Turning 200,000 into Nearly 100 Million: DeFi Stablecoin Attacked Again

marsbitPublicado a 2026-03-22Actualizado a 2026-03-22

Resumen

DeFi stablecoin protocol Resolv Labs was exploited, resulting in a hacker minting 80 million USR tokens using only 200,000 USDC. The attacker’s address (starting with 0x04A2) first created 50 million USR with 100,000 USDC, and later minted another 30 million with an additional 100,000 USDC. This caused USR to depeg, dropping to around $0.25 before partially recovering to approximately $0.80. The incident also impacted related lending markets on Morpho and Lista DAO, which paused new borrowing requests. Additionally, RLP token holders, including Stream Finance—which holds over 13 million RLP tokens—face significant exposure, with estimated losses around $17 million. Initial analysis by DeFi community YAM suggests the exploit occurred because the protocol’s SERVICE_ROLE, which provides minting parameters, was compromised. The system fully trusted this role’s input without on-chain verification or minting limits, allowing the attacker to manipulate the mint amount. The project’s emergency response was also slow, taking nearly three hours to pause the protocol due to multi-signature delays. This attack highlights critical vulnerabilities in off-chain role trust and emergency mechanisms within DeFi protocols.

Written by: Eric, Foresight News

At approximately 10:21 Beijing time today, Resolv Labs, which issues the stablecoin USR using a Delta neutral strategy, was hacked. An address starting with 0x04A2 used 100,000 USDC to mint 50 million USR from the Resolv Labs protocol.

As the incident was exposed, USR plummeted to around $0.25, and as of writing, it has recovered to approximately $0.80. The price of the RESOLV token also saw a short-term drop of nearly 10%.

Subsequently, the hacker repeated the same method, using another 100,000 USDC to mint 30 million USR. As USR significantly depegged, arbitrage traders quickly took action. Many lending markets on Morpho that supported USR, wstUSR, and others as collateral were almost drained, and Lista DAO on BNB Chain also suspended new borrowing requests.

The impact was not limited to these lending protocols. In the Resolv Labs protocol design, users can also mint an RLP token, which has greater price volatility and higher returns but requires bearing compensation liability when the protocol incurs losses. Currently, the circulating supply of RLP tokens is nearly 30 million, with the largest holder, Stream Finance, holding over 13 million RLP, representing a net risk exposure of approximately $17 million.

Yes, Stream Finance, which was previously hit by the xUSD incident, may be hit again.

As of writing, the hacker has converted USR into USDC and USDT and continues to buy Ethereum, having purchased over 10,000 ETH so far. Using 200,000 USDC, the hacker extracted over $20 million in assets, finding their "hundred-fold coin" during the bear market.

Another Exploit Due to "Lack of Rigor"

The sharp drop on October 11 last year caused collateral losses for many stablecoins issued using Delta neutral strategies due to ADL (Auto-Deleveraging). Projects using altcoins as assets for strategy execution suffered even more severe losses, with some even directly absconding.

The attacked Resolv Labs also uses a similar mechanism to issue USR. The project announced in April 2025 that it had completed a $10 million seed round led by Cyber.Fund and Maven11, with participation from Coinbase Ventures, and launched the RESOLV token at the end of May/early June.

However, the reason for the attack on Resolv Labs was not extreme market conditions but rather a "lack of rigor" in the design of the USR minting mechanism.

No security firm or official has yet analyzed the cause of this hack. The DeFi community YAM preliminarily concluded through analysis that the attack was likely caused by the SERVICE_ROLE, used by the protocol's backend to provide parameters to the minting contract, being compromised by the hacker.

According to Grok's analysis, when a user mints USR, they initiate a request on-chain and call the contract's requestMint function, with parameters including:

_depositTokenAddress: the address of the deposited token;

_amount: the amount deposited;

_minMintAmount: the minimum expected amount of USR to receive (slippage protection).

