Thorchain Exploited? Trading Paused Amid Risk of Enormous Attack

Blockonomics
Coinbase


Cross-chain DeFi protocol THORChain has suspended trading, following what appears to be a significant multi-chain exploit that may have depleted over $10 million in cryptocurrency assets. Suspicious withdrawals involving Bitcoin, Ethereum, BNB Chain, and Base-linked assets have been reported by security researchers and on-chain investigators such as PeckShield. 

Early tracking data indicates that the attackers allegedly took about 36.75 BTC, or about $3 million, along with an additional $7 million in assets that were bridged across several chains. Both Bitcoin and Ethereum-compatible networks’ publicly known wallet addresses were linked to the stolen funds.

Following the incident, THORChain stopped trading, probably to avoid further liquidity drains or cascading exploits across linked pools. Because THORChain serves as essential infrastructure for decentralized cross-chain swaps, disruptions may affect all of the ecosystems, wallets, aggregators, and liquidity suppliers.

okex

DeFi security is in trouble

DeFi security is already experiencing hardship. Exploits, bridge attacks, governance breaches, and wallet-draining malware campaigns have plagued the industry in recent months. When a foundational liquidity layer fails, interconnected DeFi systems can quickly spread contagion, as demonstrated by recent attacks on major protocols. 


Bitcoin (BTC) Says Goodbye to $80,000, Dogecoin (DOGE) Spikes 50% Hinting at New Rally, Toncoin (TON) Risks Losing $2: Crypto Market Review


XRP Crushes Every Major Coin with Massive Gains

Because cross-chain protocols integrate complicated smart contracts, multiple consensus systems, bridge infrastructure, and liquidity management into a single environment, security experts have frequently cautioned that they continue to be one of the most hazardous attack surfaces in cryptocurrency. 

Additionally, when protocols lack hardened security layers, academic research has demonstrated how DeFi composability, flash loans, and transaction ordering vulnerabilities create highly exploitable conditions.

Guidelines for users

Until an official post-mortem and security assessment are made public, anyone with assets linked to THORChain-integrated wallets, routers, or liquidity pools should refrain from using the protocol. Revoke unnecessary wallet approvals, keep a close eye on official THORChain channels, and stay away from phishing links that take advantage of the incident’s panic.

Decentralization does not completely remove risk, despite common beliefs the market had a few years ago. DeFi continues to function in a setting where a single vulnerability could instantly freeze billions of dollars in liquidity. 



Source link

fiverr

Be the first to comment

Leave a Reply

Your email address will not be published.


*