Back to blogs
Written by
Cyfrin
Published on
March 5, 2025

Cyfrin's Blockchain Security and Education Newsletter: March 2025

Stay ahead in Web3 security! Explore the Bybit $1.4B hack, top exploits, smart contract tips, and tools to protect your assets in Cyfrin’s latest security update.

Table of Contents

$1.4B was stolen in the largest crypto heist, but web3 is fighting back with the safe-tx-hashes tool, smarter defenses, and better security education.

Read on for the month's update from Cyfrin, security news, and industry insights. 

From Cyfrin’s world

News and partnerships

  • Protocols are using Updraft Certifications to recruit talent. So don’t forget to schedule your exam today!
  • CodeHawks redefined smart contract security, launching co-hosted audits with OpenZeppelin, Guardian Audits, and Hashlock. 
  • The Cyfrin x Chainlink collaboration is making DeFi projects stronger with exclusive audits, expert guidance, and security perks.
  • With Soneium Mainnet live, Cyfrin Audits is protecting the future of gaming, NFTs, and DeFi.
  • The Ethereum Foundation supercharged Aderyn to give devs real-time security diagnostics for Solidity.
  • The Eagles Program is here, letting CodeHawks’ elite researchers lead contests, access private audits, and earn dedicated rewards.
  • Uniswap V3 is now live on Updraft with 7 hours of expert-led content to help you build powerful DeFi protocols. 
  • Cyfrin Profiles introduced 2FA security, letting you fortify your account with device authentication and session management.

A visualization of co-hosted smart contract audits featuring CodeHawks, Hashlock, OpenZeppelin, and Guardian Audits collaborating on security reviews.


It’s all about people
: Elif joins Cyfrin after four years at Chainlink, bringing her passion for Solidity, developer education, and security. Meanwhile, Mustapha went from student to smart contract security expert in under five months, protecting billions in assets! How?

Key insights from Cyfrin:

High-profile hacks and security incidents

Bybit exploit ($1.4B): Read Cyfrin’s detailed analysis of the largest heist in crypto’s history. What’s more, Cyfrin’s guide from a few weeks ago breaks down how it could have been avoided. And even more importantly, learn web3 wallets and post-deployment security on Updraft.

A Cyfrin illustration comparing the initial assumption of a hacked computer to the actual exploit through the Safe UI in the Bybit heist.

LIBRA memecoin rug pull ($286M): The $4.4B LIBRA rug pull left 74,000 traders with $286M in losses, implicating Argentina’s President Milei and sparking a legal and political fallout.

Infini exploit ($50M): A suspected ex-developer left a hidden backdoor, bypassed security, and drained Infini’s contract. The funds were swiftly laundered through Tornado Cash, swapped for ETH, and moved to a fresh wallet. 

Ionic exploit ($12.3M): A $12.3M exploit via social engineering, in which an attacker used a fake LBTC token to drain assets, laundered $3.5M through Tornado Cash before $8.8M was frozen on Mode.

zkLend hack ($9.5M): zkLend lost $9.5M (3,600 ETH) after an attacker exploited a rounding error in the mint() function to inflate their balance, later laundering the funds through Railgun.

Industry news and resources

Turn skills into cash: Auditing is a goldmine—if you know where to look, here’s how top auditors get rich. To get ahead, learn from these critical exploits, governance takeovers, and vulnerabilities that caught experts off guard. Remember that your success depends on the quality of your vulnerability report, so master the art.

Walking in the Devil’s shoes: Discover the eight most active attackers of Q4 2024—how they operate, launder funds, and evade detection. Plus, step inside a hacker’s mind and see how they break assumptions, manipulate time, and weaponize curiosity.

A TenArmor risk analysis diagram showing the fund flow from a high-risk security exploit, with connections to Arbitrum Bridge and 1inch Aggregation.
Analysis of attackers’ fund flows; Source: TenArmor

AI: friend or foe: How do threat actors leverage generative AI for faster, more efficient attacks, and what’s stopping them from doing more damage? See Google’s findings.

Advanced security deep dives: From confidential smart contracts to Layer 2 scaling, Trusted Execution Environments (TEEs) are changing the game. And Multisig wallets aren’t as safe as you think. Here’s why.

Tool of the month: Safe-tx-hashes could have stopped the $1.4B Bybit heist by ensuring every multi-sig transaction was verified before signing. This tool helps you catch malicious transactions before they drain your funds—use it or risk becoming the next headline.

Web3 needs you

Schedule your certification exam today!

Start learning smart contract development and security on Cyfrin Updraft.

Participate in competitive audits on CodeHawks.

Did someone forward you this newsletter? Subscribe here!

Secure your protocol today

Join some of the biggest protocols and companies in creating a better internet. Our security researchers will help you throughout the whole process.
Stay on the bleeding edge of security
Carefully crafted, short smart contract security tips and news freshly delivered every week.