On March 2024, Paraswap was exploited in a access control, resulting in approximately $24K in losses. That makes the Paraswap exploit the 319th largest DeFi incident out of 690 documented in our archive.
Attack Mechanics: How the Paraswap Access Control Played Out
Exploit Class Applied to Paraswap
The Paraswap incident on March 20, 2024 is classified as a Access Control. A privileged function lacks a proper authorisation check, letting an unauthorised caller execute it. In the full archive, Paraswap is 1 of 77 documented access control incidents.
Paraswap in Context
At $24K, the Paraswap exploit is a minor (<$1M) event compared to the largest same-class incident in our archive — Corkprotocol (2025) at $12M.
Prior Access Control Before Paraswap
The nearest access control incident before Paraswap was FILX DN404, 39 days earlier on February 10, 2024 ($200K lost). The same exploit class surfaced again within the access control attack surface.
Paraswap Vulnerability Signature
The primary source categorises the Paraswap exploit specifically as “Incorrect Access Control”. This narrower label is entity-specific: it reflects how the Paraswap contract failed, rather than the broad access control pattern alone.
Impact & Recovery for Paraswap
Paraswap Loss Figure
The Paraswap exploit caused $24,000 in losses — a minor (<$1M) incident and the 91st largest of 188 documented in 2024.
Where Paraswap Sits Among Access Control Attacks
Ranked by loss size, Paraswap is the 38th largest of 77 access control incidents documented. That puts the Paraswap loss below the class average of $636K.
Timeline Since the Paraswap Incident
The Paraswap exploit occurred 2.1 years ago (755 days). The contract, its fork-block, and the attack transaction remain on-chain and forensically reproducible.
Primary Reference for Paraswap
Public post-mortem / on-chain analysis for the Paraswap incident: view source.
FAQ
How much did Paraswap lose?
The Paraswap exploit in March 2024 resulted in $24,000 in losses — the 91st largest of 188 DeFi incidents that year.
When did the Paraswap hack happen?
The Paraswap exploit was recorded on March 20, 2024 — 755 days ago.
What type of exploit hit Paraswap?
The Paraswap incident is classified as a Access Control. A privileged function lacks a proper authorisation check, letting an unauthorised caller execute it.
How common is the Access Control pattern seen at Paraswap?
Our archive contains 77 documented access control incidents. The Paraswap incident is one of them.
How does Paraswap compare to the largest Access Control attack?
The largest access control incident in our archive is Corkprotocol (2025) at $12M. The Paraswap loss is $24K.
Which AutoML tools were evaluated in the study for time series forecasting?
AutoGluon, Auto-Sklearn, and PyCaret were evaluated across various metrics using diverse datasets.
Which model showed superior performance on the test set?
Extra Trees classifier.