
Rebranding Recap
Mendi Finance will rebrand to Malda this Thursday (Feb 20th). This marks another major step in our transition, here’s a look at the changes that will be introduced in the rebranding.Update to Our Social ProfilesNew Name on Socials (ie: X, Discord, DeBank, etc.): Malda (prev. Mendi Finance) Tag: @malda_xyzNew Malda PFPNOTE: We are in contact with X/Twitter support to minimize downtime of our verified checkmark.I’m supplying / borrowing on Mendi, what should I do?Your lending and borrowing posi...

The Road to Recovery
In the past 8 weeks we have been working day and night, collaborating with a wide range of parties from partners to security firms to create Malda’s recovery plan: Operation Phoenix. This recovery plan outlines how we will make affected users whole again, while laying the foundation for Malda’s long-term success. We would like to express our gratitude to the community for their patience and trust, as well as our partners for their continued support and advisory behind the scenes. This is a re...

Governance Round
The Governance Round is Live!Mendi Finance | Governance RoundThe Governance Round. Empowering $MENDI stakers to deepen involvement & get an early hand in the 1st Unified Liquidity Lending.https://mendi.financeThe Mendi Finance DAO has passed a vote to upgrade the protocol and become the first Unified Liquidity Lending (ULL) protocol in DeFi. ULL elevates itself above the current “legacy” lending model by creating a truly unified pool of liquidity connecting Mainnet and L2 chains together seam...
Malda (prev. Mendi Finance) is the first Unified Liquidity Lending to deliver a seamless lending experience across Mainnet & L2s.



Rebranding Recap
Mendi Finance will rebrand to Malda this Thursday (Feb 20th). This marks another major step in our transition, here’s a look at the changes that will be introduced in the rebranding.Update to Our Social ProfilesNew Name on Socials (ie: X, Discord, DeBank, etc.): Malda (prev. Mendi Finance) Tag: @malda_xyzNew Malda PFPNOTE: We are in contact with X/Twitter support to minimize downtime of our verified checkmark.I’m supplying / borrowing on Mendi, what should I do?Your lending and borrowing posi...

The Road to Recovery
In the past 8 weeks we have been working day and night, collaborating with a wide range of parties from partners to security firms to create Malda’s recovery plan: Operation Phoenix. This recovery plan outlines how we will make affected users whole again, while laying the foundation for Malda’s long-term success. We would like to express our gratitude to the community for their patience and trust, as well as our partners for their continued support and advisory behind the scenes. This is a re...

Governance Round
The Governance Round is Live!Mendi Finance | Governance RoundThe Governance Round. Empowering $MENDI stakers to deepen involvement & get an early hand in the 1st Unified Liquidity Lending.https://mendi.financeThe Mendi Finance DAO has passed a vote to upgrade the protocol and become the first Unified Liquidity Lending (ULL) protocol in DeFi. ULL elevates itself above the current “legacy” lending model by creating a truly unified pool of liquidity connecting Mainnet and L2 chains together seam...
Share Dialog
Share Dialog
Malda (prev. Mendi Finance) is the first Unified Liquidity Lending to deliver a seamless lending experience across Mainnet & L2s.

