Radiant Capital, a decentralized finance (DeFi) lender, reported a significant security breach across multiple blockchain networks, resulting in substantial financial losses.
DeFi lender Radiant Capital suffered a multi-chain attack on Wednesday, with attackers exploiting vulnerabilities in Radiant’s blockchain contracts on the Binance Smart Chain (BSC) and Arbitrum platforms.
This enabled them to siphon off digital assets, including USD Coin (USDC), Wrapped BNB (WBNB), and Ethereum (ETH), amounting to over $50 million.
According to a recent report by web3 security startup Ancilia, the attack entailed exploiting the ‘transferFrom’ function in the blockchain contracts. Through this vulnerability, the attackers were able to perform unauthorized transactions from users' accounts, leading to the direct theft of USDC, WBNB, and ETH from Radiant’s liquidity pools.
The firm, however, stated that the exploitation of this function could have been prevented by implementing more security measures, such as regular audits of contract changes.
Furthermore, it was revealed that out of the eleven private keys used for protecting and enhancing the Radiant protocols, three had been compromised. Security experts are now investigating how the keys were obtained, speculating either a phishing attack on key holders or a compromised interface.
In response to the breach, all lending operations on the Binance Chain and Arbitrum markets initiated by Radiant Capital have been suspended. The organization has also partnered with blockchain security companies SEAL911 and Hypernative to address the issues and prevent future cases.
Radiant has called on its users to delete suspicious approvals on their profiles and has temporarily suspended new transactions.
“We are aware of an issue with the Radiant Lending markets on Binance Chain and Arbitrum. We are working with SEAL911, Hypernative, ZeroShadow & Chainalysis and will provide an update as soon as possible. Markets on Base and Mainnet are paused until further notice.”
The community response has been one of concern, especially since several similar incidents have occurred in the DeFi sector over the past few months. The loss at Radiant Capital raises questions about the effectiveness of existing measures to protect user’s assets.
Moreover, experts highlight that multi-signature wallets, like the ones used by Radiant Capital, require real-time monitoring to prevent unauthorized access. This underscores the need for higher levels of security to protect against such losses, especially considering the growing regulatory attention towards the increasing crypto hacks.
In related news, US prosecutors have proposed a 5-year imprisonment for Ilya Lichtenstein, following his role in planning the 2016 hack of the Bitfinex exchange, where $6 billion was stolen. Lichtenstein pleaded guilty to charges of money laundering, with his wife, Heather Morgan, facing an 18-month imprisonment for her involvement in the scheme.
The above is the detailed content of USDC, WBNB, ETH Vanish in $50M Radiant Capital Cyberattack. For more information, please follow other related articles on the PHP Chinese website!

A summary of the latest top ten virtual currency trading platforms in 2025: Binance, Ouyi, Gate.io and Huobi, etc.: 1. Binance is known for its strong liquidity and diversified trading pairs; 2. Ouyi is known for its technical support and security; 3. Gate.io provides more than 1,000 cryptocurrency trading pairs; 4. Huobi supports multiple cryptocurrency trading and launches its own public chain.

After US President Trump spoke on Friday that if there is no progress in the Russian-Ukrainian peace talks and the United States will give up pushing negotiations between the two countries, Russian President Putin suddenly announced on Saturday that the Ukrainian war has entered Easter truce, and all military operations will cease from 6 p.m. Moscow time on Saturday to midnight on Sunday. "Based on humanitarian considerations... Russia announced an Easter ceasefire. I ordered that all military operations be stopped during this period. We assume that Ukraine will follow our practices. At the same time, our army must be ready to counter the ceasefire violations and provokes the enemy's army, or any invasion operations." Ukraine proposed to extend the ceasefire to 30 days in response.

Major altcoins such as DOGE Dogecoin and Cardano (ADA) rose by more than 10%, while Solana's SOL, BNB and XRP rose by at least 7%. The bull market was driven by market sentiment and a trade deal between the United States and the United Kingdom, and the liquidation amounts of cryptocurrency exchanges Binance and OKX also exceeded $500 million, a record high in history. Ethereum (ETH) has soared by 20% in the past 24 hours, leading other cryptocurrencies to surge, but has triggered a significant short clearance in the past 24 hours.

On May 8, 2025, Binance Launchpool's 48th phase project Space andTime (SXT) will be opened for trading soon. This "Web3 data layer leader" bet by top capitals such as Microsoft, Chainlink, and FrameworkVentures was in huge controversy on the eve of the token's launch: the initial price of the token was $0.17, a 70% drop from the pre-market OTC trading peak ($0.56) in Gate.io, and the sound of "short SXT" in the community continued to rise. Is the market wrongly killing or the value return

How much does it cost to mine a Bitcoin after one year of halving? As we all know, halving will double production costs, and the media portrays this phenomenon every four years as a threat to Bitcoin’s survival. Miners who pursue profits not only have to face volatile mining difficulties and energy costs, but also if the price of Bitcoin rises, they can earn more money for every bitcoin they mine. As BTC prices rise, high prices attract more miners, resulting in Bitcoin’s total hash rate and difficulty reaching all-time highest levels. In fact, although mining revenue is basically the same as the five-year average, the current mining difficulty is five times that of April 2021, 40% higher than before the last halving. Therefore, mining Bitcoin is more difficult than ever. So, now dig

What is Radius? How does Radius work? Radius bridges MEV capture and searcher revenue in a secure, user-centric environment, leveraging encryption to ensure fairness and transparency within the rollup ecosystem. While the world is rapidly moving towards modularity and rollups show considerable scalability potential, building a sustainable rollup ecosystem remains challenging. This challenge stems from existing rollup designs and pain points faced by users. With the expansion of the rollup ecosystem, solving user pain points has become crucial, including ensuring transaction security and rapid ending.

A summary of the latest top ten virtual currency trading platform apps in 2025: Binance, Ouyi, Gate.io and Huobi. 1. Binance is known for its strong liquidity and diversified trading pairs; 2. Ouyi is known for its technical support and security; 3. Gate.io provides more than 1,000 cryptocurrency trading pairs; 4. Huobi supports multiple cryptocurrency trading and launches its own public chain.

When conducting contract trading on the Huobi Huobi platform, closing position operations are one of the basic skills that traders must master. Close positions means ending the current contract position, thereby achieving profit or stop loss. This article will introduce in detail the closing operation steps of contract trading on Huobi Huobi platform, and ensure that each step is clear and easy to understand.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Notepad++7.3.1
Easy-to-use and free code editor

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.
