ETH and 20M $wstUSR.

Lesson: Minting functions are critical infrastructure. Rate limits, multi-sig governance, and circuit breakers on abnormal mint volumes are non-negotiable.

2. sillytuna Address Poisoning — $24M Drained

A textbook address poisoning attack siphoned ~$24M in aEthUSDC from addresses linked to on-chain persona "sillytuna." The attacker began bridging funds to Arbitrum in small batches to obscure the trail. ~$20M in DAI was moved through intermediary wallets.

Lesson: Address poisoning continues to be one of the highest-ROI attack vectors. Wallet UIs must implement stronger address validation, and users must verify full addresses — not just the first and last characters.

3. Venus Protocol — $3.7M via Low-Liquidity Collateral

The attacker deposited massive amounts of the low-liquidity $THE token as collateral, borrowed 20 BTC, 1.5M CAKE, and 200 BNB, then triggered cascading liquidations. A single user controlled over 60% of the collateral pool — a concentration risk that should have triggered automated safeguards.

Lesson: Lending protocols must enforce collateral concentration limits and real-time liquidity depth checks before accepting low-cap assets.


The Developer Front: Supply Chain Attacks Are Escalating

March's most alarming trend wasn't on-chain — it was in your node_modules and Python environments. Four critical supply chain attacks targeted the developer toolchain directly:

North Korean npm Campaign (FAMOUS CHOLLIMA)

The DPRK-linked threat group published 26 malicious npm packages (e.g., argonist, bcryptance, expressjs-lint) masquerading as legitimate utilities. The packages deployed RATs that harvested SSH keys, Git credentials, browser passwords, and clipboard data. C2 resolution used steganography via Pastebin. Risk: Critical.

LiteLLM — Zero-Click Python Backdoor

Threat actor TeamPCP compromised upstream Trivy's GitHub Action to steal LiteLLM's PyPI publishing token. The poisoned versions (1.82.7, 1.82.8) included a .pth file that executes automatically when any Python process starts — no import needed. The payload harvested SSH/cloud/K8s credentials, attempted Kubernetes container escapes, and installed a persistent systemd backdoor polling C2 every 50 minutes. Risk: Critical.

Apifox Desktop — CDN Script Tampering

Apifox's CDN-hosted event tracking script was tampered with, turning the popular API development tool into a credential stealer. The payload targeted SSH keys, Git credentials, shell history, and Apifox project data. Exfiltration used Gzip + AES-256-GCM encryption to evade detection. Risk: Critical.

OpenAI Codex Desktop — Zero-Authorization RCE

A vulnerability discovered by DARKNAVY allowed remote code execution simply by opening a folder in OpenAI Codex. The exploit bypassed the Default Permission model entirely — no popups, no prompts, no user interaction required. Over 2 million developers were potentially affected. Risk: Critical.


Attack Vector Breakdown

The 17 incidents tracked in March reveal a diversifying threat landscape:

  • Logic/Design Flaws: 5 incidents (Inugami, Solv, Keom, dTRINITY, ResolvLabs)
  • Oracle/Price Manipulation: 3 incidents (Inverse Finance, Venus, InfinitySix)
  • Supply Chain Poisoning: 3 incidents (FAMOUS CHOLLIMA npm, LiteLLM, Apifox)
  • Social Engineering / Phishing: 2 incidents (Address Poisoning, bonk.fun Domain Hijack)
  • Access Control Flaws: 2 incidents (UniswapV4 Router04, Gondi)
  • Identity Confusion: 1 incident (DBXen ERC-2771)
  • AI Toolchain Vulnerability: 1 incident (OpenAI Codex RCE)

  1. Supply chain attacks are now a Web3 problem. Three of the four supply chain incidents this month directly targeted crypto/Web3 developer tooling. Expect this to intensify.
  2. Oracle manipulation isn't going away. Despite years of industry awareness, TWAP-based and low-liquidity oracle exploits remain profitable. Protocols continue to launch without adequate price feed validation.
  3. AI development tools are the new attack surface. The OpenAI Codex RCE demonstrates that AI coding assistants — tools that inherently require broad system access — are high-value targets. As adoption grows, so will exploitation.
  4. First-deposit/inflation attacks persist on forks. The dTRINITY incident is yet another Aave-fork falling to a well-known vulnerability pattern. Forked protocols must audit beyond the upstream codebase.

AUTOSEC.DEV Solution: Building a 360-Degree Defense

To counter hybrid attacks involving "Web2 Breach + Web3 Monetization," AUTOSEC.DEV provides comprehensive protection from code to personnel:

  1. Team OPSEC (Operations Security) Audit & Hardening: We provide enterprise-grade security training and configuration for core Web3 team members. We assist teams in deploying security hardware and risk detection software to increase the difficulty of social engineering attacks, while auditing password management protocols and device security policies.
  2. End-to-End Incident Response (IR): In an emergency, every second of confusion amplifies the loss. AUTOSEC.DEV provides standardized SOPs (Standard Operating Procedures) and rapid response services tailored to specific business needs to help projects mitigate losses quickly.

Service Content


Reference