Crypto Times Logo Black
Google News Follow Banner
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • DeFi News
    • Blockchain News
    • Industry
  • Exclusive
  • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Podcasts
  • More
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
The Crypto TimesThe Crypto Times
  • All News
  • Market
  • Bitcoin
  • Ethereum
  • Altcoins
  • Regulations & Policies
  • Blockchain
  • DeFi
  • Industry
  • Exclusive
  • Opinion
Search
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • Blockchain
    • DeFi
    • Industry
    • Exclusive
    • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Quick Links
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
    • AI Policy
    • Sponsored & Advertorial Policy
  • Podcasts
Follow US
© 2026 By Crypto Times. All Rights Reserved.
Exclusive

Uncovering GMX Hack: What Exactly Happened in the $42M Exploit

Written By:
Shubham Sahu

Reviewed By:
Gopal Solanky

Last updated: July 12, 2025 12:28 PM
Published July 12, 2025 12:28 PM
Share
Last updated: July 12, 2025 12:28 PM
Published July 12, 2025 12:28 PM
Uncovering GMX Hack: What Exactly Happened in the $42M Exploit

There are always two sides to a coin, just like the cryptocurrency space. On one side, the market is going mainstream, with an adoption rate at its peak, as governments adopt it as a treasury asset. On the other side, cyber attacks and exploitation cases involving crypto are increasing.

On July 9, the leading decentralized perpetual exchange on Arbitrum, GMX fell victim to one of the latest hacks of this year so far, losing over $42 million. This was not a brute-force smash-and-grab but a well-planned, precision-engineered assault that revealed the weaknesses in the V1 platform of GMX. The incident revealed that as technology and security are getting advanced the hackers are getting smarter and they are continuously finding new ways to exploit platforms.

Let’s deep dive into the incident and find how exactly hackers exploited GMX and stole $42 million. 

What Actually Happened With GMX

GMX faced a major security breach on Wednesday, which led to a loss of over $42 million worth of cryptocurrency assets. Just after the theft, the attackers had already started cleaning their stolen money through the known channels. The funds were later partially transferred from Arbitum to Ethereum blockchain, with an estimated amount of about $9.6 million, and this is a typical trend, where hackers use cross-chain bridges, and then they may transfer funds through privacy protocols such as Tornado Cash.

The stolen portfolio contains wrapped Bitcoin (WBTC), wrapped Ethereum (WETH), FRAX, LINK, USDC and USDT. All the assets, excluding FRAX have been converted for 11,700 ETH which is worth around $32.33 million. 

Posting this message in hopes of connecting with the individual responsible for the GMX V1 exploit.

You've successfully executed the exploit; your abilities in doing so are evident to anyone looking into the exploit transactions.

The white-hat bug bounty of $5 million continues… https://t.co/KPf2fEtU6t

— GMX 🫐 (@GMX_IO) July 10, 2025

In reaction to the hack, the GMX developers have gone to the unconventional measure of reaching out to the hacker directly via an on-chain message, promising a 10% white-hat bounty to the hacker should they voluntarily send back the stolen funds. This would handle the event as a possible security audit as opposed to an attack.

The GMX exploit adds to an already worrying trend of cryptocurrency security breaches. Blockchain security firm CertiK estimated that investors have lost around $2.5 billion to different hacks and scams in the first half of 2025, which also reveals the weaknesses of the decentralized finance ecosystem.

GMX Hacker Agreed to Return Funds

Following the onchain discussions with the GMX team, the hacker entity agreed to return stolen funds in exchange for a 10% white-hat bounty. Under the terms, GMX will not take any legal actions against the hacker nor will it hold anything against the hacker. Meanwhile, the hacker entity would keep approximately $5 million to themselves and send remaining stolen funds to the GMX deployer address. 

How GMX Exploited

The attacker targeted the V1 protocol of GMX, its GLP pool Smart contracts. The flaw? A design flaw in the way the protocol dealt with short positions and how it computed the values of the assets. When a user opened a short position, the contract would instantly change the global average price–not waiting until the market responded. This enabled the attacker to tamper with the calculations done by the system and withdraw money at artificially low prices.

Recent attack on GMX (@GMX_IO) resulted in over $42M in losses. Here’s a summary of our analysis:

Root causes:

1️⃣GMX v1 updates globalShortAveragePrices when opening shorts but not when closing.
2️⃣It immediately increases globalShortSizes on short position creation.

These… https://t.co/H7a4ie4WmZ pic.twitter.com/vzLHpFIRBo

— SlowMist (@SlowMist_Team) July 11, 2025

The Slowmist, a blockchain security firm, disclosed that the cause of this attack was a design flaw in GMX v1. According to Slowmist the root cause was that the global short average prices would instantly be reflected in short position operations, directly affecting the calculation of Asset Under Management (AUM) and thus manipulating the pricing of the GLP token.

This design flaw was exploited by the attacker by using Keeper to activate the “timelock.enableLeverage” functionality in order execution (a precondition to opening a large number of short positions). By means of reentry attacks, the attacker managed to open a large number of short positions, control the global average price, artificially increase the price of GLP in one transaction, and earn money by redemption operations.

