Jill Gunter, co-founder of Espresso, reported Thursday that her crypto pockets was drained resulting from a vulnerability in a Thirdweb contract, in keeping with statements posted on social media.
Abstract
- Crypto veteran Jill Gunter reported the theft of over $30,000 in USDC from her pockets, which was drained on Dec. 9 and routed by means of Railgun.
- The vulnerability stemmed from a legacy Thirdweb contract that allowed entry to funds with limitless token approvals.
- The incident adopted a separate 2023 open-source library flaw that affected greater than 500 token contracts and was exploited at the very least 25 instances, in keeping with ScamSniffer.
Gunter, described as a 10-year veteran of the cryptocurrency trade, mentioned greater than $30,000 in USDC stablecoin was stolen from her pockets. The funds have been transferred to the privateness protocol Railgun whereas she was making ready a presentation on cryptocurrency privateness for an occasion in Washington, D.C., in keeping with her account.
In a follow-up publish, Gunter detailed the investigation into the theft. The transaction that drained her jrg.eth handle occurred on December 9, with the tokens having been moved into the handle the day earlier than in anticipation of funding an angel funding deliberate for that week, she acknowledged.
Though the tokens have been transferred from jrg.eth to a different handle recognized as 0xF215, the transaction confirmed a contract interplay with 0x81d5, in keeping with Gunter’s evaluation. She recognized the susceptible contract as a Thirdweb bridge contract she had beforehand used for a $5 switch.
Thirdweb knowledgeable Gunter {that a} vulnerability had been found within the bridge contract in April, she reported. The vulnerability allowed anybody to entry funds from customers who had authorised limitless token permissions. The contract has since been labeled as compromised on Etherscan, a blockchain explorer.
Gunter acknowledged she didn’t know whether or not she would obtain reimbursement and characterised such dangers as an occupational hazard within the cryptocurrency trade. She pledged to donate any recovered funds to the SEAL Safety Alliance and inspired others to think about donations as effectively.
Thirdweb revealed a weblog publish stating the theft resulted from a legacy contract not being correctly decommissioned throughout its April 2025 vulnerability response. The corporate mentioned it has completely disabled the legacy contract and that no person wallets or funds stay in danger.
Along with the susceptible bridge contract, Thirdweb disclosed a wide-reaching vulnerability in late 2023 in a generally used open-source library. Safety researcher Pascal Caversaccio of SEAL criticized Thirdweb’s disclosure strategy, stating that offering a listing of susceptible contracts gave malicious actors advance warning.
Based on evaluation by ScamSniffer, a blockchain safety agency, over 500 token contracts have been affected by the 2023 vulnerability and at the very least 25 have been exploited.


