1inch TrustedVolumes Exploit Drains $5.9M
Fazen Markets Editorial Desk
Collective editorial team · methodology
Vortex HFT — Free Expert Advisor
Trades XAUUSD 24/5 on autopilot. Verified Myfxbook performance. Free forever.
Risk warning: CFDs are complex instruments and come with a high risk of losing money rapidly due to leverage. The majority of retail investor accounts lose money when trading CFDs. Vortex HFT is informational software — not investment advice. Past performance does not guarantee future results.
1inch's TrustedVolumes liquidity provider suffered an ongoing exploit that has drained approximately $5.9 million, according to Blockaid and reporting by The Block on May 7, 2026. Blockaid attributes the attack to the same entity that exploited 1inch Fusion V1 in March 2025, an incident that removed roughly $5.0 million from that protocol (The Block, May 7, 2026). The recurrence of a similar attacker profile raises immediate questions about repeatability of the exploit vector and the adequacy of security updates implemented after the 2025 incident. Market participants reacted in real time to the disclosure, with on-chain observers and custodial services flagging addresses tied to the outflows. This report aggregates public-source data, timelines, and potential sector implications without providing investment advice.
Context
The May 7, 2026 disclosure by The Block and Blockaid places the latest event in a short chronology: March 2025 Fusion V1 exploit (~$5.0m) followed by the TrustedVolumes breach in early May 2026 (~$5.9m). That sequence implies a year-over-year increase in direct attacker proceeds of approximately 18%, a non-trivial comparison given the concentrated nature of DeFi liquidity. Blockaid's attribution, while not equivalent to legal attribution, is grounded in transaction-pattern analysis and address reuse that security firms commonly rely upon; The Block's initial reporting contains the primary timestamps and aggregate totals cited in this article (The Block, May 7, 2026). For institutional counterparties monitoring operational risk, the recurrence increases the probability that the underlying vulnerability remains unpatched or was insufficiently mitigated after the March 2025 incident.
The affected component, TrustedVolumes, is the liquidity provider layer built to support 1inch Fusion liquidity primitives; the module's role is to aggregate and route liquidity across pools. Exploits against aggregation layers compress systemic risk because they can touch multiple pools and counterparties simultaneously. Historically, high-profile DeFi exploits that hit aggregation or routing layers have had outsized second-order effects on adjacent protocols — accelerating deleveraging and liquidity withdrawals even when the dollar losses are modest relative to multi-hundred-million-dollar hacks (for example, Poly Network's ~$600m incident in 2021). The TrustedVolumes event is therefore notable not solely for the $5.9m headline but for the distributional risk it reveals within 1inch's composability stack.
Institutional users should note timing and public disclosure dynamics: the exploit was described as ongoing by Blockaid at the time of reporting on May 7, 2026, meaning that remediation, fund recovery, and freezing of funds were incomplete at publication. That contrasts with some high-profile past incidents where centralized custodians or multisignature guardians could pause activity immediately; in composable, permissionless environments, freeze mechanisms require prior architectural provisions. The factual timeline and the repeated exploitation history make the TrustedVolumes breach a test case for governance responsiveness, insurance coverage adequacy, and on-chain forensics.
Data Deep Dive
Blockaid's estimate of nearly $5.9 million in drained funds sits adjacent to the March 2025 Fusion V1 loss of about $5.0 million; these two data points form the core quantitative basis for assessing attacker scale. Specifically, using simple arithmetic, the more recent event represents an approximately 18% increase in value extracted relative to the earlier incident. The Block reported the May 7, 2026 disclosure and cited Blockaid analysis; both are primary sources for timing and aggregate value. For comparison, the 2021 Poly Network theft reached roughly $600 million before partial returns — illustrating that while the TrustedVolumes loss is material for 1inch participants, it is an order of magnitude smaller than the largest historical DeFi breaches.
On-chain transaction details reported by security firms typically include timestamped transfers, intermediary hops, and cash-out vectors; Blockaid's public commentary identified address reuse and transaction patterns consistent with the March 2025 exploit. That kind of behavioral fingerprinting increases confidence in linking incidents, but it does not equate to off-chain identity attribution. From a numeric perspective, the repeated extraction of about $5–6 million across two events implies a persistent exploitable corridor in the protocol's architecture capable of recurring exploitation until a comprehensive patch or protocol redesign is implemented.