Subscribe to Malda

Subscribe to Malda
>900 subscribers
>900 subscribers
May 30, 06:51 PM UTC — A third party attacker executed an exploit targeting the Mendi-to-Malda migrator contract:https://lineascan.build/tx/0xd62a3d483b89e38b681777804b286dec682919891924c2b13c566dfaad666ed3
The attacker leveraged a vulnerability in the migrator contract, which was intended solely to allow Mendi protocol users to migrate directly to Malda. Instead, the attacker deployed a fake Mendi Comptroller contract, enabling the attacker to mint a fraudulent Malda position and withdraw funds against it.
May 30, 06:52 PM UTC — Hypernative’s monitoring system detected the exploit and attempted to pause the markets. The Hypernative team notified the company that two operations failed. A manual pause of the network was initiated.
May 30, 7:30 PM UTC — The third party attacker carried out another malicious transaction targeting the Mendi-to-Malda migrator contract again:
https://lineascan.build/tx/0x9f12f7b982ffbd90ac5944b3ab8520f7fb5a9882a0a9acf20d63f6922950e59a
May 30, 07:36 PM UTC — The full protocol was paused:
https://lineascan.build/tx/0xa9d5c00aee3be937ceada32181f0f02b9ac3d9be9b2b8c008213ca53114257fd
An investigation was initiated immediately after the pause, and the Malda community was informed via official social channels:
https://x.com/malda_xyz/status/1928545070052970928
The third party attacker directed exploited funds to following wallet address: 0x370a8Db1F020CE70E8eAB2502c739844Ca2C2910 – an address under their control.
The exploiter address was funded by ChangeNow 13 minutes prior to the initial exploit: https://lineascan.build/tx/0xaccb4b73fed508958ec8b913e8c4dabd125c15d7800d5b8c63466910df8a5c77
The funds allegedly according to ChangeNow came from Monero.
The attacker swapped the stolen assets to ETH on Linea utilizing SyncSwap.
Assets were bridged to Ethereum Mainnet via Stargate, using multiple transactions: https://lineascan.build/txs?a=0x370a8db1f020ce70e8eab2502c739844ca2c2910
Once on Ethereum Mainnet funds were sent through Tornado Cash: https://etherscan.io/address/0x370a8db1f020ce70e8eab2502c739844ca2c2910
The vulnerability originated in the Migrator.sol contract. The contract allowed the Mendi Comptroller address to be passed dynamically, rather than being hardcoded. This enabled the attacker to supply their own malicious Comptroller, mint a synthetic position on Malda, and withdraw approximately $285,000.
The Migrator contract passed Malda’s security review processes in advance of deployment. The logic gap described above had not been identified. We are committed to the long-term resilience of Malda. This incident has deepened our resolve to enhance and implement additional cyber security procedures and review processes to ensure the ongoing safety of the protocol and its users. We also continue to deepen our coordination with our monitoring and audit partners to proactively strengthen the protocol’s security and reinforce its resilience through continuous evaluation and improvement.
Importantly, the exploit was isolated to the migrator contract. There was no compromise of core lending logic and no vulnerabilities identified in the zk-proof infrastructure.
We are collaborating with leading blockchain forensics firms to monitor attacker wallets and track asset flows across chains.
All relevant addresses and transaction data have been shared with appropriate law enforcement agencies, and we continue to cooperate with those investigations.
We remain committed to pursuing all lawful avenues for fund recovery.
Following the exploit, a public on-chain message was posted offering a 10% white hat bounty in exchange for the voluntary return of 90% of the stolen funds:
https://lineascan.build/tx/0xd62a3d483b89e38b681777804b286dec682919891924c2b13c566dfaad666ed3
As of the June 4, 19:00 UTC deadline, no funds were returned and no contact was made. The white hat window is closed.
The immediate fix involved updating the migrator parameter to an empty contract. Transaction hash:
https://lineascan.build/tx/0xd62a3d483b89e38b681777804b286dec682919891924c2b13c566dfaad666ed3
A more robust long-term fix will involve hardcoding both the Mendi Comptroller and Malda operator addresses.
Due to the attacker’s remaining position in the protocol, unpausing is currently not feasible. As a result, the protocol will remain paused until the Malda team proposes a secure withdrawal plan to the community. A Snapshot vote will be initiated, allowing depositors to vote on the preferred method for safely accessing the remaining funds in the protocol.
Over the past days, we’ve been actively collaborating with ecosystem participants, partners, and advisors to assess the situation and determine the best path forward.
As part of these efforts, we’re preparing to introduce a recovery plan.
We’ll be hosting a livestream next week to walk through the findings, outline the next steps, and answer questions.
We are committed to transparency and the long-term integrity of the Malda protocol. Appreciate the community's patience and resilience.
