MFAM Fiasco: A $1,808 DeFi Heist Attempt Goes to the Polls
Moonwell's governance is currently in the crosshairs of a hostile takeover, the DeFi equivalent of a raccoon trying to hotwire a Lamborghini. An unknown assailant is attempting to seize the administrative keys to its smart contracts through a rigged vote on Moonriver.
Should the dubiously titled "MIP-R39: Protocol Recovery – Admin Migration" pass, control of seven lending markets—holding roughly $1.08 million in user funds—would be handed to a wallet whose sole purpose appears to be turning those assets into a personal piggy bank. It's a proposal about as "recovery"-focused as a fox proposing a new security system for the henhouse.
The attacker's entry fee was laughably low, a true degen's dream. On March 24, they scooped up 40.17 million MFAM tokens—Moonwell's governance token—for a mere 1,600 MOVR, worth about $1,808, from the SolarBeam DEX. That's less than some people spend on a single NFT profile picture.
They then deployed a contract packed with exploit logic and submitted their proposal. Governance watchdogs at Blockful confirmed the proposal is malicious, noting the contract is pre-loaded with the transactions needed to drain all markets upon execution—a classic "set it and forget it" strategy for digital burglary.
At the snapshot block, the attacker's 40.17 million MFAM just barely tipped over the protocol's 40 million quorum requirement. The potential ROI on this $1,808 gamble? A mind-bending 597x, targeting that $1.08 million pot. It's the kind of asymmetric bet that makes degens drool, assuming you ignore the whole "theft" part.
This drama unfolds roughly a month after Moonwell took a $1.8 million hit in bad debt, thanks to a misconfigured oracle for its cbETH market. The protocol, it seems, can't catch a break, like a magnet for chaos in a space that already runs on it.
Current community voting data, as of March 26, shows 66.7% of cast votes are against the proposal. The final curtain call is on March 27 at 10:28 UTC. The community is currently voting "no" with the enthusiasm of someone rejecting a suspicious sandwich from a stranger.
Moonwell's governance lead has publicly asked the proposer to dox themselves, explain their "intent," and offer a technical rundown. Until that happens, the protocol is advising members to treat the proposal with the caution of a sushi platter at a gas station.
The current "Against" vote tally suggests Moonwell's defenders are winning the battle. Blockful has outlined two main lines of defense for the protocol.
The first is simply mobilizing enough "Against" votes before the deadline. However, voting power was snapshotted when the proposal began, meaning any MFAM bought after the attack is useless here. Blockful pointed out that the proposer of the last legitimate proposal holds at least 48.8 million voting power in staked MFAM—enough to single-handedly nuke the attack with one transaction, a true governance whale flex.
The second, and safer, option is the Break Glass Guardian: a 2-of-3 Gnosis Safe multisig that can completely bypass the protocol’s timelock and transfer admin control back to the legitimate governance address. This would make the attacker's entire proposal as useful as a screen door on a submarine, even if it technically passes.
If the proposal passes without any intervention, the attacker could queue it for execution as early as March 27, with a 24-hour timelock expiring on March 28—marking the earliest possible date for a full
Mentioned Coins
Share Article
Quick Info
Disclaimer: This content is for information and entertainment purposes only. It does not constitute financial, investment, legal, or tax advice. Always do your own research and consult with qualified professionals before making any financial decisions.
See our Terms of Service, Privacy Policy, and Editorial Policy.