Market signals around the incident also matter. Although 1inch's governance token 1INCH and Ethereum (ETH) remain the natural reference points for price and liquidity shocks, the primary impact vector here is operational and counterparty credit risk rather than a systemic contagion that would immediately move the broader crypto market. Nonetheless, custodians and exchanges often respond by delisting or temporarily suspending deposits of affected tokens or pools — a preventive step that can cause localized liquidity compression. Institutional investors should track subsequent on-chain flows, any judicial or regulatory filings, and statements from 1inch Labs and major custodial providers for concrete remediation actions.
Sector Implications
Recurrent exploits on the same protocol family tend to have outsized implications for institutional adoption decisions. For market makers and liquidity providers that price risk into automated market maker positions, an 18% year-over-year increase in attacker proceeds on the same protocol class is a signal to reassess exposure. The reputational cost to 1inch could manifest as widened spreads, reduced LP participation, and higher capital charges from counterparties that apply bespoke operational risk metrics. By contrast, protocols that adopt audited multisig guardians or timelock pause mechanisms often preserve counterparty confidence even after incidents because they can prevent real-time drainage.
From a regulatory and custodial perspective, repeated breaches attract scrutiny. Securities and derivatives custodians that host tokenized exposure for institutional clients typically require incident reporting, proof of remediation, and sometimes indemnities or insurance coverage adjustments. The TrustedVolumes episode will likely be referenced in due diligence conversations and could prompt some counterparties to increase collateralization or to demand more conservative risk parameters for strategies that rely on Fusion or TrustedVolumes-like primitives.
Finally, the event feeds into the broader market for DeFi security services. Demand for third-party monitoring, runtime protection, and formal verification firms will increase in direct response to persistent vulnerabilities. The market response creates a feedback loop: higher costs for security services may raise entry barriers for smaller protocols but improve systemic safety overall. For those tracking sector evolution, the TrustedVolumes exploit reinforces why institutional onboarding thresholds continue to emphasize governance maturity and incident response capabilities.
Risk Assessment
The most immediate risk is further on-chain exfiltration while the exploit remains active. Blockaid characterized the incident as ongoing at the time of reporting on May 7, 2026, which implies continued probability of incremental losses until funds are fully drained or transaction paths are blocked. Institutions should therefore monitor known attacker addresses and watch for interaction patterns with centralized exchanges — which are common cash-out endpoints — while recognizing that sophisticated attackers use mixers and chained swaps to obscure flows. Operationally, market participants with exposure to 1inch pools should consider pause mechanisms if they control contract upgrade authority, or else segregate exposure until forensic analysis completes.
A secondary risk stems from contagion to liquidity provisioning and margin frameworks. Liquidity providers who experience losses may exit positions, amplifying slippage and reducing effective depth in affected pools. That in turn increases price impact for traders and can trigger liquidations in leveraged positions if oracle updates or collateral repricing do not account for transient illiquidity. Historical instances show that even modest dollar losses can have outsized short-term market impacts when they impair market-making function.
Legal and insurance risk is the tertiary vector. Coverage for smart-contract exploits varies widely; some policies exclude certain classes of vector or require pre-approval of audits. When the same attacker returns after a prior exploit, insurers and litigators pay attention to whether the protocol took reasonable corrective steps. Failure to patch or to disclose material risks could complicate claims and expose governance actors to potential litigation. Monitoring public disclosures by 1inch and insurers' statements will be critical for institutional counterparty risk assessment.
Fazen Markets Perspective
Fazen Markets views this incident as emblematic of a transitional phase in DeFi risk management where technical fixes alone are insufficient without aligned economic and governance incentives. The repeat nature of the exploitation suggests that patch cycles implemented after March 2025 did not fully address either the root cause or the economic pathways enabling extraction. Contrarian to prevailing industry noise that frames all loss events as isolated bugs, we see them as signals that protocol architecture needs to internalize failure scenarios into tokenomics and insurance frameworks. For example, the market should incentivize bounty programs and pre-emptive escrow mechanisms that activate automatically in the event of abnormal flows; such design choices can reduce the arbitrage profitability of repeated attacks.