Final Thoughts

The GMX exploit reveals a bitter reality: the openness of DeFi, which is its great strength, is also its Achilles heel. Even after a thorough audit, smart contracts may have hidden bugs that even highly skilled attackers can take advantage of. This hack highlights the difficulty of tracking illegal funds in a decentralized system, making recovery more difficult with the use of Tornado Cash.

In the case of GMX, the way out is a thorough postmortem, which the team has promised to do, to identify the underlying cause and avoid repetition. The industry should focus on the proactive approach, frequent smart contract updates, in-time control, and standardized security procedures. DeFi platforms might work together to create best practices, which will minimize the area of attack by hackers

The GMX hack is the wake-up call of the DeFi industry. Platforms such as GMX have to ensure that they offer state of the art features with uncompromising security. To the users, the incident is a lesson to remain cautious, turn off leverage when there are vulnerabilities, and use official sources to get updates. 

Although DeFi offers financial freedom, it requires constant attention to ensure that it does not fall into the hands of individuals who will take advantage of its openness. As the crypto community awaits what GMX will do next, there is one thing that is apparent, in the race to the future of DeFi, security should be at the forefront. 

Also read: Strategy’s $42B Bet on Bitcoin Faces Major Risks Despite Huge Profit

Disclaimer: The information researched and reported by The Crypto Times is for informational purposes only and is not a substitute for professional financial advice. Investing in crypto assets involves significant risk due to market volatility. Always Do Your Own Research (DYOR) and consult with a qualified Financial Advisor before making any investment decisions.

Follow The Crypto Times on Google News to Stay Updated!      Google News
Google News Banner

TAGGED:DeFi
Share This Article
Whatsapp Whatsapp LinkedIn Telegram Copy Link
Avatar photo
By Shubham Sahu
Follow:
Shubham Sahu is a Freelance Content Writer with 7 years of experience in the financial markets and over 5 years in the crypto industry. He holds degrees in B.Tech and B.Ed, and has a strong background in market research, crypto trends, and on-chain analysis. Shubham specializes in exclusive and in-depth research articles. His investigative work, including a story on the identity of Satoshi Nakamoto, was featured in an article by TIME.com, highlighting his contribution to crypto journalism.
Gopal Solanky - Crypto Research Analyst at The Crypto Times
By Gopal Solanky Sr. Crypto Journalist
Follow:
Gopal Solanky is a Research Analyst and Reporter with over 5 years of experience in DeFi, blockchain, crypto, IT, and financial markets. With a Bachelor's in Computer Applications, he brings a strong technical foundation to his analysis and reporting. Gopal focuses on breaking down complex topics for both seasoned investors and curious readers. His work has been referenced by publications like Business Insider and Vulture.com, highlighting his contributions to industry stories around topics like Huwak Tuah Memecoin and the FTX collapse.

Join Our Newsletter

Subscribe to get latest crypto news!

    ​

    Built with Kit

    Latest News

    CoinGecko Adds AI Insights, Advanced Charts Amid Data Explosion
    CoinGecko Adds AI Insights, Advanced Charts Amid Data Explosion
    GSR Launches Multi-Asset Crypto ETF Featuring BTC, ETH, and SOL
    GSR Launches Multi-Asset Crypto ETF Featuring BTC, ETH, and SOL
    Crypto Crimes Rise as France Probes Family Kidnapping Case
    Crypto Crimes Rise as France Probes Family Kidnapping Case
    UK Authorities Shut Down Illegal P2P Crypto Sites in Coordinated Raids
    UK Authorities Shut Down Illegal P2P Crypto Sites in Coordinated Raids
    Bybit Uncovers macOS Malware Campaign Targeting Developers Searching for Claude Code
    Bybit Uncovers macOS Malware Campaign Targeting Developers Searching for Claude Code

    Find Us on Socials

    Ad image

    You may also like

    Circle Can't Have It Both Ways It Must Choose bw CeFi Power and DeFi Neutrality

    Circle Can’t Have It Both Ways: It Must Choose b/w CeFi Power and DeFi Neutrality

    KelpDAO, Bybit, Ronin Lazarus Group’s Crypto Hacks Behind a $7.3B Heist Empire

    KelpDAO, Bybit, Ronin: Lazarus Group’s Crypto Hacks Behind a $7.3B Heist Empire

    A $292 Million Wake-Up Call: Inside KelpDAO Hack That Exposed DeFi’s Fragility

    A $292 Million Wake-Up Call: Inside KelpDAO Hack That Exposed DeFi’s Fragility

    Crypto's $606M April Nightmare 12 Hacks, 18 Days, Worst Month Since Bybit Heist

    Crypto’s $606M April Nightmare: 12 Hacks, 18 Days, Worst Month Since Bybit Heist

    The Crypto Times Logo PNG

    Providing real-time, accurate Crypto reporting. Your trusted source for Crypto News and Research.

    Stay Updated

    All News
    Exclusive
    Opinions
    Learn
    Podcasts

    Company

    About Us
    Our Authors
    Editorial Policy
    AI Policy
    Advertorial Policy

    Get In Touch

    Contact Us
    Career

    Find Us on Socials

    X-twitter Linkedin Telegram Youtube Instagram

    © 2026 The Crypto Times | A BITROCK TECHNOLOGIES L.L.C. Company.

    DMCA.com Protection Status
    • Terms and Conditions
    • Disclaimer
    • Privacy Policy
    • Cookie policy
    Do Not Sell or Share My Personal Information