Hacker Breaches Resolv DeFi Platform, Steals $24.5 Million in Crypto

Related

Female Cybersecurity Leaders to Watch in Arizona

Arizona’s cybersecurity leadership landscape continues to expand alongside its...

New Data Leak Site Uncovered Linked to Active Initial Access Broker

What happened Researchers uncovered a new Tor-based data leak site...

Trio-Tech Discloses Ransomware Attack Impacting Semiconductor Operations

What happened Trio-Tech International disclosed a ransomware attack affecting its...

Kaplan Data Breach Notification Follows Hack Exposing Personal Information

What happened Kaplan North America began notifying individuals of a...

Female Cybersecurity Leaders to Watch in Virginia

Virginia’s cybersecurity bench is shaped by a rare mix...

Share

What happened

A cyberattack on decentralized finance platform Resolv allowed a threat actor to compromise internal infrastructure using a stolen private key, enabling them to mint approximately $80 million in uncollateralized USR stablecoins. The attacker quickly converted the assets into about 11,400 ETH worth roughly $24.5 million, causing the USR token to lose its dollar peg and crash in value. The exploit stemmed from weaknesses in off-chain systems responsible for approving token minting, where the compromised key allowed the attacker to bypass limits and create tokens far beyond what their deposit should have allowed. Resolv has since paused its platform, is attempting to trace the funds, and warned users not to trade affected tokens while recovery efforts continue. 

Who is affected

Users of the Resolv platform and holders of the USR stablecoin are affected, particularly those impacted by the token’s depegging and potential loss of value. 

Why CISOs should care

The incident highlights how compromise of off-chain infrastructure and privileged keys can undermine otherwise secure blockchain systems, enabling attackers to create and extract value at scale. 

3 practical actions

  1. Secure private key infrastructure. Protect key management systems and restrict access to critical signing keys. 
  2. Implement limits on token minting logic. Enforce on-chain safeguards to prevent excessive or unauthorized asset creation. 
  3. Monitor for abnormal transaction patterns. Detect unusually large or disproportionate minting and asset flows in real time. 

For more coverage of crypto-related incidents and financial threat activity, explore our reporting under the Crypto tag.