Blockchain security firm PeckShield found suspicious activity on Shibarium late Friday. Security sleuths found leaked validator keys on Shibaswap that led to an estimated $2.8 million loss through Shib token withdrawals.
The Shiba Inu team posted on X at around 9:00 PM UTC, saying it “was aware of the activity flagged by PeckShield,” and had contacted both internal developers and external security partners to investigate the exploit.
“At this time, we are working to confirm the root cause and ensure all possible mitigations are in place. A comprehensive report with findings and next steps will be published once the investigation concludes,” the Shiba Inu team wrote.
10 of 12 SHIB validator approved malicious transactions
Web2 and web3 auditor Tikkala Security has confirmed that an attacker hacked Shiba Inu’s token system by submitting valid Merkle leaf exit requests signed by multiple validators. The attacker’s wallet address withdrew funds in several instances by bypassing protections meant to safeguard the root chain manager.
According to Etherscan data, the address now holds over $700,000 worth of ERC-20 tokens.
“The hack appears to involve 10 out of 12 Shibarium validator signing keys being compromised, which allowed a malicious root state to be approved,” Tikkala explained, providing images of the events. Only validators operated by K9 Finance and UnificationUND have been confirmed to have stepped away from signing the malicious transaction.
The attack originated from a compromised checkpoint, where a seemingly legitimate Merkle root was inserted. Blockchain data from Etherscan shows that once the malicious root was added, the attacker drained another $1 million through a subsequent large transaction.
3/ Shibaswap rootchain manager contract https://t.co/Qgshvoiwbt uses the stored root Merkle hash in each checkpoint. Somehow, an attack could add a “legit” checkpoint root hash with signatures from 10 signers. pic.twitter.com/SvGYxuOyx3
— Tikkala Security (@TikkalaResearch) September 12, 2025
Investigators also uncovered that the attacker used a flash loan from Shibaswap to borrow 4.6 million BONE tokens. Initially celebrated by some as a large $1 million BONE purchase, it was instead part of the exploit. After temporarily acquiring the tokens, the attacker gained majority voting power over Shibarium’s validators, enabling them to approve a malicious state on the network.
In the same transaction, the attacker repaid the flash loan by liquidating assets taken from the bridge. They sold Shiba Inu tokens and Ether obtained during the exploit to cover the borrowed funds, and drained 224.57 Ether and approximately 92.6 billion Shiba Inu tokens. Of this amount, 216 Ether was used to settle the flash loan, leaving the remainder as profit.
The Shibaswap rootchain manager contract, which verifies withdrawals against stored root Merkle hashes, gives the attacker leeway to manipulate withdrawal requests indefinitely, and losses could continue if the Shibarium team does not act soon.
All issues pointed towards governance
Naysayers on X are arguing that Shiba Inu has “fake decentralization,” because other protocols have faced the same validator dominance issues without losing funds.
“Qom devs saw this issue in QL1 as well. Someone tried to sabotage the network by controlling 60% of validators. But QL1’s developers quickly removed the bad actor. Shiba Inu developers and Shibarium failed to do the same,” a critic surmised.
Despite the security breach, Shiba Inu’s token was trading at $0.00001416 at the time of this publication, up 0.50% over the past hour and 5.25% over the past 24 hours.
The token’s market capitalization saw a 5.24% uptick, clocking $8.26 billion. Per Cryptopolitan’s September analysis, Shiba Inu faces a critical test at its 200-day exponential moving average of $0.0000138. A decisive breakout could push prices toward the $0.000020 to $0.000024 range, while failure at this level means more consolidations and negative price pulls.
KEY Difference Wire: the secret tool crypto projects use to get guaranteed media coverage
Source: https://www.cryptopolitan.com/peckshield-flags-weird-activity-tied-to-shib/