Major Exploit Drains Yearn Finance yETH, $3M Sent to Mixer

Dec 1, 2025, 14:36 GMT+1WalletAutopsy NewsDeFi
Editorial illustration for: Major Exploit Drains Yearn Finance yETH, $3M Sent to Mixer

Yearn Finance reported a significant incident affecting its yETH vault after transactions traced approximately $3 million worth of ETH moved into a well-known mixer. Public chain data and reporting by TradingView identified the flow of funds and set off immediate attention from analysts.


Become a Doc: Profile Ethereum wallets and discover their behavior.

Use WalletAutopsy.


What happened

On-chain records indicate that an attacker exploited a weakness associated with the yETH vault and executed withdrawals that removed roughly $3 million in ETH. TradingView published the initial report that mapped the transfers from the vault to a set of addresses and subsequently into Tornado Cash, where the funds were pooled.

Timeline and transaction trace

Chain data shows the sequence began with a set of transactions that drew down assets from the yETH vault. The attacker consolidated proceeds across several crypto wallets, then sent aggregated amounts into Tornado Cash. Analysts using standard tools observed the movement shortly after it occurred and published transaction hashes used to confirm the flow.

Crypto analytics providers and independent researchers tracked the transfers in near real time. The movement displayed a pattern where smaller intermediate addresses aggregated value before final mixing. That behavior is consistent with attempts to obfuscate origin through multiple hops before reaching a mixer.

Technical context

yETH is a vault designed to provide exposure to ETH using Yearn’s suite of strategies. The public details identify a contract-level problem that permitted the extraction of funds. Reporting from TradingView noted the exploit targeted the vault’s controls, allowing unauthorized withdrawals without conventional checks that would prevent such outflows.

Investigators on the chain examined the offending transactions and the invoked contract functions. The calls and resulting balance changes are visible on Ethereum explorers, creating a clear forensic trail for analysts. At this stage, the specific code path used by the attacker remains a technical point under review by security specialists.

Attacker behavior and fund laundering

Tornado Cash received the bulk of the funds shortly after they left the yETH vault. The attacker consolidated assets into a handful of addresses and then deposited them into the mixer, a common method for making subsequent tracing more difficult. The on-chain footprint shows multiple deposits and splits designed to reduce the risk of direct linking to the origin addresses.

Observers noted standard mixing patterns: staged consolidation, batching of transfers, and final mixer deposits. The result is a set of outputs that are technically independent from the vault withdrawals. That separation complicates direct recovery without cooperation from mixer operators or legal authorities, where applicable.

Impact on the protocol and users

Direct losses are reported at roughly $3 million in ETH. The exploitation of a vault reduces liquidity available to depositors and may temporarily affect strategies that rely on the vault’s assets. Contracts that remain intact continue to function, but user confidence can drop after high-profile breaches of this type.

Risk management measures commonly considered after incidents include disabling affected strategies, pausing vaults, or deploying emergency patches. Those steps require clear technical and governance processes to limit the possibility of further exploitation while preserving user funds where possible.

Responses and investigation

Public reports identified the transfers and named Tornado Cash as the recipient of the mixed funds. TradingView was among the outlets that mapped the movement and provided transaction links for independent verification. Security teams and third-party auditors typically begin forensic reviews as soon as key facts are confirmed on chain.

Law enforcement and compliance teams sometimes get involved in cases where mixers are used and substantial sums are at stake. Cooperation between protocol maintainers, analytics firms, and authorities can be decisive for any attempts to freeze or recover assets that have not been fully anonymized.

What analysts will watch next

On-chain monitoring will continue to follow the addresses associated with the exploit for any movements that could indicate liquidation or attempts to cash out. Analysts will also look for signs that the attacker reuses addresses or interacts with identifiable services where funds might be traced or flagged by sanctions and compliance teams.

Technical fixes and any governance decisions by Yearn maintainers are also key indicators. Security teams will examine the vault code and recent commits to identify the exploited function and propose corrective patches. Public disclosure of a vulnerability and proof of the patch process help rebuild user trust after an incident.

What users should consider

Depositors in the affected vault should review official communications from Yearn and consult transaction histories on explorers to confirm balances. Users who retain funds in other vaults may evaluate the status of those contracts and the broader project governance, while security-conscious participants can use available crypto analytics to track suspicious addresses and flows.

Practical steps include withdrawing non-essential funds from at-risk strategies, enabling wallet-level protections, and avoiding interaction with addresses tied to the exploit. Developers and auditors can learn from the incident to strengthen future contract designs and reduce single-point failures.

Closing note

This event highlights how fast funds can move on a public blockchain and how important prompt, transparent forensic work becomes after a compromise. TradingView’s reporting drew attention to the transfers, and the on-chain record now serves as a basis for recovery efforts and technical review. Continued monitoring will provide a clearer picture of the attacker’s intentions and any potential routes for remediation.

Independent analysts and community members should rely on verified on-chain data and official protocol statements as the investigation proceeds. The record of transactions and the public tools available today make it possible to follow funds, assess risk, and inform next steps without speculation.

Disclaimer: WalletAutopsy is an analytical tool. Risk scores, narratives, and profiles are generated from observed on-chain patterns using proprietary methods. They are intended for informational and research purposes only, and do not constitute financial, investment, or legal advice. Interpretations are clinical metaphors, not predictions.

© 2025 WalletAutopsy. All rights reserved.

Our office: 351 Viale Calabria, Reggio Calabria, Reggio Calabria 89132