GANA Payment Smart Contract Takeover
Likely private-key theft gave attackers control of GANA Payment's BSC contract; they manipulated reward rates and drained $3.1M via the unstake function.
- Date
- Victim
- GANA Payment
- Status
- Funds Stolen
In November 2025, the BSC-based DeFi payment platform GANA Payment lost approximately $3.1 million when an attacker took control of the project's smart contract — most likely through private-key theft enabling contract ownership transfer — and used the access to manipulate reward rates and extract excess GANA tokens via the unstake function. The GANA token fell 90% in the aftermath.
What happened
GANA Payment was a payment-focused DeFi platform that let users stake GANA tokens and earn rewards. The contract was relatively recent at the time of the attack, with limited TVL but a meaningful user base.
The attack chain, identified publicly by ZachXBT, suggested a contract-ownership takeover rather than a code-level smart contract bug:
- The attacker obtained authority to transfer ownership of GANA Payment's core contracts — likely via private-key theft from the project's deployer/operator wallet.
- With ownership in hand, manipulated the protocol's reward-rate parameters to inflate the GANA distributed per unstake operation.
- Called the
unstakefunction repeatedly, receiving wildly excessive GANA token rewards relative to legitimate user behaviour. - Swapped the freshly-minted GANA reward tokens for USDC, USDT and ETH through DEX liquidity.
The proceeds were laundered through a multi-step path:
- ~$1M sent through Tornado Cash on BSC.
- Bridged the remainder to Ethereum.
- ~$1M further deposited into Tornado Cash on Ethereum.
- 346 ETH (~$1.05M) remained in an Ethereum wallet at the time of public reporting — possibly held to be tumbled later.
Aftermath
- GANA token price fell approximately 90% as the market priced in the unsanctioned token emission.
- The protocol effectively wound down operations.
- No public recovery from the attacker's wallets.
Why it matters
The GANA Payment incident is one of many 2025-2026 cases that share a recurring pattern: DeFi payment platforms with hot-wallet-style ownership structures are increasingly attractive targets for state-aligned operators who specialise in private-key theft.
The structural lesson, well-documented but increasingly important as more "DeFi payments" projects launch:
- Contract ownership for payment-routing protocols is operationally significant even when the project markets itself as decentralised. If a single key can change reward parameters, mint additional supply, or upgrade contract implementation, that key is part of the protocol's trust model.
- Multi-sig with timelock for ownership transfers is a one-line implementation that defeats most key-compromise scenarios — the attacker would need the multi-sig signatures and would need to wait through the timelock period, during which on-chain monitors can detect and respond.
- Reward-rate parameter changes should have caps and rate-limits — the same way modern central banks have rate-change rules that can't move policy by more than a defined amount per meeting, the GANA Payment-style attack would have been bounded if the reward parameters had hard upper limits enforced in the contract.
The ZachXBT-led detection is also notable: by late 2025, independent on-chain investigators have become a meaningful primary-detection layer for DeFi incidents, often surfacing breaches before the affected projects themselves publicly disclose. The dynamic is structurally similar to investigative journalism — and produces some of the same disclosure-pace tensions between investigators and the entities they cover.
Sources & on-chain evidence
- [01]halborn.comhttps://www.halborn.com/blog/post/explained-the-gana-payment-hack-november-2025
- [02]theblock.cohttps://www.theblock.co/post/379619/gana-payment-exploit
- [03]thecryptobasic.comhttps://thecryptobasic.com/2025/11/20/zabih-new-defi-player-gana-payment-suffers-multi-million-dollar-hack/