Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Hacker Walks Away with $24.5 Million After Breaching Resolv DeFi Platform
Hacker Walks Away with $24.5 Million After Breaching Resolv DeFi Platform
NEWS

Hacker Walks Away with $24.5 Million After Breaching Resolv DeFi Platform

A compromised private key allowed an attacker to mint $80 million in unbacked USR stablecoins on the Resolv DeFi protocol, extract $24.5 million in ETH,...

Dylan H.

News Desk

March 24, 2026
4 min read

The Resolv DeFi protocol was breached on March 22, 2026, when an attacker exploited a compromised private key to mint approximately $80 million in unbacked USR stablecoins and extract $24.5 million in ETH — roughly 11,408 ETH — before Resolv Labs suspended the protocol. The exploit is one of the largest single DeFi hacks of 2026, contributing to a cumulative Q1 2026 loss across the DeFi ecosystem of over $137 million.

How the Attack Unfolded

The attack began at approximately 2:21 a.m. UTC on March 22. The attacker deposited just 100,000 USDC into Resolv's USR Counter contract and received an anomalous 50 million USR in return — approximately 500 times the legitimate conversion rate. Blockchain security firm PeckShield later confirmed the attacker continued minting, bringing the total suspected unbacked USR to approximately $80 million.

After accumulating the unbacked stablecoins, the hacker converted them into the staked variant (wstUSR), gradually swapped those across multiple DEX pools into other stablecoins, and ultimately exited into ETH. The entire operation lasted only a matter of hours.

Root Cause: Compromised Private Key & Missing Safeguards

On-chain analyst Andrew Hong attributed the breach to the protocol's SERVICE_ROLE account — a privileged wallet that processes swap requests. Critically, this role was controlled by a standard externally owned account (EOA) rather than a multisig wallet. Once that private key was compromised, there was nothing to prevent the unauthorized minting.

Compounding the problem, the minting contract itself lacked three fundamental safeguards:

  • No oracle price checks to validate that incoming tokens had real collateral backing
  • No per-transaction amount limits to cap how many tokens could be minted at once
  • No maximum supply controls to detect abnormal issuance

The on-chain smart contract performed exactly as coded. The failure was in the broader system design and off-chain key management.

Impact on USR and DeFi Markets

As $80 million in freshly minted, unbacked USR hit DEX liquidity pools, the token's dollar peg collapsed, falling as low as $0.20 (an 80% decline) before partially recovering to around $0.56 in subsequent hours. On the Curve Finance pool, USR flash-crashed to $0.025 — just 17 minutes after the initial mint.

The depeg cascaded across DeFi lending markets that accepted USR and wstUSR as collateral:

PlatformEstimated Impact
FluidUp to $17.5M in bad debt (secured short-term loans to cover losses)
Curve Finance LPsEstimated $17M in losses
Morpho / GauntletStablecoin liquidity drained by arbitrage borrowers

Resolv Labs Response

Following the attack, Resolv Labs immediately suspended all protocol functions to limit further damage and launched an investigation. The company issued an on-chain message to the attacker offering a 10% bounty ($2.45 million) if the remaining funds were returned within 72 hours, and warned of exchange freezes, legal action, and law enforcement referrals if the attacker failed to comply.

Resolv subsequently confirmed that approximately 9 million USR tokens held by the attacker had been burned, and stated the protocol's collateral pool holds approximately $141 million in assets, with only $0.5 million in redemptions processed before the pause.

Broader DeFi Security Implications

The Resolv hack illustrates a recurring theme in DeFi security: on-chain logic can be sound while off-chain infrastructure — key management, privileged account security, and monitoring — remains critically weak. Experts note that real-time automated response mechanisms are now a necessity, as exploits unfold in minutes, leaving no window for manual intervention once the damage is visible.

The incident also underscores the systemic risk created when stablecoins used as collateral across multiple lending protocols depeg suddenly — a single exploit can cascade into losses that far exceed the original theft.

#DeFi#Cryptocurrency#Data Breach#Smart Contract#Stablecoin#Blockchain

Related Articles

Truebit Protocol Hit by $26.5 Million DeFi Hack via Smart

Attackers exploited a smart contract integer overflow vulnerability in Truebit Protocol, minting massive amounts of TRU tokens at zero cost and draining...

2 min read

Iran-Linked Hackers Breach FBI Director's Personal Email, Hit Stryker With Wiper Attack

Iran's Handala Hack Team breached the personal email of FBI Director Kash Patel, leaking photos and documents online, while simultaneously launching a destructive wiper attack against medical device maker Stryker Corporation.

4 min read

European Commission Investigating Breach After Amazon Cloud Account Hack

The European Commission is investigating a security breach after a threat actor gained unauthorized access to its Amazon Web Services cloud environment and claims to have stolen over 350 GB of data including databases, employee information, and email server data.

4 min read
Back to all News