Solutions

Company

Resources

Blog

Contact

Login

    • Assurance

      Smart Contract Assessment

      Securing code integrity, protecting digital assets

      Blockchain Layer 1 Assessment

      Assessing protocols, securing blockchain foundations

      Code Security Audit

      Uncovering flaws, strengthening software integrity

      Web Application Penetration Testing

      Exposing weaknesses, fortifying digital defenses

      Cloud Infrastructure Penetration Testing

      Securing configurations, protecting critical environments

      Red Team Exercise

      Simulating real-world attacks, strengthening defenses

      AI Red Teaming

      Testing AI systems against real threats

      AI Security Assessment

      Securing AI models, data, and pipelines

    • Advisory

      AI Advisory

      Guiding secure, strategic AI adoption forward

      Risk Assessment

      From unknown threats to actionable insights

      Blockchain Architecture Assessment

      Optimizing architecture for tomorrow’s networks

      Compliance Readiness

      Stay ready as regulations evolve

      Custody and Key Management Assessment

      Securing the heart of digital custody

      Technical Due Diligence

      See the risks before you invest

      Technical Training

      Empower your teams to secure what matters

    • Who We Are

      The best security engineers in the world

      Careers

      Work with the elite

      Who Trusts Us

      The trusted security advisor for blockchain and financial services industries

      Brand

      Access official logos, fonts, and guidelines

      Service Commitments

      Committed to Protecting Your Data

    • Audits

      In-depth evaluations of smart contracts and blockchain infrastructures

      BVSS

      Blockchain Vulnerability Scoring System

      Disclosures

      All the latest vulnerabilities discovered by Halborn

      Case Studies

      How Halborn’s solutions have empowered clients to overcome security issues

      Reports

      Comprehensive reports and data

  • Blog

  • Contact

  • Login

STAY CURRENT WITH HALBORN

Subscribe to the monthly Halborn Digest for our top blogs and videos, major company announcements, new whitepapers, webinar and event invites, and one exclusive interview.

ADVISORY SERVICES

AI AdvisoryRisk AssessmentBlockchain Architecture AssessmentCompliance ReadinessCustody and Key Management AssessmentTechnical Due DiligenceTechnical Training

ASSURANCE SERVICES

AI Security AssessmentAI Red TeamingSmart Contract AssessmentBlockchain Layer 1 AssessmentCode Security AuditWeb Application Penetration TestingCloud Infrastructure Penetration TestingRed Team Exercise

COMPANY

Who We AreWho Trusts UsService CommitmentsCareersBrandBlogContact

RESOURCES

AuditsDisclosuresReportsBVSSCase Studies
Halborn Logo
Privacy PolicyTerms of UseVulnerability Disclosure Policy

© Halborn 2026. All rights reserved.

Smart Contract Assessment

Securing code integrity, protecting digital assets

Blockchain Layer 1 Assessment

Assessing protocols, securing blockchain foundations

Code Security Audit

Uncovering flaws, strengthening software integrity

Web Application Penetration Testing

Exposing weaknesses, fortifying digital defenses

Cloud Infrastructure Penetration Testing

Securing configurations, protecting critical environments

Red Team Exercise

Simulating real-world attacks, strengthening defenses

AI Red Teaming

Testing AI systems against real threats

AI Security Assessment

Securing AI models, data, and pipelines

AI Advisory

Guiding secure, strategic AI adoption forward

Risk Assessment

From unknown threats to actionable insights

Blockchain Architecture Assessment

Optimizing architecture for tomorrow’s networks

Compliance Readiness

Stay ready as regulations evolve

Custody and Key Management Assessment

Securing the heart of digital custody

Technical Due Diligence

See the risks before you invest

Technical Training

Empower your teams to secure what matters

Who We Are

The best security engineers in the world

Careers

Work with the elite

Who Trusts Us

The trusted security advisor for blockchain and financial services industries

Brand

Access official logos, fonts, and guidelines

Service Commitments

Committed to Protecting Your Data

Audits

In-depth evaluations of smart contracts and blockchain infrastructures

BVSS

Blockchain Vulnerability Scoring System

Disclosures

All the latest vulnerabilities discovered by Halborn

Case Studies

How Halborn’s solutions have empowered clients to overcome security issues

Reports

Comprehensive reports and data

THIS WEBSITE USES COOKIES

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information that you've provided to them or that they've collected from your use of their services. You consent to our cookies if you continue to use our website. Learn More.

blog

Month in Review: Top DeFi Hacks of April 2026

Category: Month in Review

Month in Review: Top DeFi Hacks of April 2026

POSTED BY: Rob Behnke

05.04.2026

  • Biggest defi hacks of april 2026
  • Lessons learned from the attacks

April 2026 was a bad month for DeFi hacks, with fourteen hacks involving losses of over $1 million. In total, over $630 million was stolen, but some of these funds were later recovered.

