1 Billion DOT Minted Out of Thin Air, Yet Hacker Only Made $230,000

marsbitPublicado a 2026-04-13Actualizado a 2026-04-13

Resumen

On April 13, a security breach occurred involving the Polkadot bridge on the Ethereum network, where an attacker exploited a replay vulnerability in the MMR proof mechanism of Hyperbridge’s ISMP protocol. By reusing a historically valid proof and pairing it with a malicious request, the attacker bypassed verification and gained admin and minting rights over the wrapped DOT contract on Ethereum. They then minted 1 billion wrapped DOT tokens—2,805 times the existing supply—and attempted to liquidate them. However, due to extremely low liquidity in the wrapped DOT market, the massive sell-off crashed the token’s price by 99.98%, from $1.22 to approximately $0.000128. The attacker ultimately exchanged the tokens for only about 108.2 ETH (worth roughly $237,000), with gas costs as low as $0.74. The same exploit had been used previously in attacks on MANTA and CERE tokens, resulting in a total loss of around $242,000. Polkadot confirmed that the incident only affected DOT bridged via Hyperbridge to Ethereum and did not impact the native Polkadot network or DOT on other bridges. Exchanges including Upbit and Bithumb temporarily suspended DOT deposits and withdrawals as a precaution. The event highlights ongoing vulnerabilities in cross-chain infrastructure and the critical role of liquidity in limiting actual damages during large-scale exploits. It also reflects a broader trend of increasing DeFi security incidents in early 2026.

Author: Zhou, ChainCatcher

 

On the morning of April 13th Beijing time, on-chain monitoring platforms issued alerts one after another: abnormal issuance of Polkadot bridged assets was detected on the Ethereum network.

According to CertiK's analysis, the attacker submitted a carefully crafted cross-chain request to the HandlerV1 contract on the Ethereum side via Hyperbridge's ISMP protocol, and paired it with a real MMR proof that had been historically accepted by the system, successfully bypassing the verification mechanism.

BlockSec Phalcon subsequently issued a technical alert, characterizing this vulnerability as an MMR proof replay vulnerability. According to their analysis, the root cause of the vulnerability lies in the fact that the replay protection of the HandlerV1 contract only verifies whether the hash of a request has been used before, but the proof verification process did not bind the submitted request payload to the proof being verified.

This logical flaw allowed the attacker to replay a historically valid proof and pair it with a newly constructed malicious request, thereby executing the ChangeAssetAdmin operation via the TokenGateway.onAccept() path, transferring the admin and minting permissions of the wrapped DOT contract on Ethereum (address: 0x8d...8F90b8) to an address controlled by the attacker.

On-chain data shows that after obtaining minting permissions, the attacker minted 1 billion wrapped DOT tokens, a quantity approximately 2805 times the reported circulating supply of about 356,000 tokens on Ethereum at the time.

Subsequently, the attacker exchanged the entire amount for approximately 108.2 ETH via Odos Router and Uniswap V4 liquidity pools, and transferred it to the attacker's external account, profiting about $237,000 at the time, with the gas cost for the entire attack being only about $0.74.

BlockSec Phalcon also mentioned that a previous attack using the same method had occurred, targeting MANTA and CERE tokens, resulting in a loss of about $12,000. The total combined loss from both attacks is approximately $242,000.

Following the incident, major South Korean exchanges Upbit and Bithumb announced the suspension of deposit and withdrawal services for DOT and the AssetHub Polkadot network to prevent potential fake deposit risks.

Polkadot officials stated that this vulnerability only affects DOT bridged to Ethereum via Hyperbridge, and does not affect DOT assets within the Polkadot ecosystem, nor DOT transferred via other bridges. Polkadot and its parachains, as well as native DOT, remain secure and unaffected. Hyperbridge has currently been suspended to investigate the issue.

It is worth mentioning that despite the minting scale reaching 1 billion tokens, the actual loss is far lower than the theoretical figure.Due to the extremely limited on-chain liquidity of wrapped DOT on Ethereum, the concentrated sell-off of 1 billion tokens instantly crashed the price of wrapped DOT from $1.22 to $0.00012831, a drop of 99.98%, rendering the vast majority of tokens unable to be effectively liquidated.