Subsequently, the user deposits USDC or USDT into the contract. The project's backend SERVICE_ROLE monitors the request, uses the Pyth oracle to check the value of the deposited assets, and then calls the completeMint or completeSwap function to determine the actual amount of USR to mint.

The problem lies in the fact that the minting contract fully trusts the _mintAmount provided by the SERVICE_ROLE, assuming this number was verified off-chain by Pyth. Therefore, it did not set an upper limit restriction, nor did it perform on-chain oracle verification, and directly executed mint(_mintAmount).

Based on this, YAM suspects that the hacker gained control of the SERVICE_ROLE, which should have been controlled by the project team (possibly due to internal oracle failure, insider theft, or key compromise), and directly set the _mintAmount to 50 million during the minting process, achieving the attack of minting 50 million USR with 100,000 USDC.

In conclusion, Grok's assessment is that Resolv did not consider the possibility that the address (or contract) receiving user minting requests could be compromised by hackers when designing the protocol. When the USR minting request was submitted to the final USR minting contract, no maximum minting amount was set, nor did the minting contract perform secondary verification using an on-chain oracle; it simply trusted all parameters provided by the SERVICE_ROLE.

Inadequate Prevention

In addition to speculating on the cause of the hack, YAM also pointed out the project's lack of preparedness in crisis response.

YAM stated on X that Resolv Labs only paused the protocol 3 hours after the hacker's first attack was completed, with about 1 hour of delay coming from collecting the 4 signatures required for the multisig transaction. YAM believes that an emergency pause should require only one signature, and the authority should be assigned to team members as much as possible, or to trusted external operators, to increase attention to on-chain anomalies, improve the possibility of quick pauses, and better cover different time zones.

Although the suggestion of requiring only a single signature to pause the protocol is somewhat radical,确实 requiring multiple signatures across different time zones to pause the protocol can indeed cause significant delays when emergencies occur. Introducing trusted third parties who continuously monitor on-chain behavior, or using monitoring tools with emergency protocol pause permissions, are lessons learned from this incident.

Hacker attacks on DeFi protocols have long gone beyond contract vulnerabilities. The Resolv Labs incident serves as a warning to project teams: the assumption in protocol security should be to trust no single link; all parameter-related links must undergo at least secondary verification, even if it's the project's own operational backend.

Preguntas relacionadas

QWhat was the main reason behind the Resolv Labs hack according to the DeFi community YAM's analysis?

AThe hack was likely due to the SERVICE_ROLE, which provides parameters to the minting contract, being controlled by the hacker. The minting contract fully trusted the _mintAmount parameter provided by SERVICE_ROLE without setting a maximum limit or performing a secondary on-chain oracle verification.

QHow much initial capital did the hacker use, and what was the approximate value of the assets they obtained?

AThe hacker used 200,000 USDC to mint a large amount of USR and subsequently obtained assets worth over 20 million US dollars.

QWhich protocols or platforms were affected beyond Resolv Labs itself due to this attack?

AMorpho's lending markets that accepted USR and wstUSR as collateral were almost drained, and Lista DAO on BNB Chain paused new borrowing requests. Additionally, RLP token holders, like Stream Finance, faced significant risk exposure.

QWhat specific flaw in the protocol's design allowed the hacker to mint an excessive amount of USR?

AThe protocol's design did not consider the possibility that the address (or contract) receiving user minting requests could be compromised. The minting contract lacked a maximum mint amount limit and did not use an on-chain oracle for secondary verification, blindly trusting all parameters from the SERVICE_ROLE.

QWhat criticism did YAM level against Resolv Labs' emergency response measures?

AYAM criticized that it took Resolv Labs 3 hours to pause the protocol after the first attack, with about an hour of that delay attributed to collecting 4 signatures required for the multisig transaction. They suggested emergency pauses should require only one signature and be assigned to team members or trusted external operators for faster response.

