
- Stabble urged users to withdraw liquidity after a former executive was identified as an alleged North Korean hacker.
- The protocol’s total value locked fell from about $1.75 million to under $663,000 after the warning.
Stabble, a decentralized exchange on Solana, told users to pull liquidity on Tuesday after a former executive was publicly identified as an alleged North Korean operative, setting off a sharp and immediate retreat from the platform.
The warning came from the protocol’s new team, which posted an emergency message urging liquidity providers to withdraw “better safe than sorry.” The alert landed roughly seven hours after onchain investigator ZachXBT identified Keisuke Watanabe, who reportedly served as Stabble’s CTO last year, as an alleged North Korean hacker.
Liquidity fled first, facts came second
That was enough to trigger a fast response from users. According to reporting and DeFiLlama-linked figures cited publicly, Stabble started the day with around $1.75 million in total value locked. After the warning, that figure fell to less than $663,000, a drop of roughly 62%.
There is, at least so far, no confirmed exploit tied directly to Stabble itself. That point matters. The panic was driven by counterparty and personnel risk, not by evidence that protocol funds had already been drained. Still, in crypto, suspicion alone can empty a pool quickly, especially when North Korean-linked actors are involved.
A personnel scare becomes a protocol stress test
The incident also lands at an awkward moment for the exchange. Public reports say Stabble was recently taken over by a new team, meaning the protocol was already in a transitional phase when the alarm hit.
That makes the episode less about one wallet or one suspicious transfer and more about trust in operating history. In decentralized markets, teams often talk about smart contract risk, oracle risk and liquidity risk. But human risk, who built the system, who touched it, who had access, still has a habit of surfacing at the worst possible time.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
Volo Protocol Loses $3.5M in Sui Hack, Commits to Absorb Losses and Freeze Hacker Funds
Gate News message, April 22 — Volo Protocol, a yield vault operator on Sui, announced yesterday (April 21) that it has begun freezing stolen assets following a $3.5 million exploit. Hackers looted WBTC, XAUm, and USDG from Volo Vaults, marking the latest major DeFi security breach in a
GateNews2h ago
French Family Forced to Transfer $820K in Crypto After Armed Home Invasion
Gate News message, April 22 — A family in Ploudalmézeau, a small town in Brittany, France, was invaded by two armed masked men on Monday (April 20), according to reporting by The Block. Three adults were bound for over three hours and forced to transfer approximately 700,000 euros (about $820,000) i
GateNews3h ago
DOJ Launches Compensation Process for OneCoin Fraud Victims, $40M+ in Recovered Assets Available
Gate News message, April 22 — The U.S. Department of Justice has announced the launch of a compensation process for victims of the OneCoin cryptocurrency fraud scheme, with more than $40 million in recovered assets now available for distribution.
The scheme, operated between 2014 and 2019 by Ruja
GateNews4h ago
AI16Z, ELIZAOS Creators Sued Over $2.6B Fraud Allegations; Token Crashes 99.9% From Peak
Federal class action accuses AI16Z/ELIZAOS of a $2.6B crypto fraud via fake AI claims and deceptive marketing, alleging insider favoritism and a staged autonomous system; seeks damages under consumer protection laws.
Abstract: This report covers a SDNY federal class-action filed April 21 accusing AI16Z and its rebrand ELIZAOS of a $2.6 billion crypto fraud involving fake AI claims and deceptive marketing. The suit alleges a manufactured link with Andreessen Horowitz and a non-autonomous system. It details a peak valuation in early 2025, a 99.9% crash, and about 4,000 losing wallets, with insiders receiving ~40% of new tokens. Plaintiffs seek damages and equitable relief under New York and California consumer-protection laws. Regulators in Korea and major exchanges have warned or suspended related trading.
GateNews5h ago
SlowMist Alerts: Active MacSync Stealer macOS Malware Targeting Crypto Users
SlowMist warns of MacSync Stealer (v1.1.2) for macOS that steals wallets, credentials, keychains, and infra keys, using spoofed AppleScript prompts and fake 'unsupported' errors; urges caution and awareness of IOCs.
Abstract: This report summarizes SlowMist's alert about MacSync Stealer (v1.1.2), a macOS information stealer targeting cryptocurrency wallets, browser credentials, system keychains, and infrastructure keys (SSH, AWS, Kubernetes). It deceives users with spoofed AppleScript dialogs prompting for passwords and visible fake 'unsupported' messages. SlowMist provides IOCs to customers and advises avoiding unverified macOS scripts and remaining vigilant for unusual password prompts.
GateNews6h ago
North Korean Lazarus Group Deploys Mach-O Man Malware to Steal Crypto Wallet Credentials from macOS Users
Lazarus releases Mach-O Man for macOS to steal keychain data and wallet credentials, targeting crypto executives via ClickFix pop-ups and compromised Telegram meetings.
Abstract: The article reports that the Lazarus-linked Mach-O Man malware targets macOS to exfiltrate keychain data, browser credentials, and login sessions to access cryptocurrency wallets and exchange accounts. Distribution relies on ClickFix social engineering and compromised Telegram accounts directing victims to fake meeting links. The piece ties the operation to the April 20 Kelp DAO hack and identifies TraderTraitor as Lazarus-affiliated, noting rsETH movement across blockchains via LayerZero’s OFT standard.
GateNews7h ago