{"id":18706,"date":"2026-03-27T01:03:09","date_gmt":"2026-03-27T01:03:09","guid":{"rendered":"https:\/\/cryptoted.net\/index.php\/2026\/03\/27\/moonwell-hit-by-governance-attack-1-08m-at-risk-for-1800-spend\/"},"modified":"2026-03-27T01:03:09","modified_gmt":"2026-03-27T01:03:09","slug":"moonwell-hit-by-governance-attack-1-08m-at-risk-for-1800-spend","status":"publish","type":"post","link":"https:\/\/cryptoted.net\/index.php\/2026\/03\/27\/moonwell-hit-by-governance-attack-1-08m-at-risk-for-1800-spend\/","title":{"rendered":"Moonwell hit by governance attack \u2014 $1.08M at risk for $1,800 spend"},"content":{"rendered":"<p> <br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/media.crypto.news\/2025\/08\/crypto-news-parthership-TradFi-DeFi-option013.webp\" \/><\/p>\n<div>\n<p class=\"is-style-lead\">An attacker spent about $1,800 on MFAM to push a malicious Moonwell proposal that could seize control of seven markets and $1.08m in assets, testing its veto and governance defenses.<a href=\"https:\/\/crypto.news\/wp\/wp-admin\/post-new.php\" target=\"_blank\"\/><\/p>\n<div id=\"cn-block-summary-block_60a56a6b02693be1e7a9495249576baa\" class=\"cn-block-summary\">\n<p>\n        <span class=\"tabs__item is-selected\">Summary<\/span>\n    <\/p>\n<div class=\"cn-block-summary__content\">\n<ul class=\"wp-block-list\">\n<li>An unknown attacker spent just $1,800 to acquire 40 million MFAM tokens and push a malicious governance proposal through quorum in roughly 11 minutes on Moonwell\u2019s Moonriver deployment.<\/li>\n<li>The proposal, if executed, would transfer admin control of seven lending markets, the comptroller, and the oracle to an attacker-controlled contract, exposing approximately $1.08 million in user funds.<\/li>\n<li>Moonwell retains an emergency veto mechanism \u2014 the \u201cBreak Glass Guardian\u201d multisig \u2014 and a majority of subsequent votes have opposed the proposal ahead of the March 27 deadline.<\/li>\n<\/ul><\/div>\n<\/div>\n<p><!-- .cn-block-summary --><\/p>\n<p>An unknown attacker on March 26 spent approximately $1,800 to acquire around 40 million\u00a0<a target=\"_blank\" href=\"https:\/\/crypto.news\/market-cap\/mfam\/\">MFAM<\/a>\u00a0tokens and ram through a malicious governance proposal on Moonwell\u2019s Moonriver deployment \u2014 completing the entire sequence in roughly 11 minutes and placing approximately $1.08 million in user funds at risk.<\/p>\n<p>As reported by\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.theblock.co\/post\/395272\/moonwell-governance-attack\">The Block<\/a>, the attacker\u2019s proposal, listed as MIP-R39, seeks to transfer administrative rights over seven lending markets, the comptroller contract, and the price oracle to a contract under the attacker\u2019s control. Gaining that access would effectively allow the attacker to drain the protocol\u2019s pools at will. Moonwell is a DeFi lending protocol operating on Moonbeam and Moonriver, two parachains within the Polkadot ecosystem, where users deposit assets to earn yield or borrow against collateral.<\/p>\n<p>The exploit targets a structural weakness endemic to token-based governance: when a protocol\u2019s governance token trades at depressed prices and voter participation is thin, a bad actor can acquire enough voting weight to pass proposals with relatively little capital. That dynamic is precisely what made the attack possible \u2014 $1,800 worth of\u00a0<a target=\"_blank\" href=\"https:\/\/crypto.news\/market-cap\/mfam\/\">MFAM<\/a>\u00a0was enough to hit quorum and lock in a favorable vote before meaningful opposition could mobilize.<\/p>\n<h2 class=\"wp-block-heading\">Two fail-safes remain in play<\/h2>\n<p>Voting on the proposal remains open until March 27. While it reached quorum quickly, the majority of cast votes are now opposed. The final result still hinges on any remaining undeclared voting power. Separately, Moonwell maintains an emergency multisig mechanism known as the \u201cBreak Glass Guardian,\u201d which can override the governance process and revoke the attacker\u2019s access before execution regardless of the vote outcome.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<p>The incident is the second major security failure to hit Moonwell in a matter of weeks. In February, the protocol suffered a previous\u00a0<a target=\"_blank\" href=\"https:\/\/crypto.news\/moonwells-ai-coded-oracle-glitch-misprices-cbeth-at-1-drains-1-78m\/\">exploit<\/a>\u00a0when a faulty oracle \u2014 reportedly co-authored using the AI model Claude Opus 4.6 \u2014 mispriced Coinbase Wrapped ETH (cbETH) at near $1 instead of its actual market value of roughly $2,200, generating approximately $1.78 million in bad debt.<\/p>\n<h2 class=\"wp-block-heading\">A recurring vulnerability across DeFi<\/h2>\n<p>Governance attacks are not new to decentralized finance, but they continue to expose the tension between open participation and protocol security. The 2022\u00a0<a target=\"_blank\" href=\"https:\/\/crypto.news\/beanstalk-flash-loan-attack-about-180m-vanish\/\">Beanstalk<\/a>\u00a0flash loan attack remains the most dramatic example of the vector, with an attacker draining over $180 million by using a flash loan to temporarily accumulate sufficient voting power to pass a fraudulent proposal in a single transaction. Compound Finance and the now-defunct Swerve Finance have also faced similar contested governance episodes driven by concentrated token accumulation.<\/p>\n<p>What distinguishes the Moonwell case is the raw cost efficiency. There were no flash loans required \u2014 just a modest open-market purchase on a low-liquidity token, and a governance system that lacked the circuit breakers to slow down a hostile proposal.<\/p>\n<p>The Moonwell community and team are now racing against the March 27 vote deadline. The outcome will test whether the Break Glass Guardian mechanism and organic voter opposition can neutralize the threat before the proposal reaches execution.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/crypto.news\/moonwell-hit-by-governance-attack-1-08m-at-risk-for-1800-spend\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An attacker spent about $1,800 on MFAM to push a malicious Moonwell proposal that could seize control of seven markets and $1.08m in assets, testing its veto and governance defenses. Summary An unknown attacker spent just $1,800 to acquire 40 million MFAM tokens and push a malicious governance proposal through quorum in roughly 11 minutes [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":18707,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"tdm_status":"","tdm_grid_status":"","footnotes":""},"categories":[23],"tags":[],"kronos_expire_date":[],"class_list":["post-18706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crypto"],"_links":{"self":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts\/18706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/comments?post=18706"}],"version-history":[{"count":0,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts\/18706\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/media\/18707"}],"wp:attachment":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/media?parent=18706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/categories?post=18706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/tags?post=18706"},{"taxonomy":"kronos_expire_date","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/kronos_expire_date?post=18706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}