The Moonwell hack on November 4, 2025, resulted in a $1 million loss for the DeFi lending platform due to a faulty oracle providing incorrect prices for wrapped restaked ETH. An attacker exploited this vulnerability using flash loans to borrow assets repeatedly on Base and Optimism networks, highlighting ongoing risks in decentralized finance.
-
Exploit Mechanism: The hacker flashloaned minimal wrstETH, deposited it, and borrowed over 20 wstETH multiple times thanks to the oracle’s erroneous $5.8 million price for wrstETH.
-
The attack drained funds from Moonwell’s lending markets on Base and Optimism, marking the platform’s fourth major incident in three years according to security firm QuillAudits.
-
Post-hack, Moonwell’s WELL token fell 13.5%, trading at $0.1158, a 51% monthly decline per CoinMarketCap data, amid broader DeFi security concerns with $18.18 million in October 2025 losses reported by PeckShield.
Moonwell hack exposes DeFi oracle vulnerabilities: $1M loss from faulty pricing on Nov 4, 2025. Learn causes, impacts, and security lessons for crypto investors today.
What is the Moonwell Hack?
The Moonwell hack refers to a cybersecurity breach on November 4, 2025, targeting Moonwell, a decentralized lending and borrowing protocol built on the Base and Optimism networks. The incident involved an attacker exploiting a faulty oracle—a data feed providing asset prices—which incorrectly valued wrapped restaked ETH (wrstETH) at approximately $5.8 million. This error enabled the hacker to secure excessive loans, resulting in about $1 million in stolen funds, primarily through repeated borrowing of wstETH using minimal collateral.
Moonwell, a fork of Compound Finance v2, features borrow and supply caps, cross-chain governance, and multi-token emissions to facilitate secure lending. However, reliance on external oracles for pricing introduced this critical flaw, allowing the exploit to unfold in a single transaction via a flash loan. Security analyses from firms like CertiK and QuillAudits confirmed the vulnerability’s role, emphasizing the need for robust data verification in DeFi protocols.
How Did the Moonwell Exploit Unfold?
The Moonwell exploit began with the attacker initiating a flash loan of roughly 0.02 wrstETH, which was then deposited into the protocol’s lending contract. Due to the oracle’s malfunction, the system perceived this small deposit as worth $5.8 million, enabling the borrower to withdraw over 20 wstETH—valued at around $50 million at current rates—multiple times in rapid succession. Each cycle involved selling the borrowed assets for profit and repaying the flash loan within the same blockchain transaction, leaving the protocol with uncollateralized losses.
QuillAudits’ investigation revealed that the faulty data feed affected both Base and Optimism deployments, targeting markets for wrapped and staked ETH variants. “Another day, another Moonwell exploit. 4th major incident in 3 years,” noted QuillAudits in their report, underscoring a pattern of vulnerabilities. CertiK Alert detailed the mechanics: the exploiter profited 295 ETH, equivalent to $1 million, by chaining these manipulations across lending pools. This event echoes prior oracle-based attacks, where single points of failure in price feeds have led to multimillion-dollar drains in DeFi ecosystems.
Experts in blockchain security, such as those from PeckShield, highlight that while DeFi hacks decreased by 85.7% in October 2025 to $18.18 million across 15 incidents, oracle manipulations remain a persistent threat. Enhanced multi-oracle strategies and real-time monitoring could mitigate such risks, as recommended by industry standards from the Ethereum Foundation.
CertiK Alert (@CertiKAlert) November 4, 2025
The breach not only depleted liquidity but also eroded user confidence. Moonwell’s team acknowledged the issue and paused affected contracts to assess damages, committing to user compensation from reserves. This proactive response aligns with best practices outlined by DeFi security protocols, yet it underscores the sector’s fragility.
QuillAudits 🔜 Devconnect 🇦🇷🥷 (@QuillAudits_AI) November 4, 2025
Frequently Asked Questions
What Are the Long-Term Impacts of the Moonwell Hack on DeFi Investors?
The Moonwell hack, occurring on November 4, 2025, led to a $1 million loss and a 13.5% drop in the WELL token price, exacerbating a 51% monthly decline to $0.1158. Investors face heightened volatility and liquidity risks in affected pools, prompting calls for diversified portfolios and oracle redundancy to safeguard against similar oracle exploits in DeFi lending platforms.
How Can Users Protect Themselves from Oracle-Based Attacks in DeFi Like the Moonwell Hack?
To shield against oracle vulnerabilities as seen in the Moonwell hack, DeFi users should opt for protocols with multi-source price feeds and conduct due diligence on audit histories. Enabling two-factor authentication, monitoring on-chain alerts from firms like CertiK, and limiting exposure to high-leverage borrowing can significantly reduce risks when engaging with lending platforms on networks like Base and Optimism.
Key Takeaways
- Oracle Reliability is Crucial: Faulty price data enabled the $1M Moonwell exploit; protocols must implement diverse oracles to verify asset values accurately.
- Flash Loan Risks Persist: Attackers used minimal collateral to drain funds repeatedly, highlighting the need for borrow caps and real-time anomaly detection in DeFi systems.
- Security Patterns Demand Action: As Moonwell’s fourth hack in three years, users should prioritize audited platforms and stay updated via reputable security reports to mitigate future threats.
Moonwell (@MoonwellDeFi) November 3, 2025
Despite Moonwell’s record $2.12 million in fees generated in October 2025—driven by rising borrowing demand and higher rates—the hack overshadowed these gains. The WELL token’s sharp decline reflects broader market jitters, with the crypto sector down 3.95% that day. Earlier incidents, including a $1.7 million oracle hack in October 2025, a $320,000 flash loan attack in December 2024, and a 2022 debt liquidation tied to the Nomad Bridge exploit, paint a concerning picture of recurring vulnerabilities.
Moonwell’s decision to end its Immunefi bug bounty program earlier in 2025 has drawn criticism, potentially weakening proactive security measures. In the wider DeFi arena, the Moonwell incident follows the Balancer exploit on November 3, 2025, which siphoned $100-128 million from liquidity pools across networks, and a Berachain pause after a $12 million risk from an Ethena/Honey tripool vulnerability. “When approximately $12m of user funds are at risk, we attempted to coordinate the validator set to protect those users,” stated Smokey The Bera, Berachain’s Chief Smokey Officer.
PeckShieldAlert (@PeckShieldAlert) November 1, 2025
Conclusion
The Moonwell hack of November 4, 2025, exemplifies the enduring challenges of oracle accuracy and flash loan exploits in DeFi lending protocols. With losses totaling $1 million and contributing to sector-wide concerns alongside Balancer and Berachain incidents, it reinforces the importance of rigorous audits and diversified data sources. As DeFi evolves, platforms like Moonwell must prioritize enhanced security frameworks to rebuild trust; investors are advised to monitor developments closely for safer participation in decentralized finance.
Moonwell lost $1M after a hacker exploited faulty oracle prices, showing how DeFi platforms remain vulnerable to data and system flaws.
![]()

TAGGED:Decentralized Exchange




