Complex Cyberattack on Bedrock Protocol: Social Engineering, Insider Threat, and TVL Growth Despite Leak

06.07.2025

Complex Cyberattack on Bedrock Protocol: Social Engineering, Insider Threat, and TVL Growth Despite Leak

The Bedrock protocol incident, revealed in a transparency report by Fuzzland, was a complex, multi-stage cyberattack in which the attacker used a combination of social engineering, supply chain attacks, and persistent threat techniques to gain access to sensitive data 1 .

Key details of the incident:

  • Vulnerability Discovered : The vulnerability was discovered early, but was not prioritized due to the large number of false positives and security noise. This allowed an attacker to exploit it for their own purposes 1 .
  • Malware from a former employee : In addition to external attacks, a former employee of the company planted malware that created hidden access points on engineers’ workstations. These access points remained undetected for several weeks, allowing the attacker to collect data and exploit a previously identified vulnerability discovered by the Dedaub research group 1 .
  • Financial Impact and Compensation : As a result of the attack, the attacker withdrew approximately $2 million in liquidity from the Bedrock Protocol’s UniBTC product, which is part of the liquid restaking system that provides synthetic UniBTC, UniETH, and UniLOX tokens for staking income. Despite the incident, the protocol’s total locked value grew from $240 million in September 2024 to $535 million in June 2025, demonstrating continued user confidence 1 .
  • Fuzzland’s Actions : Fuzzland has fully compensated for the damage to the Bedrock protocol and initiated a joint investigation with digital security company ZeroShadow. In addition, Fuzzland has shared information about the incident with Chinese law enforcement and the US FBI, and is working with Seal 911 and SlowMist to strengthen industry security standards. Importantly, Fuzzland claims that no customers or users were harmed, as all data was isolated in a separate internal environment 1 .
  • Context of the rise in cyberattacks : The Fuzzland report comes amid a significant increase in social engineering attacks. According to CertiK, hackers are expected to steal more than $2.1 billion in digital assets in 2025, with most of the damage coming from phishing and wallet hacking. Ronghui Gu, co-founder of CertiK, noted that attackers are changing their strategies to focus on social engineering techniques 1 .
Complex Cyberattack on Bedrock Protocol: Social Engineering, Insider Threat, and TVL Growth Despite Leak

The Bedrock incident thus demonstrates how a combination of technical vulnerabilities, human error, and targeted insider activity can lead to serious consequences in the field of digital security. Fuzzland’s response, including compensation for losses, cooperation with experts and law enforcement, and strengthening of security standards, serves as an example of a comprehensive approach to incident management in the blockchain industry. At the same time, the increase in such attacks highlights the need for continuous improvement of security methods and increased digital literacy of all market participants 1 .

What security measures did Fuzzland and partners take after the Bedrock attack?

Following the attack on the Bedrock protocol, Fuzzland took comprehensive security measures :

  • Fully compensated for the damage to the protocol to restore user trust and minimize the impact of the incident.
  • Initiated a joint investigation with digital security company ZeroShadow to deeply analyze and eliminate the causes of the attack.
  • Passed information about the incident to Chinese law enforcement agencies and the US FBI to bring those responsible to justice and prevent further attacks.
  • Collaborates with experts from Seal 911 and SlowMist to strengthen industry security standards , including improving monitoring, threat detection, and incident response processes.
  • Ensured that user and customer data remained isolated in a separate internal environment , preventing it from being compromised.

These measures reflect a systematic approach by Fuzzland and its partners to improve security and prevent similar incidents in the future.

How the attacker used social engineering to obtain data

The Bedrock attacker used social engineering to gain access to the company’s sensitive data and systems. Social engineering is a technique used to psychologically manipulate people to trick them into revealing sensitive information or accessing resources while bypassing technical protections 5 .