Lecturas Relacionadas

Anthropic and OpenAI Have Single-Handedly Severed the Logic of Pre-IPO Stock Tokenization

The pre-IPO stock token market is experiencing significant turmoil following strong statements from AI giants Anthropic and OpenAI. Both companies have updated their official policies, declaring that any transfer of their company shares—including sales, transfers, or assignments of share interests—without prior board approval is "invalid" and will not be recognized in their corporate records. This means buyers in such unauthorized transactions would not be recognized as shareholders and would have no shareholder rights. A major point of contention is the use of Special Purpose Vehicles (SPVs), which are legal entities commonly used by pre-IPO token platforms to pool investor funds and indirectly acquire shares from employees or early investors. The companies explicitly state they do not permit SPVs to acquire their shares, and any such transfer violates their restrictions. They warn that third parties selling shares through SPVs, direct sales, forward contracts, or stock tokens are likely engaged in fraud or are offering worthless investments due to these transfer limits. This stance directly threatens the core model of many pre-IPO token platforms, which rely on SPV structures. The announcement revealed additional risks within this model, such as complex "SPV-within-SPV" layering that obscures legal transparency, increases management fees, and creates a chain reaction risk of invalidation. Following the news, tokens like ANTHROPIC and OPENAI on platforms like PreStocks fell sharply (over 20%). The market reaction highlights a divergence: while asset-backed pre-IPO tokens plummeted, purely speculative pre-IPO futures contracts, which are bilateral bets on future IPO prices with no claim to actual shares, remained relatively stable as they are unaffected by the transfer restrictions. The industry is split on the implications. Some believe the fundamental logic of pre-IPO token trading is broken if leading companies reject SPV-held shares, potentially causing a domino effect. Others, like Rivet founder Nick Abouzeid, argue that buyers of such unofficial tokens always knowingly accepted the risk of non-recognition by the company. The statements serve as a stark risk warning and a corrective measure for a market where valuations for some AI-related pre-IPO tokens had soared to irrational levels, far exceeding recent funding round valuations.

marsbitHace 40 min(s)

Anthropic and OpenAI Have Single-Handedly Severed the Logic of Pre-IPO Stock Tokenization

marsbitHace 40 min(s)

Anthropic and OpenAI Personally Sever the Logic of Pre-IPO Crypto-Stocks

The pre-IPO token market has been rocked by strong statements from Anthropic and OpenAI. Both AI giants have updated official warnings, declaring that any sale or transfer of their company shares without explicit board approval is "invalid" and will not be recognized on their corporate records. This directly targets Special Purpose Vehicles (SPVs), the common legal structure used by pre-IPO token platforms. These platforms typically use an SPV to acquire shares from employees or early investors, then issue blockchain-based tokens representing a claim on the SPV's economic benefits. Anthropic and OpenAI's position means that if an SPV's share purchase lacked authorization, the underlying asset could be deemed worthless, nullifying the token's value. Anthropic explicitly warned that any third party selling its shares—via direct sales, forwards, or tokens—is likely fraudulent or offering a valueless investment. The crackdown highlights risks in the popular SPV model, including complex multi-layered "Russian doll" SPV structures that obscure legal ownership, add fees, and concentrate risk. If one layer is invalidated, the entire chain could collapse. Following the announcements, tokens like ANTHROPIC and OPENAI on platforms like PreStocks fell sharply (over 20%). In contrast, purely speculative pre-IPO prediction contracts remained stable, as they involve no actual share ownership. The move is seen as a corrective measure amid a market frenzy where some pre-IPO token valuations (e.g., Anthropic's token hitting a $1.4 trillion implied valuation) far exceeded recent official funding rounds. Opinions are split: some believe this undermines the core logic of pre-IPO token trading if top companies reject SPVs, while others argue buyers always assumed this legal risk when accessing unofficial channels. The statements serve as a stark warning and a potential catalyst for market de-leveraging and clearer boundaries.