According to CoinMarketCap data, the price of native DOT tokens was also briefly dragged down by market sentiment, falling nearly 5%.

Users on X bluntly stated, who would have thought that DOT, once a cross-chain myth alongside Ethereum, would引爆 social media in this way. Cross-chain bridges have once again become the "Achilles' heel" of the crypto world. The once-deserted quiet has now turned into a scene of devastation and sighing. When 1 billion DOT appeared out of thin air, all technical indicators became worthless.

Other users jokingly remarked that low liquidity "saved Polkadot" in this incident by意外, limiting the actual loss to about $237,000.

However, while the low liquidity of bridged assets limited the hacker's profit, it exposed the potential fragility of the cross-chain interoperability layer.

It is reported that Hyperbridge, developed by Polytope Labs, is a cross-chain interoperability project within the Polkadot ecosystem, long positioning itself as trust-minimized cross-chain infrastructure with its core security mechanism relying on cryptographic proofs instead of multi-signature committees. The project had previously emphasized its resistance to common bridge attacks.

<极p>

But this incident perhaps indicates that the integrity of the cryptographic proof mechanism itself is not sufficient to guarantee security; the specific implementation logic of the Gateway contract on the Ethereum side also constitutes an attack surface.

From a more macro perspective, this incident is a microcosm of the持续严峻 DeFi security landscape in 2026. Since the beginning of the year, several major attacks have occurred, including Venus generating $2.15 million in bad debt due to price manipulation, Resolve over-minting 80 million USR, and Drift losing over $285 million in assets. The attack methods varied and involved diverse areas.

Taking over minting rights for无限增发 is not a new attack模式. However, Hyperbridge's损失 was意外压低 due to its extremely shallow liquidity.

According to CertiK data, March alone recorded 46 security incidents, with total losses of approximately $39.8 million, the highest monthly record since November 2024. CertiK also pointed out that the increased frequency of code vulnerability exploits may be related to the rise of AI-assisted vulnerability mining tools.

The rise in attack frequency is also pushing the industry to重新审视 the boundaries of security and regulation. Circle's Chief Strategy Officer Dante Disparte previously, in response to the Drift Protocol theft, called for protocols, wallets, exchanges, and stablecoin issuers to treat security and accountability as a shared obligation. He suggested that DeFi protocols could develop on-chain technical protection measures参考 traditional market circuit breakers, and promote relevant legislation to enshrine property rights and financial privacy protection standards into law before the next major incident occurs.

Preguntas relacionadas

QWhat was the core vulnerability exploited in the Hyperbridge attack on April 13th?

AThe attack exploited an MMR proof replay vulnerability. The flaw was in the HandlerV1 contract, where the replay protection only checked if a request's hash had been used before, but the proof verification process did not bind the submitted request payload to the proof being validated. This allowed the attacker to replay a historically valid proof with a new, forged request.

QHow much wrapped DOT did the attacker mint, and why was the actual financial gain so low compared to the amount minted?

AThe attacker minted 1 billion wrapped DOT tokens. However, the actual financial gain was only about $237,000 because the on-chain liquidity for wrapped DOT on Ethereum was extremely limited. The massive sell-off crashed the token's price by 99.98%, from $1.22 to approximately $0.00012831, making it impossible to liquidate the vast majority of the tokens.

QWhich other tokens were previously targeted using the same attack method mentioned in the article?

AAccording to the article, the same attack method was previously used against MANTA and CERE tokens, resulting in losses of approximately $12,000.

QWhat was the official response from Polkadot regarding the scope and impact of this incident?

APolkadot official stated that the vulnerability only affected DOT that was bridged to Ethereum via Hyperbridge. It did not affect DOT within the Polkadot ecosystem, DOT bridged through other bridges, or native DOT. They confirmed that Polkadot, its parachains, and native DOT remained secure and unaffected. Hyperbridge was paused for investigation.

QWhat broader trend in DeFi security does this event represent, according to the article?

AThe article states this event is a reflection of the increasingly severe DeFi security landscape in 2026. It cites other major incidents like the Venus protocol ($2.15M in bad debt), Resolve (80M USR over-minted), and the Drift Protocol hack (over $285M). It also notes a rise in code vulnerability exploits, potentially linked to the emergence of AI-assisted bug-finding tools, with March alone seeing 46 security incidents totaling ~$39.8M in losses.