In this case, the attacker could have used the following techniques:

  • Gathering information about employees and infrastructure – studying open sources, social networks and internal data to create a profile of the victim and prepare a convincing legend 6 .
  • Impersonating a trusted person , such as a technical support employee, partner, or manager, to gain trust and obtain the necessary data or access 4 .
  • Establishing contact and gaining trust – through email, instant messaging or phone calls, using professional slang and detailed information about the company, which reduces the victim’s suspicions 6 .
  • Malware injection – under the guise of an update or help, which allows you to create hidden access points and remain undetected in the system for a long time 5 .
  • Exploitation of previously identified vulnerabilities – using collected data and access, an attacker could take advantage of technical gaps that were not promptly eliminated due to false positives of the security system 1 .

Thus, the attacker did not simply hack the system technically, but used a complex strategy of psychological deception and manipulation, which allowed him to gain access to the company’s internal resources and confidential information, as well as introduce malware for further data collection 6 .

What was the vulnerability that was previously discovered and why was it not a priority?

The previously discovered vulnerability used by the attacker in the Bedrock protocol attack was a known security flaw for which an update or fix already existed. However, it was not prioritized for immediate remediation due to a high false positive rate and noise in the security monitoring system. This meant that the security system generated many alerts that did not always correspond to real threats, making it difficult to isolate truly critical issues.

As a result, the vulnerability remained incompletely patched and continued to pose a risk, as such “N-day” vulnerabilities (vulnerabilities known in advance and patched) remain dangerous if organizations do not or cannot update their systems in a timely manner. Exploits for such vulnerabilities are often publicly available, and their exploitation depends on software patching discipline and incident management.

Thus, it was precisely because of insufficient priority and processing of false positives that the vulnerability was not closed in time, which allowed the attacker to use it in combination with other attack methods 2 .

How a former employee planted malware and created hidden access points

The former employee introduced malware onto engineers’ workstations using methods that combined technical tricks and trusted access. According to known attack scenarios, he was able to use his internal access and knowledge of the infrastructure to covertly install malware that created hidden access points — communication channels with the attacker’s external control server that were invisible to standard security tools.

The main mechanisms of malware implementation and operation include:

  • Using loaders like GuLoader , which are able to bypass antivirus systems and sandboxes, checking that the program is launched not in a test environment, but on a real device. This increases the likelihood of successfully launching a malicious load.
  • The malware could disguise itself as legitimate processes by changing their names and launch parameters, making it difficult to detect.
  • Creating hidden access points – for example, through Port knocking techniques, allowing an attacker to gain unnoticed access even in segments with strictly limited Internet access.
  • Encryption of transmitted data and use of legitimate hacked sites as control servers, which masks malicious traffic and complicates investigation.
  • The malware could launch automatically at system boot or user login, gaining a foothold in the system and providing long-term hidden access.

Thus, the former employee, using his knowledge and access to the infrastructure, introduced sophisticated, detection-resistant malware that created hidden access channels on the engineers’ workstations. These access points remained undetected for several weeks, allowing the attacker to collect data and exploit a previously identified vulnerability 6 .

Why Despite Liquidity Leaks, Total Protocol TVL Increased From September 2024 to June 2025

Despite a liquidity leak of approximately $2 million from the Bedrock protocol’s UniBTC product in September 2024, the protocol’s total value locked (TVL) grew from $240 million in September 2024 to $535 million in June 2025. This is due to several factors:

  • Maintaining user and investor confidence : Fuzzland responded quickly to damages and investigations, helping to maintain the protocol’s reputation and market confidence.
  • Active development and expansion of Bedrock products : The protocol offers synthetic tokens UniBTC, UniETH and UniLOX, which allow for income from staking, which attracts new users and capital.
  • Overall positive trend in the DeFi and cryptocurrency market : Despite isolated incidents, the market continued to grow, and institutional investors increased their investments in crypto assets, which contributed to the influx of liquidity into promising projects 3 .
  • Growing interest in liquid restaking and innovative financial products : Protocols like Bedrock are meeting the needs of investors looking to generate income from assets, driving an increase in TVL 10 .

Thus, despite the short-term losses due to the attack, the complex compensation and security measures, as well as the attractiveness of the protocol products, contributed to a significant increase in the total locked value.

