Ionic Money Hack: How Fake Collateral Led to an $8.6M Drain
A detailed breakdown of the Ionic Money attack—how social engineering and inadequate collateral vetting resulted in millions lost, and the protocol’s new path forward.

Ionic Money $8.6M Exploit: When Collateral Makes or Breaks a Protocol
Unpacking the Attack Trajectory
In February 2025, Ionic Money—formerly Midas—was struck by an $8.6 million exploit rooted in social engineering and inadequate collateral vetting. Attackers posed as members of Lombard Finance and persuaded the Ionic team to list a counterfeit LBTC (Lombard Bitcoin) token as collateral on the platform. After Ionic approved the addition, the exploiters minted 250 units of fake LBTC. Since the token contract's verification component (Bascule) was left at a null address, anyone could mint unlimited LBTC with no restriction or proof of value.
The attackers then deposited their fake LBTC as collateral into Ionic Money, receiving ionLBTC tokens, and promptly borrowed millions in legitimate cryptocurrencies. They abandoned the now worthless fake LBTC, walking away with real assets. To further obscure their tracks, assets were rapidly laundered through cross-chain bridges and mixers like Tornado Cash. In total, they drained $8.6M in a matter of blocks. The protocol failed to verify if LBTC was a genuine, officially deployed asset before allowing it as collateral, leaving the door wide open for this type of exploit.
Institutional Shifts and Key Safeguards
The attack hammered home the absolute necessity of robust asset whitelisting and third-party validation when integrating new collateral into lending markets. Afterward, Ionic Money overhauled its onboarding process for any new token: every asset must now pass a multi-layer technical and governance validation, with on-chain origin verification, proof of supplier authenticity, and chain oracle integration for price and event audit trails.
Furthermore, the team established time-locked cooldowns and circuit breakers for listing new collateral, ensuring that no asset can be instantly enabled for borrowing without community and expert scrutiny. The aftermath also spurred integrations with automated risk monitoring tools and external bug bounty platforms, so any vulnerability in onboarding code or collateral smart contracts triggers alerts before full deployment. Finally, the incident reinforced for all protocols that no smart contract is secure if human governance and due diligence fail—layered process control is as crucial as technical soundness in DeFi security design.