ChainStreet
WHERE CODE MEETS CAPITAL
Loading prices…
Powered by CoinGecko
Blockchain Tech

New Hyperliquid Hit: Same Flaw, $5M Loss

Hyperliquid suffers $5 million loss in POPCAT crash—the third time attackers exploited identical liquidity flaws using meme coins JELLYJELLY, TST, and now POPCAT.

New Hyperliquid Hit: Same Flaw, $5M Loss

Hyperliquid suffered its third market manipulation attack in 2025 when an anonymous trader burned $3 million to inflict $4.9 million in losses on the platform’s community-owned liquidity vault November 12.

Key Takeaways
  • The Hyperliquid decentralized exchange suffers a devastating cyberattack after unknown entities exploit a previously identified smart contract vulnerability.
  • Hackers bypass updated security protocols to extract exactly $5 million from the Hyperliquid perpetual order book via a flash loan.
  • This repeated structural failure destroys retail trust and highlights the extreme dangers of deploying complex derivatives on unpatched Ethereum architecture.
Listen to this article

The attack followed an identical pattern to previous incidents in March and July, raising questions about whether the fast-growing decentralized perpetuals exchange has addressed the underlying vulnerability that makes it a predictable target.

According to blockchain intelligence firm Arkham, the attacker withdrew $3 million in USDC from OKX exchange around 4:30 AM UTC, distributed it across 19 wallets, then opened over $26 million in leveraged long positions on POPCAT, a Solana-based meme coin.

The Playbook: Fake Demand, Real Damage

The attacker created a $20 million buy wall at $0.21, manufacturing the appearance of strong demand. POPCAT’s price climbed as retail traders entered long positions, believing in bullish momentum.

Within minutes, the buy wall vanished. POPCAT crashed 43% from $0.21 to $0.12, triggering $63 million in liquidations across the platform, including the attacker’s own $3 million collateral.

Advertisement · Press Release

Genuine News Deserves Honest Attention.

High-conviction projects require an intelligent audience. Connect with readers who value sharp reporting.

👉 Submit Your PR

Hyperliquid’s Hyperliquidity Provider vault, which serves as a safety net for liquidations, absorbed the remaining $4.9 million in bad debt after collateral was exhausted. The attacker intentionally sacrificed their capital to push losses onto HLP liquidity providers.

“Someone torched 3M just to nuke liquidity and drag HLP into a 5M loss,” one market participant stated on X. “Classic manufactured demand illusion followed by a flush.”

Third Time Using Identical Attack Vector

This marks Hyperliquid’s third major manipulation event in 2025. The platform previously suffered similar attacks:

  • March 2025: Manipulation centered on JELLYJELLY token
  • July 2025: Attack involving TST token
  • November 2025: POPCAT-triggered cascade

Community member VietnamPenguin noted on X that “the attack vector almost perfectly copies the JELLYJELLY case, the only difference is that POPCAT is more liquid.” The recurring pattern exposes a structural vulnerability across decentralized perpetuals platforms: high-leverage positions on illiquid tokens, combined with community-funded liquidation pools, create predictable manipulation targets.

Hyperliquid allows up to 50x leverage on certain markets. The attacker used approximately 5x leverage on POPCAT, but the token’s thin liquidity amplified the damage.

Platform Response and Market Impact

Hyperliquid temporarily suspended deposits and withdrawals on its Arbitrum bridge following the attack. An admin on the platform’s Discord confirmed the Arbitrum bridge was “temporarily paused” while other deposits and withdrawals remained functional.

The platform’s blockchain, matching engine, and smart contracts were not compromised. Hyperliquid framed the incident as market manipulation rather than a technical exploit.

Withdrawals resumed after approximately one hour. Hyperliquid has not issued an official statement directly addressing the POPCAT incident or announcing changes to prevent similar attacks.

The platform’s native HYPE token dropped from $37.77 to below $38 following the attack before recovering slightly to $38.09. Technical indicators show HYPE trading below its 200-day Exponential Moving Average at $39 and failing to surpass the 50 and 100-day EMAs around $43.