  1. https://forklog.com/glavnoe-za-mesyats-vyzovy-dlya-bitkoina-aktualnaya-kiberbezopasnost-i-militarizatsiya-ii
  2. https://t.me/s/forklog?before=41828
  3. https://www.block-chain24.com/news/novosti-bezopasnosti/fuzzland-za-eksploitom-protokola-bedrock-unibtc-na-2-mln-stoit-byvshiy
  4. https://www.gate.com/ru/learn/articles/gate-research-btc-eth-lead-gains-usdy-tvl-surpasses-100m-on-solana-goat-ignites-ai-memecoin-frenzy/4431
  5. https://ru.tradingview.com/ideas/page-146/?sort=recent_extended&video=no
  6. https://www.securities.io/ru/dydx-token-holds-steady-despite-overall-market-decline/
  7. https://ru.tradingview.com/news/forklog:a9ac0b0bb67b8:0/
  8. https://www.bitget.com/ru/price/proof/news
  9. https://www.binance.com/ru/square/post/20961882736481
  10. https://www.gate.com/ru/learn/articles/the-liquid-restaking-landscape/60564
  1. https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%92%D1%80%D0%B5%D0%B4%D0%BE%D0%BD%D0%BE%D1%81%D0%BD%D0%B0%D1%8F_%D0%BF%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%BC%D0%B0_(%D0%B7%D0%BB%D0%BE%D0%B2%D1%80%D0%B5%D0%B4)
  2. https://www.kaspersky.ru/blog/cybersecurity-history-iloveyou/33691/
  3. https://cifrateka.ru/articles/opasnosti-otkrytykh-wi-fi-setey-kak-zashchitit-svoi-dannye-/
  4. https://startx.team/blog/statyi/xxe-ataka-chto-eto-takoye-i-kak-predotvratit-uyazvimosti/
  5. https://xygeni.io/ru/blog/open-source-malicious-packages-the-problem/
  6. https://ptsecurity.com/ru-ru/research/analytics/malware-behavior-and-distribution-channels/
  7. https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%92%D0%B8%D1%80%D1%83%D1%81%D1%8B-%D0%B2%D1%8B%D0%BC%D0%BE%D0%B3%D0%B0%D1%82%D0%B5%D0%BB%D0%B8_(%D1%88%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BB%D1%8C%D1%89%D0%B8%D0%BA%D0%B8)_Ransomware
  8. http://www.sberbank.ru/ru/person/kibrary/articles/kak-zashchitit-domashnyuyu-wi-fi-set
  9. https://securelist.ru/golovy-gidry-vredonosnoe-po-dlya-setev/60/
  10. https://gendalf.ru/news/security/vasha-informatsiya-pod-ugrozoy-pora-prov/
  1. https://is-systems.org/blog_article/11660115806
  2. https://ya.ru/neurum/c/tehnologii/q/v_chem_zaklyuchayutsya_osnovnye_razlichiya_5da2300f
  3. https://ru.wikipedia.org/wiki/%D0%A3%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D1%8C_%D0%BD%D1%83%D0%BB%D0%B5%D0%B2%D0%BE%D0%B3%D0%BE_%D0%B4%D0%BD%D1%8F
  4. https://www.sberbank.ru/ru/person/kibrary/articles/uyazvimosti-nulevogo-dnya-chto-ehto-takoe-i-kak-zashchititsya
  5. https://multifactor.ru/press-center/yuzvimosti-nulevogo-dnya-kak-borotsya-s-neizvestnostyu/
  6. https://ics-cert.kaspersky.ru/publications/reports/2019/11/13/vnc-vulnerability-research/
  7. https://vk.com/@habr-istoriya-odnoi-uyazvimosti
