XLinkedInTelegram
Hack Analysis

BetterBank Exploit: $5M Lost in Reward Hack

A major exploit hit BetterBank, resulting in a $5M loss from a reward hack. Learn how this security breach unfolded and its impact on users.

Author
QuillAudits Team
August 30, 2025
BetterBank Exploit: $5M Lost in Reward Hack
XLinkedInTelegram

On August 27, 2025, BetterBank, a decentralized lending protocol on PulseChain, suffered a liquidity manipulation and reward minting exploit, leading to losses of roughly $5 million. The attacker abused the protocol’s bonus minting mechanism for its native tokens FAVOR and ESTEEM, exploiting flaws in the reward distribution logic.

The vulnerability stemmed from BetterBank’s automated bonus distribution system, which minted ESTEEM tokens whenever liquidity was provided for FAVOR. Any trading activity involving FAVOR triggered additional ESTEEM rewards, creating a design flaw that could be manipulated through fake liquidity pools and wash trading.

Importantly, Zokyo had highlighted a similar risk during a prior audit, flagging the potential for fake liquidity pools and reward farming as an attack vector. However, the issue was later classified as “Low” severity and left unresolved.

In the executed exploit, the attacker ultimately drained approximately 891M DAI, 9.05B PLSX, and 7.40B WPLS.
 

Hack Analysis

Attacker deploys a malicious contract and initiates a flash loan from BetterBank, borrowing 50M DAI and 7.14B PLP tokens for the DAI–PDAIF pair.

Screenshot 2025-08-29 at 7.03.07 PM.webp

Using the borrowed PLP, the attacker invokes removeLiquidity on PulseXRouter02 , draining the real DAI–PDAIF pool and extracting ~1.09B DAI and 500M PDAIF from reserves.

Screenshot 2025-08-29 at 7.04.20 PM.webp

Attacker deploys a bogus ERC20 token and creates a fake bogus–PDAIF pool on PulseXFactory , adding minimal liquidity with the bogus token and draining PDAIF.

Screenshot 2025-08-29 at 7.05.13 PM.webp

Through ~20 iterations of swapping the PDAIF ⇆ bogus token in the fake pool, the attacker manipulates PDAIF’s logBuy events and oracle consult function to simulate high buy volume, minting ESTEEM rewards.

Screenshot 2025-08-29 at 7.06.13 PM.webp

The attacker claims the Esteem rewards and uses burnFrom to convert them into ~3.8B additional PDAIF, inflating their token supply.

Screenshot 2025-08-29 at 7.07.08 PM.webp

Liquidity is re-added into the real DAI–PDAIF pool via PulseXRouter02 with ~1.09B DAI and ~501M PDAIF, rebuilding the pool with an intentional imbalance (excess PDAIF) and yielding new LP tokens.

Screenshot 2025-08-29 at 7.08.03 PM.webp

Exploiting the imbalance, the attacker swaps the surplus PDAIF for ~891M DAI at an above-market rate.

Screenshot 2025-08-29 at 7.08.38 PM.webp

Borrowed amounts are repaid via handleRepayment , with the attacker returning the flash-loaned DAI and LP tokens to BetterBank while retaining ~891M DAI as profit.

Screenshot 2025-08-29 at 7.09.26 PM.webp

Screenshot 2025-08-29 at 7.09.43 PM.webp

Screenshot 2025-08-29 at 7.10.02 PM.webp

The attacker went on to repeat the exploit with other tokens as well, managing to pull out around 9.05B PLSX and about 7.40B WPLS.

Don’t Let “Low Severity” Risks Cost You Millions!

A small audit miss can turn into a million-dollar exploit. QuillAudits makes sure no loophole is left unchecked secure your protocol before it’s too late.

Request An Audit

Root Cause

  • Flawed reward logic in swapExactTokensForFavorAndTrackBonus: The function only verified that the swap output was FAVOR, and triggered ESTEEM reward minting. It did not validate whether the swap occurred through a legitimate/whitelisted pool.
     
  • Convertible rewards vulnerability in favorPLS: The minted ESTEEM rewards could then be converted back into FAVOR, enabling the attacker to loop the process and inflate supply.
     
  • Audit warning overlooked: Although Zokyo had previously highlighted the risk of fake liquidity pool reward farming, the issue was downgraded to Low severity and not remediated.
     

Relevant Address and Transactions


Funds Flow After Attack

The attacker liquidated the stolen assets (~890M pDAI, 9B PulseX, and 7B Pulse, worth around $5M) by swapping them on PulseChain DEXes. The swaps were converted into Ethereum-based tokens, including USDC, USDT, DAI, and ETH.

Screenshot 2025-08-29 at 7.39.36 PM.webpScreenshot 2025-08-29 at 7.45.39 PM.webpScreenshot 2025-08-29 at 7.45.25 PM.webpScreenshot 2025-08-29 at 7.45.12 PM.webp

The attacker bridged approximately $922K worth of ETH from PulseChain to Ethereum, gaining easier access and higher liquidity.

Screenshot 2025-08-29 at 7.48.09 PM.webp

To launder the proceeds, the attacker routed the ETH through Tornado Cash, obscuring transaction traceability.

Screenshot 2025-08-29 at 7.48.28 PM.webp
 

Post Attack Mitigation

Following the exploit, BetterBank drained all FAVOR pools to protect remaining assets, issued a 20% bounty for information on the attacker, and attempted on-chain negotiations for fund recovery. On August 27, 2025, the attacker returned 550M DAI (~$2.7M), reducing their net profit to about $1.4M. The team also announced plans to patch the vulnerability, relaunch updated ESTEEM and FAVOR contracts with airdrops to genuine holders, and use treasury and recovered LP assets to forgive debt and stabilize the protocol before reopening.

Conclusion

The BetterBank exploit highlights the inherent risks of poorly validated reward-based tokenomics. By abusing unchecked reward minting and fake liquidity pools, the attacker was able to inflate supply and drain protocol reserves. This case reinforces three key lessons:

  • Reward minting must be restricted to whitelisted pools or registry contracts.
  • Token-level validation is safer than pair-level enforcement.
  • Audit findings, even low-severity, should not be dismissed without remediation.

Despite partial fund recovery, the incident shows that design flaws in incentive mechanisms can cause losses on par with major lending or oracle exploits, underscoring the need for a thorough security audit with QuillAudits.

Contents

Tell Us About Your Project
Request An Audit
Subscribe to Newsletter
hashing bits image
Loading...

STAY IN THE LOOP

Get updates on our community, partners, events, and everything happening across the ecosystem — delivered straight to your inbox.

Subscribe Now!

newsletter
DeFi SecurityplumeUniswap FoundationAethiropt-collectivePolygon SPNBNB Chain Kickstart

Office 104/105 Level 1, Emaar Square, Building 4 Sheikh Mohammed Bin Rashid Boulevard Downtown Dubai, United Arab Emirates P.O box: 416654

hello@quillaudits.com

All Rights Reserved. © 2025. QuillAudits - LLC

Privacy Policy