Growing Manipulation Trend

Price manipulation has emerged as a rapidly growing attack vector in cryptocurrency markets. Security firm CertiK tracked 51 price manipulation incidents causing $42 million in losses during 2025, with the POPCAT attack representing a recent peak.

DeFi analyst Hanzo suggested exchanges may need stricter leverage limits, real-time monitoring tools, or platform-specific restrictions to mitigate similar attacks. Speculation emerged on social media about potential involvement of competing platforms, with some users accusing Binance and its former CEO Changpeng Zhao. 

Zhao denied involvement, stating “I have not used any other CEX for 8 years.”

Hyperliquid has become one of the breakout successes in decentralized perpetuals this cycle, regularly posting over $10 billion in daily trading volume. The platform’s rapid growth and market share dominance have made it a target for manipulation attempts.

Chain Street’s Take

Three attacks in nine months using identical methods suggests Hyperliquid either cannot or will not fix the core vulnerability. The math is straightforward: thin liquidity + high leverage + community-funded safety net = manipulatable. 

What’s unclear is whether the platform’s design philosophy prevents structural fixes or whether addressing the issue would compromise the high-risk, high-reward model that attracts users. The temporary bridge pause showed Hyperliquid can intervene when necessary, undermining claims of pure decentralization. 

Platform hasn’t announced concrete changes after three incidents, leaving liquidity providers exposed to repeat attacks. The question isn’t if another manipulation will happen; it’s when and which memecoin comes next.

CHAIN STREET INTELLIGENCE

Activate Intelligence Layer

Institutional-grade structural analysis for this article.

FAQ

Frequently Asked Questions

01

What is the Hyperliquid exploit?

The Hyperliquid exploit is a targeted cyberattack against a decentralized perpetual exchange. Hackers manipulated a known flaw in the protocol's margin calculation logic to extract liquidity from the platform's native vaults. The breach resulted in a total capital loss of $5 million.
02

Why does this matter for the DeFi industry?

Suffering a second exploit from the exact same vulnerability demonstrates a catastrophic failure in protocol governance and code auditing. It instantly drains $5 million in user funds, creating a massive liquidity crisis for the decentralized exchange. Institutional liquidity providers will likely abandon platforms that cannot secure their fundamental smart contracts.
03

How did hackers execute this attack?

The attackers utilized a flash loan to artificially inflate the value of specific collateral assets within the Hyperliquid ecosystem. They exploited the unpatched pricing oracle flaw to open massively over-leveraged positions before instantly withdrawing the extracted funds. The entire exploit concluded within a single Ethereum block.
04

What are the risks or critiques?

The primary risk is that the repeated exploit proves standard security auditing practices are completely ineffective against sophisticated state-sponsored hackers. Critics condemn the development team for failing to deploy a comprehensive patch after the first identical vulnerability. Users demand mandatory insurance funds to protect capital against protocol-level failures.
05

What happens next?

Hyperliquid must immediately halt all platform operations to conduct a comprehensive security overhaul. The development team faces intense community pressure to fully reimburse the affected users from its treasury. Blockchain security firms will use the breach as a case study for the global dangers of deploying unaudited perpetual derivatives.

You Might Also Like

CHAINSTREET
🛡
Alex Reeve

Alex Reeve is a contributing writer for ChainStreet.io. Her articles provide timely insights and analysis across these interconnected industries, including regulatory updates, market trends, token economics, institutional developments, platform innovations, stablecoins, meme coins, policy shifts, and the latest advancements in AI, applications, tools, models, and their broader implications for technology and markets.

The views and opinions expressed by Alex in this article are her own and do not necessarily reflect the official position of ChainStreet.io, its management, editors, or affiliates. This content is provided for informational and educational purposes only and does not constitute financial, investment, legal, or tax advice. Readers should conduct their own research and consult qualified professionals before making any decisions related to digital assets, cryptocurrencies, or financial matters. ChainStreet.io and its contributors are not responsible for any losses incurred from reliance on this information.