XLinkedInTelegram
Hack Analysis

CrediX Finance Faces 4.5M Exploit (Exit Scam Analysis)

CrediX Finance suffers $4.5M exploit revealing an exit scam pattern with in depth analysis of the breach and its impact on investors

Author
QuillAudits Team
August 11, 2025
CrediX Finance Faces 4.5M Exploit (Exit Scam Analysis)
XLinkedInTelegram

CrediX Finance, a lending protocol built on the Sonic blockchain, suffered a $4.5 million exploit on August 4, 2025, just weeks after its launch in July. What initially appeared to be a security breach has since evolved into strong suspicions of an exit scam, with the protocol's team completely disappearing after promising full recovery of stolen funds. The incident highlights critical vulnerabilities in decentralized finance (DeFi) governance systems. It raises serious questions about insider involvement, particularly given the methodical preparation that preceded the attack and the team's subsequent vanishing act.
 

Hack Analysis

  1. Six days before the exploit, the attacker gained full administrative access via CrediX’s ACLManager contract in transaction 0x0cc3520951a2b41281dcc9a0d37ef3f7f139b75675d83ae72e3b8e903334f35e. This was done by a potentially compromised or possibly CrediX’s own admin EOA (0x0dd010513F7abB8F9c628dC164a24D953BCA09Cf). As a result, the attacker account (0xF321683831Be16eeD74dfA58b02a37483cEC662e) was granted several high-impact privileges :
    • POOL_ADMIN_ROLE: Complete control over lending pool operations and parameters
    • BRIDGE_ROLE: Cross-chain bridge functionality with minting capabilities
    • ASSET_LISTING_ADMIN_ROLE: Authority to list and manage protocol assets
    • EMERGENCY_ADMIN_ROLE: Emergency protocol shutdown and recovery powers
    • RISK_ADMIN_ROLE: Risk parameter adjustment and management authority

      role granting.png
  2. The attacker exploited the BRIDGE_ROLE to create unbacked acUSDC and acscUSD tokens directly within the protocol’s lending pools. By calling the mintUnbacked function without providing any underlying USDC collateral, they effectively manufactured tokens out of nothing. In total, the attacker minted 2,500,000 acUSDC and 3,250,000 acscUSD.

    acUSDC_minting.pngacscUSD_minting.png
     
  3. Using the freshly minted, unbacked acUSDC tokens as collateral, the attacker executed large-scale borrowing from the protocol’s legitimate asset pools. Because the smart contracts were unable to distinguish between legitimately backed tokens and the artificially created ones, the collateral was accepted as valid. In total, the attacker borrowed the following amounts (in USD value):
    1. USDC: $2,036,501.00
    2. scUSD: $1,160,000.00
    3. wS: $1,343,322.06
    4. stS beets staked: $55,577.99
    5. WETH: $45,557.99

      usdc_borrowing.png
       

Root Cause

The attacker, an insider, held high-level roles including POOL_ADMIN_ROLE, BRIDGE_ROLE, EMERGENCY_ADMIN_ROLE, RISK_ADMIN_ROLE, and ASSET_LISTING_ADMIN_ROLE, giving them unrestricted control over the protocol. No smart contract vulnerability was exploited; instead, the protocol’s core functionality was abused through concentrated administrative privileges.

Don’t Let Insider Risks Drain Your Protocol!

CrediX Finance shows how unchecked admin rights can lead to massive losses. QuillAudits ensures your smart contracts remain secure and your user trust stays unshaken from every possible threat

Request An Audit


Accounting

Blank diagram.svg

Relevant Address and Transactions


Funds Flow Post Attack

The attacker converted multiple borrowed assets into USDC and bridged them to Ethereum via the deBridge protocol. 300 ETH has been laundered through Tornado Cash, while the remaining ETH is still held across the following Ethereum addresses:

swap to usdc.pngdebridge.png

Post Attack Mitigation

CrediX's post-attack response followed a concerning pattern that ultimately led to exit scam accusations:

Initial Response (August 4-5, 2025): CrediX initially acknowledged the breach and took its website offline to prevent additional deposits. The team promised that All users' funds will be recovered in full within 24-48 hours and claimed they had reached a successful parley with the exploiter, who agreed to return funds in exchange for payment from the protocol's treasury.

Communication Breakdown (August 8, 2025): Rather than fulfilling their recovery promises, the CrediX team completely disappeared. The protocol's website remained offline, their X (Twitter) account went inactive, and their official Telegram channel was deleted. No recovery plan was ever published, and no funds were returned to users.

Stability DAO stepped in to coordinate recovery efforts, announcing plans to file a formal legal report with authorities. The DAO confirmed it had obtained KYC information for two CrediX team members and would include this in their legal submission to cybercrime units.
 

Conclusion

The CrediX Finance incident underscores the critical risks posed by excessive centralization of administrative privileges in DeFi protocols. This was not a case of exploiting a technical flaw in smart contracts but rather a deliberate abuse of governance authority, most likely by an insider or with insider collusion. The well-orchestrated granting of high-impact roles, rapid execution of the exploit, and subsequent disappearance of the team strongly indicate an exit scam. This event highlights the urgent need for stricter access controls, multi-signature governance, and transparent operational oversight to safeguard protocol integrity and user assets in decentralized finance.

At QuillAudits, we specialize in uncovering such governance risks before they turn into multimillion-dollar disasters. Through comprehensive smart contract audits and rigorous administrative privilege assessments, we help DeFi projects build resilient security frameworks that protect both protocol assets and community trust.

Contents

Tell Us About Your Project
Request An Audit
Subscribe to Newsletter
hashing bits image
Loading...

STAY IN THE LOOP

Get updates on our community, partners, events, and everything happening across the ecosystem — delivered straight to your inbox.

Subscribe Now!

newsletter
DeFi SecurityplumeUniswap FoundationAethiropt-collectivePolygon SPNBNB Chain Kickstart

Office 104/105 Level 1, Emaar Square, Building 4 Sheikh Mohammed Bin Rashid Boulevard Downtown Dubai, United Arab Emirates P.O box: 416654

audits@quillaudits.com

All Rights Reserved. © 2025. QuillAudits - LLC

Privacy Policy