On June 6, 2025, the Bitcoin-DeFi protocol ALEX Lab suffered its second major exploit in 13 months. The attacker exploited a flaw in the protocol's self-listing verification logic — an on-chain limitation of the Stacks blockchain itself — to drain several asset pools. Officially-acknowledged loss: $8.37 million; analyst estimates including stolen aBTC, ALEX and other tokens reached $16.18 million. ALEX Lab's Treasury Grant Program ultimately delivered 100% reimbursement to affected users.
What happened
ALEX Lab operates as a DeFi suite on Stacks, the Bitcoin-anchored smart-contract layer. The protocol's self-listing feature allowed projects to permissionlessly add their own tokens to ALEX's liquidity pools — useful for token issuers wanting immediate liquidity without going through a formal listing process.
The self-listing verification logic relied on on-chain primitives that Stacks itself does not fully support in the way the contract assumed. Specifically, the protocol's check for "is this a legitimate token contract" had gaps that the attacker found and exploited: by registering a malicious token through the self-listing path, the attacker could trigger drain logic against ALEX's actual reserves rather than the fake token they had registered.
The attack drained:
- 8,403,867 STX (~$5.69M)
- 21.85 sBTC (~$2.24M)
- 149,850 USDC/USDT (~$149K)
- Additional ALEX, aBTC tokens worth several million more (the analyst-estimated total)
Aftermath
- ALEX Lab paused the self-listing feature permanently, pending "fundamental chain-level improvements" to Stacks.
- The team announced a Treasury Grant Program that fully reimbursed every affected user at the pre-incident snapshot.
- The ALEX token fell approximately 45% intraday but recovered partially as the reimbursement was rolled out.
- This was the protocol's second major incident after the May 2024 bridge exploit attributed to Lazarus. The two incidents had different root causes — the 2024 bridge exploit was a key-compromise-pattern attack, while the 2025 self-listing exploit was a smart-contract design flaw.
Why it matters
ALEX Lab's two incidents in 13 months illustrate the recurring post-incident fragility problem: a project that has suffered one major exploit faces:
- Increased attention from sophisticated attackers who now know the codebase and the team's response patterns.
- Pressure to ship features and rebuild user trust that competes with the rigour required for post-incident hardening.
- Limited treasury resources if the first incident drained reserves intended for security investment.
The structural lesson, well-documented across the post-Mt. Gox era: the first exploit signals exploitable team or architecture weakness, and the second exploit usually follows within 24 months if the team's post-incident remediation focuses on the specific bug rather than the systemic causes.
The Stacks-specific lesson is also worth noting: ALEX Lab is one of the larger DeFi protocols built on a smart-contract layer that does not have the same primitive maturity as the EVM. Stacks' approach to Bitcoin-anchored execution involves trade-offs (slower confirmation, different consensus assumptions, Clarity language constraints) that affect what protocol designs are safe versus risky. Self-listing — a permissionless trust pattern that works well on Ethereum given the EVM's introspection capabilities — turned out to be unsafe on Stacks given the chain's actual primitive set.
ALEX Lab's full-reimbursement response was unusually credible and complete; many smaller protocols facing similar repeat-incident dynamics have wound down rather than absorb the second loss out of treasury.
Sources & on-chain evidence
- [01]bitcoinsensus.comhttps://www.bitcoinsensus.com/news/alex-protocol-8-37m-exploit/
- [02]themerkle.comhttps://themerkle.com/alex-protocol-suffers-8-37m-exploit-launches-full-compensation-plan-for-affected-users/
- [03]guardrail.aihttps://www.guardrail.ai/blog/alex-protocol-hack-june-2025