Skip to content
Est. MMXXVIVol. VI · № 273RSS
Blockchain Breaches

An archive of cryptocurrency security incidents — hacks, exploits, bridge failures and rug pulls, documented with on-chain evidence.

Dossier № 253Private Key Compromise

GANA Payment Smart Contract Takeover

Likely private-key theft gave attackers control of GANA Payment's BSC contract; they manipulated reward rates and drained $3.1M via the unstake function.

Date
Status
Funds Stolen

In November 2025, the BSC-based DeFi payment platform GANA Payment lost approximately $3.1 million when an attacker took control of the project's smart contract — most likely through private-key theft enabling contract ownership transfer — and used the access to manipulate reward rates and extract excess GANA tokens via the unstake function. The GANA token fell 90% in the aftermath.

What happened

GANA Payment was a payment-focused DeFi platform that let users stake GANA tokens and earn rewards. The contract was relatively recent at the time of the attack, with limited TVL but a meaningful user base.

The attack chain, identified publicly by ZachXBT, suggested a contract-ownership takeover rather than a code-level smart contract bug:

  1. The attacker obtained authority to transfer ownership of GANA Payment's core contracts — likely via private-key theft from the project's deployer/operator wallet.
  2. With ownership in hand, manipulated the protocol's reward-rate parameters to inflate the GANA distributed per unstake operation.
  3. Called the unstake function repeatedly, receiving wildly excessive GANA token rewards relative to legitimate user behaviour.
  4. Swapped the freshly-minted GANA reward tokens for USDC, USDT and ETH through DEX liquidity.

The proceeds were laundered through a multi-step path:

  • ~$1M sent through Tornado Cash on BSC.
  • Bridged the remainder to Ethereum.
  • ~$1M further deposited into Tornado Cash on Ethereum.
  • 346 ETH (~$1.05M) remained in an Ethereum wallet at the time of public reporting — possibly held to be tumbled later.

Aftermath

  • GANA token price fell approximately 90% as the market priced in the unsanctioned token emission.
  • The protocol effectively wound down operations.
  • No public recovery from the attacker's wallets.

Why it matters

The GANA Payment incident is one of many 2025-2026 cases that share a recurring pattern: DeFi payment platforms with hot-wallet-style ownership structures are increasingly attractive targets for state-aligned operators who specialise in private-key theft.

The structural lesson, well-documented but increasingly important as more "DeFi payments" projects launch:

  1. Contract ownership for payment-routing protocols is operationally significant even when the project markets itself as decentralised. If a single key can change reward parameters, mint additional supply, or upgrade contract implementation, that key is part of the protocol's trust model.
  2. Multi-sig with timelock for ownership transfers is a one-line implementation that defeats most key-compromise scenarios — the attacker would need the multi-sig signatures and would need to wait through the timelock period, during which on-chain monitors can detect and respond.
  3. Reward-rate parameter changes should have caps and rate-limits — the same way modern central banks have rate-change rules that can't move policy by more than a defined amount per meeting, the GANA Payment-style attack would have been bounded if the reward parameters had hard upper limits enforced in the contract.

The ZachXBT-led detection is also notable: by late 2025, independent on-chain investigators have become a meaningful primary-detection layer for DeFi incidents, often surfacing breaches before the affected projects themselves publicly disclose. The dynamic is structurally similar to investigative journalism — and produces some of the same disclosure-pace tensions between investigators and the entities they cover.

Sources & on-chain evidence

  1. [01]halborn.comhttps://www.halborn.com/blog/post/explained-the-gana-payment-hack-november-2025
  2. [02]theblock.cohttps://www.theblock.co/post/379619/gana-payment-exploit
  3. [03]thecryptobasic.comhttps://thecryptobasic.com/2025/11/20/zabih-new-defi-player-gana-payment-suffers-multi-million-dollar-hack/

Related filings