
PeckShield flagged $1.8M in DAI stolen from Transit Finance, a cross-chain swap aggregator. Funds sit in a single address, renewing cross-chain risk concerns.
Transit Finance, a cross-chain swap aggregator routing trades across more than a dozen blockchain networks, was exploited for $1.8 million in DAI stablecoins, according to blockchain security firm PeckShield. The firm flagged the breach on Wednesday and identified a single Ethereum address currently holding the stolen funds. The incident is the latest in a string of attacks targeting the interconnected architecture of cross-chain systems, where a single approval flaw can drain liquidity from multiple pools.
The attacker moved the $1.8 million in DAI to one Ethereum address, a pattern that simplifies tracking however also signals a potential plan to launder the funds through a mixer or cross-chain bridge. Transit Finance aggregates swap routes across networks, meaning users grant token approvals to its smart contracts. An exploit that compromises the swap mechanism can siphon assets from any wallet that has not revoked those approvals. The current breach appears smaller than the protocol’s October 2022 exploit, when $28.9 million was stolen through improper input validation in the same swap logic. A portion of those funds was later recovered.
The simple read is that a $1.8 million loss is manageable for a protocol that has survived a much larger attack. The better read is that the recurrence of an approval-based exploit on the same aggregator suggests the underlying contract architecture still contains vectors that sophisticated attackers can reuse. Users who have not revoked old approvals remain exposed, and the single-address holding pattern gives a narrow window for recovery before funds move.
Transit Finance operates as a cross-chain swap aggregator, connecting liquidity across more than a dozen blockchains. This design expands its attack surface: a vulnerability in one chain’s integration can cascade to assets on other networks. The 2022 exploit drained $28.9 million by exploiting improper input validation, allowing unauthorized transfers from users who had granted token approvals. The protocol recovered a portion of those funds, however the incident left a residual approval risk for wallets that never revoked permissions.
The current $1.8 million DAI drain suggests the attacker may have targeted a similar approval vector or a new flaw in the swap routing logic. Because Transit Finance does not custody assets directly, the loss is borne by users who had active approvals. The protocol’s total value locked and the number of affected wallets are not yet disclosed, however the single-address concentration of the stolen funds indicates the attacker has not yet distributed the proceeds across multiple wallets or chains.
The Transit Finance exploit lands in a month where DeFi protocols have already lost over $600 million to hacks. Kelp DAO, a liquid restaking protocol, was drained of $293 million on April 19. Drift Protocol, a Solana-based perpetuals exchange, lost $280 million on April 1. Those two incidents account for nearly the entire monthly total, and full-year 2026 DeFi hacking losses are now projected to reach $2.3 billion.
North Korea-linked Lazarus Group is believed to be responsible for roughly 76% of all crypto hack losses through April 2026, according to TRM Labs. Cross-chain systems like Transit Finance remain high-value targets because they concentrate liquidity from multiple networks and often rely on complex smart contract interactions that are difficult to audit comprehensively. The $1.8 million DAI theft may be small relative to the April totals, however it reinforces the pattern of state-linked actors probing cross-chain infrastructure for weaknesses.
The immediate risk containment depends on whether the attacker moves the funds to a centralized exchange where they can be frozen. Transit Finance’s team has not yet disclosed whether they are working with exchanges or blockchain analytics firms to trace the address. A rapid freeze, similar to partial recoveries after the 2022 exploit, would limit the damage and signal that the protocol can respond effectively.
Escalation would come from two directions. First, if the attacker successfully routes the $1.8 million through a mixer or a cross-chain bridge to a privacy chain, recovery becomes nearly impossible and the address becomes a template for future attacks. Second, if the exploit reveals a systemic flaw in the swap aggregator’s contract logic that is shared by other protocols using similar cross-chain routing libraries, the risk spreads beyond Transit Finance. The Lazarus Group’s documented focus on cross-chain infrastructure makes that scenario more than theoretical.
For users, the practical exposure is any wallet that still holds an active approval for Transit Finance’s swap contracts. Revoking those approvals removes the direct risk, however the broader confidence question is whether cross-chain aggregators can secure the multi-network permissions they require to function. The next concrete marker is whether Transit Finance publishes a post-mortem identifying the exact vulnerability and the number of affected wallets, and whether the attacker’s address interacts with a known exchange or mixer in the coming days.
Drafted by the AlphaScala research model and grounded in primary market data – live prices, fundamentals, SEC filings, hedge-fund holdings, and insider activity. Each story is checked against AlphaScala publishing rules before release. Educational coverage, not personalized advice.