May 30, 06:51 PM UTC — A third party attacker executed an exploit targeting the Mendi-to-Malda migrator contract:https://lineascan.build/tx/0xd62a3d483b89e38b681777804b286dec682919891924c2b13c566dfaad666ed3
The attacker leveraged a vulnerability in the migrator contract, which was intended solely to allow Mendi protocol users to migrate directly to Malda. Instead, the attacker deployed a fake Mendi Comptroller contract, enabling the attacker to mint a fraudulent Malda position and withdraw funds against it.
May 30, 06:52 PM UTC — Hypernative’s monitoring system detected the exploit and attempted to pause the markets. The Hypernative team notified the company that two operations failed. A manual pause of the network was initiated.
May 30, 7:30 PM UTC — The third party attacker carried out another malicious transaction targeting the Mendi-to-Malda migrator contract again:
https://lineascan.build/tx/0x9f12f7b982ffbd90ac5944b3ab8520f7fb5a9882a0a9acf20d63f6922950e59a
May 30, 07:36 PM UTC — The full protocol was paused:
https://lineascan.build/tx/0xa9d5c00aee3be937ceada32181f0f02b9ac3d9be9b2b8c008213ca53114257fd
An investigation was initiated immediately after the pause, and the Malda community was informed via official social channels:
https://x.com/malda_xyz/status/1928545070052970928
The third party attacker directed exploited funds to following wallet address: 0x370a8Db1F020CE70E8eAB2502c739844Ca2C2910 – an address under their control.
The exploiter address was funded by ChangeNow 13 minutes prior to the initial exploit: https://lineascan.build/tx/0xaccb4b73fed508958ec8b913e8c4dabd125c15d7800d5b8c63466910df8a5c77
The funds allegedly according to ChangeNow came from Monero.
The attacker swapped the stolen assets to ETH on Linea utilizing SyncSwap.
Assets were bridged to Ethereum Mainnet via Stargate, using multiple transactions: https://lineascan.build/txs?a=0x370a8db1f020ce70e8eab2502c739844ca2c2910
Once on Ethereum Mainnet funds were sent through Tornado Cash: https://etherscan.io/address/0x370a8db1f020ce70e8eab2502c739844ca2c2910
The vulnerability originated in the Migrator.sol contract. The contract allowed the Mendi Comptroller address to be passed dynamically, rather than being hardcoded. This enabled the attacker to supply their own malicious Comptroller, mint a synthetic position on Malda, and withdraw approximately $285,000.
The Migrator contract passed Malda’s security review processes in advance of deployment. The logic gap described above had not been identified. We are committed to the long-term resilience of Malda. This incident has deepened our resolve to enhance and implement additional cyber security procedures and review processes to ensure the ongoing safety of the protocol and its users. We also continue to deepen our coordination with our monitoring and audit partners to proactively strengthen the protocol’s security and reinforce its resilience through continuous evaluation and improvement.
Importantly, the exploit was isolated to the migrator contract. There was no compromise of core lending logic and no vulnerabilities identified in the zk-proof infrastructure.
We are collaborating with leading blockchain forensics firms to monitor attacker wallets and track asset flows across chains.
All relevant addresses and transaction data have been shared with appropriate law enforcement agencies, and we continue to cooperate with those investigations.
We remain committed to pursuing all lawful avenues for fund recovery.
Following the exploit, a public on-chain message was posted offering a 10% white hat bounty in exchange for the voluntary return of 90% of the stolen funds:
https://lineascan.build/tx/0xd62a3d483b89e38b681777804b286dec682919891924c2b13c566dfaad666ed3
As of the June 4, 19:00 UTC deadline, no funds were returned and no contact was made. The white hat window is closed.
The immediate fix involved updating the migrator parameter to an empty contract. Transaction hash:
https://lineascan.build/tx/0xd62a3d483b89e38b681777804b286dec682919891924c2b13c566dfaad666ed3
A more robust long-term fix will involve hardcoding both the Mendi Comptroller and Malda operator addresses.
Due to the attacker’s remaining position in the protocol, unpausing is currently not feasible. As a result, the protocol will remain paused until the Malda team proposes a secure withdrawal plan to the community. A Snapshot vote will be initiated, allowing depositors to vote on the preferred method for safely accessing the remaining funds in the protocol.
Over the past days, we’ve been actively collaborating with ecosystem participants, partners, and advisors to assess the situation and determine the best path forward.
As part of these efforts, we’re preparing to introduce a recovery plan.
We’ll be hosting a livestream next week to walk through the findings, outline the next steps, and answer questions.
We are committed to transparency and the long-term integrity of the Malda protocol. Appreciate the community's patience and resilience.
No activity yet