Futures
Access hundreds of perpetual contracts
CFD
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 40+ AI models, with 0% extra fees
Just caught up on the Resolv incident from a few weeks back and honestly, it's a pretty sobering reminder of how DeFi's growing complexity can become its biggest liability.
So here's what went down on March 22. Resolv, a DeFi protocol that had gone through 18 security audits, got compromised. But not through a smart contract bug. Instead, attackers gained access to their AWS KMS environment where the protocol stored its privileged signing keys. From there, the attack was almost embarrassingly simple: they minted 80 million uncollateralized USR stablecoins and extracted about $25 million in value before anyone could stop them.
The mechanics are worth understanding because they reveal a fundamental design flaw. Resolv's minting process wasn't fully on-chain. When users wanted to mint USR, they'd deposit USDC through requestSwap, then an off-chain service controlled by a private key would authorize the actual minting amount via completeSwap. The smart contract itself had no upper limit on minting—it just verified the signature was valid. That's the vulnerability right there.
The attackers deposited maybe $100-200k in USDC across multiple transactions. Then they used the compromised signing key to authorize minting of 50 million USR in one transaction, then 30 million in another. Two transactions, 80 million tokens, almost no real collateral backing them. From there they converted to wstUSR (a staking derivative), swapped into other stables, bridged to ETH, and disappeared with roughly $24 million in ETH plus some leftover positions.
What's wild is the market impact. USR crashed 80% when this hit—dropping to $0.20 before recovering to around $0.56. The protocol had to suspend all operations immediately. And here's the thing that really stands out: this entire attack unfolded in minutes. By the time anyone noticed something was wrong, the damage was done.
This is the kind of incident that should reshape how we think about DeFi infrastructure. The smart contracts worked exactly as designed. The problem was that the system's security assumptions relied too heavily on cloud infrastructure and off-chain components. When that layer gets compromised, on-chain code doesn't matter. You need real-time detection and automated response mechanisms—not as nice-to-haves, but as absolute necessities.
The article mentions how monitoring systems could have caught this. If there was a rule triggering alerts when minting ratios exceeded normal values by 1.5x, those two massive transactions would've been flagged instantly. Or if there was automated pause functionality tied to unusual minting events, the protocol could've stopped the bleeding before 80 million tokens hit the market.
This is why I keep saying: assume breaches will happen. Assume keys will be compromised. Assume infrastructure will fail. The question isn't if, it's when. And when it does, you need mechanisms that can detect and respond faster than attackers can exploit. Resolv had the audits, had the standard security measures, but didn't have the real-time defense layer that might've made the difference between a contained incident and a $25 million loss.