The Hypernative platform detected the attack 7 minutes before execution, providing ample opportunity to avoid loss of any funds
On April 18, 2025, Numa Money, a non-custodial and decentralized LST-backed synthetics protocol on Arbitrum, lost ~$506K in a price manipulation attack. The Hypernative platform detected the impending exploit 7 minutes before the execution, making the fund loss entirely avoidable.
The attacker was able to open large short and long positions, manipulate the price of the NUMA token, remove collateral, and exit through the vault with an unintended profit of approximately 292.96 rETH, Numa said in a post-mortem post. The stolen funds were moved from Arbitrum to Ethereum using multiple bridges and cashed-out using Tornado Cash.
The Hypernative platform accurately detected the attack and identified Numa as the target more than 7 minutes before the exploit was executed.
This kind of a textbook price manipulation attack is among the most common Web3 exploits precisely because it is cheap and fast. It also leaves a trail of onchain signals -- sudden slippage in DEX trades, flash loan initiation, discrepancies between oracle feeds and spot prices, sequential contract calls -- that can be detected before the actual damage is done.
Hypernative Platform accurately identifies over 300 risk types from smart contract hacks and bridge security incidents to frontend compromises, market manipulations and private key theft. Powered by machine learning models, heuristics, simulations and graph-based detections, Hypernative Platform spots threats with high accuracy and gives customers precious minutes to respond before exploits can do damage. The system
Reach out for a demo of Hypernative’s solutions, tune into Hypernative’s blog and our social channels to keep up with the latest on cybersecurity in Web3.
Secure everything you build, run and own in Web3 with Hypernative.