BTCC / BTCC Square / Blockchainreporter /
🚨 Fake Request Finance Contract Drains $3M $USDC from Safe Wallet in Sophisticated Attack

🚨 Fake Request Finance Contract Drains $3M $USDC from Safe Wallet in Sophisticated Attack

Published:
2025-09-12 12:20:00
19
1

DeFi's 'trustless' promise gets another reality check as attackers exploit smart contract vulnerability.

The Setup: Perfect Storm of Social Engineering

Fake Request Finance contracts mimicked legitimate protocols—down to the verified-looking interfaces. Users signed what they thought were routine transactions, only to hand over wallet permissions to malicious actors.

The Execution: Drainer Goes to Work

The contract didn't just siphon funds—it bypassed multi-signature protections and emptied wallets in seconds. $3 million in USDC vanished before victims even noticed abnormal activity.

The Aftermath: Another 'Code Is Law' Lesson

No reversals. No bailouts. Just another day in decentralized finance where your life savings can disappear because you clicked 'approve' on the wrong contract. Maybe traditional finance's paperwork isn't so bad after all.

usdc main

The Web3 community has experienced a tragic shake with a major crypto security breach. A victim got a sophisticated exploit in which he lost $3.047 million in $USDC. The attack involves a fake Request Finance contract which was linked with a Safe multi-sig wallet.

🚨 A victim lost $3.047M USDC yesterday through a sophisticated attack involving a fake Request Finance contract on SAFE wallet.

Key findings:
• Victim's 2/4 Safe multi-sig wallet shows batch transaction via Request Finance app interface
• Hidden within: approval to malicious… pic.twitter.com/U9UNfYNZhv

— Scam Sniffer | Web3 Anti-Scam (@realScamSniffer) September 12, 2025

This breach highlights the fact that even the legitimate-looking batch transactions with hidden malicious approvals can cause the mishap. In this case, the experienced users also suffer and face vulnerability.

Fake Request Finance Contract Makes the System Fool

Scam Sniffer, a platform shedding light on crypto scams, observed that, before the 13 days of the theft, the attacker deployed a malicious contract. The scammer has deliberately designed the Etherscan-verified malicious contract to get a fake copy of the legitimate Request Finance Batch Payment contract.

Both addresses had the same beginning and ending characters, becoming nearly identical. This resulted in difficulty in recognizing the real and fraudulent versions. There was a further execution of multiple “batchPayments” from the attacker to appear as trustworthy.

While using the Request Finance app interface, the victim executed batch transactions. This execution included the hidden approval of a malicious contract unknowingly. Through this approval, the scammer gained access and drained the wallet. After that, he swapped the funds for ETH immediately, funnelling it to Tornado Cash. So now, the recovery of that fund is nearly impossible. 

Industry Response to the Attack and Possible Security Measures

A quick alert was issued by the Request Finance, announcing the deployment of malicious attack having an identical contract. They have cleared that only one person was affected by the attack, ensuring others that they had already addressed the vulnerability.

Besides this, the exact vector involved in the attack is unclear till now. Security experts give a number of possible reasons, including application-level vulnerabilities, compromised frontends, malware or browser extension interference, DNS hijacking, or other injection techniques.

Through this exploit, a growing threat is highlighted, giving awareness of malicious verified contracts and near-identical addresses. To hide malicious approvals, the stealers combine multi-send functionality, even utilizing small and critical oversights for their scam execution.

So, the experts advise users to check and verify every batch approval carefully while cross-checking contract addresses character by character. It is necessary for users to remain vigilant while executing transactions and giving approvals. The app security is essential to prevent devastating losses.

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users