Odaily星球日报Hace 43 min(s)

Anthropic and OpenAI Personally Sever the Logic of Pre-IPO Crypto-Stocks

Odaily星球日报Hace 43 min(s)

The Waged Worker Driven to Poverty by AI Subscriptions

"AI Membership: The Hidden Cost Pushing Workers Toward 'Poverty'" The widespread corporate push for AI adoption is creating a hidden financial burden for employees. Companies, from giants like Alibaba to small firms, are mandating AI use, often tying token consumption to KPIs, but frequently refuse to cover the costs. Workers are forced to pay for subscriptions out of pocket to stay competitive and avoid being replaced. Front-end developer Long Shen spends up to 2000 RMB monthly on tools like Cursor and ChatGPT Plus, seeing it as a necessary 3% salary investment to handle 90% of his coding tasks. While it boosted his performance and led to promotions, he now faces idle time at work, pretending to be busy. Designer Peng Peng navigates strict company firewalls by using personal devices and accounts for AI image generation tools like Midjourney, spending hundreds monthly without reimbursement, while her boss demands faster, more numerous revisions. The pressure creates workplace anxiety and suspicion. Programmer Li Huahua, after a friend's experience of raised KPIs following AI success, fears being branded a "traitor" for using it yet worries about falling behind if she doesn't. The dynamic allows management to demand results without understanding the tools or covering expenses, treating employees like AI "agents." While some, like entrepreneur Jin Tu, find high value in paid AI, building entire systems and winning competitions, for most, it's a trap. Free tools like Kimi and Doubao are introducing fees, closing off alternatives. The initial efficiency gains individual advantage, but as AI becomes ubiquitous, the personal edge disappears, workloads increase, and a cycle of dependency begins. Workers like Long Shen realize they cannot maintain AI-generated code without AI, making stopping harder than continuing to pay. The tool promising liberation is instead becoming a compulsory, costly chain in the modern workplace.

marsbitHace 1 hora(s)

The Waged Worker Driven to Poverty by AI Subscriptions

marsbitHace 1 hora(s)

SK Hynix's Trillion-Won Empire: The Successors

"SK Hynix's Trillion-Won Empire and Its Heirs" explores the unconventional succession narrative within SK Group, South Korea's second-largest conglomerate, following SK Hynix's dramatic market rise. Unlike traditional chaebol scripts prioritizing the eldest son, ownership, and political marriages, Chairman Choi Tae-won's three children from his first marriage are charting distinct paths. The eldest daughter, Choi Yun-jeong, is considered the most visible candidate. With a background in biology, consulting, and a PhD, she holds executive roles at SK Bioscience and SK Inc.'s growth strategy unit, focusing on biopharma and new businesses. Her marriage is to an AI infrastructure entrepreneur, not a traditional chaebol heir. The second daughter, Choi Min-jeong, took a unique route by voluntarily serving as a South Korean naval officer, including a tour in the Gulf of Aden. She later worked on policy and strategy for SK Hynix in Washington D.C. before co-founding an AI-driven healthcare startup in San Francisco. She married a former U.S. Marine Corps officer, connecting the family to U.S. defense and policy networks. The son, Choi In-geun, who has Type 1 diabetes, followed a more classic preparatory path with a physics degree and a stint at SK E&S but left to join McKinsey's Seoul office. He remains publicly silent and holds no SK shares, defying the traditional "crown prince" archetype. Their paths unfold against the backdrop of their parents' high-profile, contentious divorce and a record-setting asset division lawsuit. The article argues that as SK Hynix becomes a geopolitical asset in the AI era, the conventional rules of chaebol inheritance are changing. The heirs are being groomed not simply to take over, but to navigate a complex global landscape defined by AI, biotech, geopolitics, and policy, forging legitimacy through their own expertise and networks rather than birth order alone.

marsbitHace 1 hora(s)

SK Hynix's Trillion-Won Empire: The Successors

marsbitHace 1 hora(s)

Trading

Spot
Futuros
活动图片