Lecturas Relacionadas

Arthur Hayes: Ahora es el momento de "no operar"

En su último artículo, Arthur Hayes argumenta que los mercados globales han entrado en una "zona sin operaciones" (no-trade zone), un período de alta incertidumbre impulsado por dos fuerzas contrapuestas: la desinflación disruptiva causada por la inteligencia artificial autónoma (agente IA) y las presiones geopolíticas inflacionarias derivadas de conflictos energéticos. Hayes destaca que la IA está erosionando masivamente los empleos de trabajadores del conocimiento en economías desarrolladas, lo que provocará impagos crediticios y una crisis deflacionaria. Simultáneamente, la guerra en el Estrecho de Hormuz obliga a los gobiernos a aumentar el gasto militar y acumular recursos, presionando al alza los precios de la energía y los alimentos. El autor presenta tres escenarios clave: 1. **Vuelta a la normalidad:** La guerra termina, pero el impacto deflacionario de la IA persiste, aplastando la capacidad de consumo y requiriendo eventualmente rescates bancarios con impresión de dinero. 2. **Peaje de Teherán:** Irán controla el estrecho y exige peajes en yuanes u oro, erosionando el sistema petrodólar y forzando a las naciones a vender activos en dólares para adquirir oro y luego yuanes. 3. **Contraataque del Imperio:** EE.UU. destruye la capacidad iraní, pero la posible destrucción de la producción energética del Golfo desataría una hiperinflación en bienes básicos, llevando a los bancos centrales a imprimir dinero masivamente. Hayes concluye que, en la mayoría de los escenarios, Bitcoin inicialmente sufrirá por la contracción de liquidez y la desapalancación, pero su precio final estará determinado por la expansión monetaria forzada que los bancos centrales implementarán para salvar el sistema financiero. Por ahora, prefiere esperar a que la volatilidad extrem

marsbitHace 3 hora(s)

Arthur Hayes: Ahora es el momento de "no operar"

marsbitHace 3 hora(s)

Trading

Spot
Futuros

Artículos destacados

Cómo comprar DOT

¡Bienvenido a HTX.com! Hemos hecho que comprar Polkadot (DOT) sea simple y conveniente. Sigue nuestra guía paso a paso para iniciar tu viaje de criptos.Paso 1: crea tu cuenta HTXUtiliza tu correo electrónico o número de teléfono para registrarte y obtener una cuenta gratuita en HTX. Experimenta un proceso de registro sin complicaciones y desbloquea todas las funciones.Obtener mi cuentaPaso 2: ve a Comprar cripto y elige tu método de pagoTarjeta de crédito/débito: usa tu Visa o Mastercard para comprar Polkadot (DOT) al instante.Saldo: utiliza fondos del saldo de tu cuenta HTX para tradear sin problemas.Terceros: hemos agregado métodos de pago populares como Google Pay y Apple Pay para mejorar la comodidad.P2P: tradear directamente con otros usuarios en HTX.Over-the-Counter (OTC): ofrecemos servicios personalizados y tipos de cambio competitivos para los traders.Paso 3: guarda tu Polkadot (DOT)Después de comprar tu Polkadot (DOT), guárdalo en tu cuenta HTX. Alternativamente, puedes enviarlo a otro lugar mediante transferencia blockchain o utilizarlo para tradear otras criptomonedas.Paso 4: tradear Polkadot (DOT)Tradear fácilmente con Polkadot (DOT) en HTX's mercado spot. Simplemente accede a tu cuenta, selecciona tu par de trading, ejecuta tus trades y monitorea en tiempo real. Ofrecemos una experiencia fácil de usar tanto para principiantes como para traders experimentados.

508 Vistas totalesPublicado en 2024.12.12Actualizado en 2025.03.21

Cómo comprar DOT

Discusiones

Bienvenido a la comunidad de HTX. Aquí puedes mantenerte informado sobre los últimos desarrollos de la plataforma y acceder a análisis profesionales del mercado. A continuación se presentan las opiniones de los usuarios sobre el precio de DOT (DOT).

活动图片