Biggest DeFi Hacks of April 2026

The fourteen hacks in April 2026 that exceeded $1 million in losses include:

  • Drift Protocol: Drift lost an estimated $285 million to a social engineering attack attributed to the Lazarus Group. The attackers launched a fake token and tricked Drift Security Council members into pre-signing transactions that allowed the attackers to take privileged actions and deposit a fake token as collateral to drain the protocol.

 

  • BSC/TMM: The TMM trading pair on BSC was targeted in a reserve manipulation attack. The attacker stole an estimated $1.6 million by burning tokens to inflate the perceived value of the TMM tokens.

 

  • Dango: Dango suffered a $1.9 million hack due to the fact that its smart contracts didn’t verify that donation amounts to the contract were positive. The attackers were able to cash out approximately $410,000 (which was later returned), and $1.49 million was stuck on the platform and recovered.

 

  • Hyperbridge: The Hyperbridge attacker forged a transaction to modify the admin rights for the protocol’s Polkadot/Ethereum bridge contract. They minted about 1 billion DOT tokens and were able to cash out approximately $2.5 million.

 

  • CoW Swap: The CoW Swap DEX aggregator’s DNS registrar was social engineered to redirect visitors to a malicious site. In total, users lost an estimated $1.2 million.

 

  • Grinex: Grinex, a Russian cryptocurrency exchange, suffered a hack attributed to “foreign special services.” The exchange lost an estimated $13 million.

 

  • Rhea Finance: Rhea Finance was exploited in April 2026 due to a bug in its slippage protection feature. The attacker stole an estimated $18.4 million, of which about $10 million was later recovered.

 

  • KelpDAO: KelpDAO was the victim of the biggest hack of 2026 to-date. The attackers stole an estimated $292 million by performing a DDoS attack that forced the protocol to use two compromised RPC nodes for data on cross-chain transfers. The protocol’s sole verifier then accepted a fake transaction to release $292 million.

 

  • Volo Protocol: Volo Protocol was hacked for $3.5 million. The attacker likely stole a private key, allowing them to steal Bitcoin and stablecoin deposits.

 

  • GiddyDeFi: GiddyDeFi suffered a $1.3 million hack in April 2026. The attacker exploited flaws in authorization verification, where the attacker was able to replay a legitimate transaction while changing parameters that weren’t covered by its digital signature.

 

  • Purrlend: A suspicious multisig transaction granted unauthorized access to the cross-chain bridge. After this occurred, attackers stole about $1.5 million from the protocol.

 

  • Aftermath Finance: Aftermath Finance suffered an estimated $1.14 million hack in April 2026. The attacker exploited a flaw in the protocol’s fee system for builders, using negative fees to increase the USDC fees that they received.

 

  • Sweat Foundation: The Sweat Foundation also suffered a hack due to a smart contract vulnerability. A custom drainer contract was used to steal about 13.71 billion SWEAT tokens worth approximately $2.5 million from accounts belonging to the foundation and some of its top holders.

 

  • Wasabi Protocol: The Wasabi Protocol suffered an estimated $5 million in losses due to a compromised deployer admin key. The attacker performed a malicious upgrade to the protocol’s vault contract, allowing them to drain various assets from the contract.

Lessons Learned from the Attacks

April 2026 had a large number of major hacks with a variety of root causes. However, a few things stand out.

One is the fact that the two biggest hacks of the month involved social engineering attacks carried out over months (and attributed to the Lazarus Group). These targeted, off-chain attacks are effective and don’t require on-chain vulnerabilities.

However, smart contract vulnerabilities are still a major problem. Many protocols suffered over $1 million in losses due to common, known threats.

Halborn offers security advisory and smart contract auditing services to help protect companies against top threats. Get in touch.

Related Blog Posts

blog

Month in Review: Top DeFi Hacks of February 2026

03.02.2026

blog

Month in Review: Top DeFi Hacks of March 2026

04.01.2026

Disclaimer

The information in this blog is for general educational and informational purposes only and does not constitute legal, financial, or professional advice. Halborn makes no representations as to the accuracy or completeness of the content, which may be updated or changed without notice.

blog

Month in Review: Top DeFi Hacks of October 2025

11.03.2025

blog

Month in Review: Top DeFi Hacks of October 2025

11.03.2025