Second, from a portfolio construction standpoint, the incident argues for decomposing DeFi exposure into distinct risk buckets: protocol-operational risk, market risk, and counterparty risk. Many institutional strategies aggregate these implicitly; a more surgical approach allows for hedges that are deliberately focused on contract-level failures, such as purchasing dedicated exploit insurance or limiting position sizes in aggregation primitives. This is not a prediction about price action but a pragmatic allocation stance designed to limit tail-event exposure.
Third, there is an information-arbitrage opportunity for active risk managers. The forensic patterns that tie exploits together — address reuse, transaction morphology, time-of-day sequencing — are detectable with sufficient on-chain surveillance. Institutions that invest in real-time monitoring and playbooks for rapid isolation will reduce endogenous losses and improve negotiation leverage when coordinating with exchanges and legal counsel. In short, the best defense blends technical mitigation, economic design, and organzied operational response.
Outlook
In the near term, the priorities are containment, fund-recovery efforts, and transparent disclosure by protocol maintainers. If 1inch or its ecosystem partners can demonstrate a credible remediation plan within days — including contract freezes or multisig interventions that block attacker flows — the direct market impact will be limited to reputational damage and temporary liquidity withdrawal. However, if remediation lags, the probability of cumulative additional losses rises and will likely trigger broader risk-off behavior among liquidity providers. Market watchers should expect elevated volatility in related pools and potential short-term widening of spreads for 1INCH-related products.
Over a 3-12 month horizon, the incident will likely accelerate demand for formal verification, runtime monitoring, and insurance instruments priced specifically for aggregation-layer risks. Protocols that proactively migrate to verifiable, pausable architectures or that underwriting-friendly indemnity arrangements will attract liquidity at a premium versus peers that do not. For macro-level risk allocation, repeated exploits erode the convenience premium of yield strategies that prioritize composability over auditability, nudging some capital back toward more conservative venues.
For institutional participants, the immediate practical steps are clear: monitor official disclosures, update counterparty risk assessments, and segregate exposure where remediation is uncertain. Use the incident as a catalyst to re-evaluate contractual protections, insurance coverages, and operational playbooks rather than as a trigger for indiscriminate divestment.
Bottom Line
TrustedVolumes' near-$5.9m breach is material for 1inch participants and signals a persistent vulnerability given a similar $5.0m Fusion V1 exploit in March 2025; institutions should treat the event as an operational risk inflection that demands immediate containment and longer-term architectural change. Fazen Markets recommends rigorous on-chain surveillance and calibrated protective measures while monitoring remediation updates.
Disclaimer: This article is for informational purposes only and does not constitute investment advice.
FAQ
Q: What practical steps can custodians take now to limit exposure?
A: Custodians can suspend acceptance of deposits for affected pools, increase monitoring of inbound transactions to exchange addresses, and require proof of remediation and audits before resuming operations. They can also update client notices and adjust margin or collateral requirements for strategies exposed to 1inch aggregation primitives.
Q: How does this exploit compare to the largest DeFi hacks historically?
A: At roughly $5.9m, TrustedVolumes is materially smaller than outlier events such as Poly Network (~$600m in 2021) but is economically significant within the 1inch ecosystem. The key distinction is that aggregation-layer breaches concentrate counterparty and routing risk, which can have outsized market impact relative to dollar size if they impair liquidity provisioning.
Q: Could repeat exploitation affect insurance payouts?
A: Yes. Insurers will scrutinize whether reasonable remediation steps were taken after prior incidents; repeat events may lead to contested claims or increased premiums. Policy language varies, so institutions should review exclusions and conditions that pertain to repeated or known vulnerabilities, and engage insurers proactively.
Trade XAUUSD on autopilot — free Expert Advisor
Vortex HFT is our free MT4/MT5 Expert Advisor. Verified Myfxbook performance. No subscription. No fees. Trades 24/5.
Trade the assets mentioned in this article
Trade on BybitSponsored
Ready to trade the markets?
Open a demo account in 30 seconds. No deposit required.
CFDs are complex instruments and come with a high risk of losing money rapidly due to leverage. You should consider whether you understand how CFDs work and whether you can afford to take the high risk of losing your money.