  8. https://cisoclub.ru/otvetstvennoe-raskrytie-ujazvimostej-jetika-i-praktika/
  9. https://rt-solar.ru/products/solar_appscreener/blog/4869/
  10. https://habr.com/ru/companies/pvs-studio/articles/678410/
  1. https://www.kaspersky.ru/resource-center/definitions/what-is-social-engineering
  2. https://www.eset.com/ua-ru/support/information/entsiklopediya-ugroz/sotsialnaya-inzheneriya/
  3. https://masksafe.ru/news/security/kak-kiberprestupniki-ispolzuyut-sotsialnuyu-inzheneriyu-dlya-vzloma-konfidentsialnoy-informatsii-org
  4. https://www.reg.ru/blog/chto-takoe-sotsialnaya-inzheneriya/
  5. https://ru.wikipedia.org/wiki/%D0%A1%D0%BE%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D0%B0%D1%8F_%D0%B8%D0%BD%D0%B6%D0%B5%D0%BD%D0%B5%D1%80%D0%B8%D1%8F
  6. http://safe-surf.ru/users-of/article/642870/
  7. https://sec.ussc.ru/social_engineering
  8. https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%98%D0%B3%D1%80%D0%B0_%D0%BD%D0%B0_%D1%87%D1%83%D0%B2%D1%81%D1%82%D0%B2%D0%B0%D1%85:_%D0%BA%D0%B0%D0%BA_%D0%BA%D0%B8%D0%B1%D0%B5%D1%80%D0%BC%D 0%BE%D1%88%D0%B5%D0%BD%D0%BD%D0%B8%D0%BA%D0%B8_%D0%BF%D1%80%D0%B8%D0%BC%D0%B5%D0%BD%D1%8F%D1%8E%D1%82_%D1%81 %D0%BE%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%83%D1%8E_%D0%B8%D0%BD%D0%B6%D0%B5%D0%BD%D0%B5%D1%80%D0%B8%D1%8E
  9. https://spectrumdata.ru/blog/proverka-soiskatelya/chto-takoe-sotsialnaya-inzheneriya-i-kak-ot-nee-zashchititsya/
  10. https://ptsecurity.com/ru-ru/research/analytics/social-engineering/
  1. https://www.block-chain24.com/news/novosti-bezopasnosti/fuzzland-za-eksploitom-protokola-bedrock-unibtc-na-2-mln-stoit-byvshiy
  2. https://www.hse.ru/data/2011/03/18/1211251292/yazik_vrazhdi_protiv_obshestva.pdf
  3. https://www.block-chain24.com/news/novosti-bezopasnosti/atomic-wallet-zayavlyaet-chto-vzlom-zato-menee-1-aktivnyh-polzovateley
  4. https://xn--197-5cd3cgu2f.xn--80acgfbsl1azdqr.xn--p1ai/file/download?id=4185
  5. https://msal.ru/upload/iblock/bbb/o6ya1ef0eruz4bgekoefn83hkmpu961n.pdf
  6. https://yaroslavl.mfua.ru/studentu/files/Nauchnaya_rabota/Konferenciya_2016/Sbornik_Konferenciya_studentov_YF_MFUA_2016.pdf
  7. https://sites.susu.ru/cmi/wp-content/uploads/sites/61/2025/01/2023-%D0%92%D0%AB%D0%9F%D0%A3%D0%A1%D0%9A-5-%D0%9C%D0%BE%D0%BD%D0%BE%D0%B3%D1%80% D0%B0%D1%84%D0%B8%D1%8F-%D0%98%D0%9D%D0%A4%D0%9E%D0%A0%D0%9C%D0%90%D0%A 6%D0%98%D0%9E%D0%9D%D0%9D%D0%90%D0%AF-%D0%92%D0%9E%D0%99%D0%9D%D0%90.pdf
  8. https://kpfu.ru/staff_files/F762326356/vial10.pdf
  9. https://yaroslavl.fa.ru/upload/constructor/2e0/oky8i4vk9y3ma9xu3wqlztpcfrnx6zok/KOMMUNIKATSIYA-_-OBSHCHESTVO-_-CHELOVEK.-2022.pdf
  10. https://medialing.spbu.ru/upload/files/file_1394719605_1975.pdf