A full-blown mess and it escalated fast🥶.


A critical issue in the Resolve system let an attacker mint 50 MILLION #USR using just 100K USDC .. yeah… a 500x imbalance. From there, things spiraled quickly. The attacker converted a huge chunk into wstUSR, started swapping into USDC and USDT, and then rotated that liquidity straight into ETH .. already accumulating around $4.5M worth early on.
And the market reacted instantly.
$USR crashed hard -- dropping all the way to $0.25 (-74%) before bouncing back near $0.86. But even that recovery doesn’t really mean stability… it just shows how chaotic things got.
👇What’s worse… it didn’t stop there👇
Within just a couple of hours, the same exploit was used again -- total minted supply jumped to 80 MILLION USR using only $200K USDC. That capital was then used to buy roughly 9,191 ETH (~$19.3M), with funds already being split and moved -- including 5,500 ETH sent to a fresh wallet.
At this point, it’s not just a bug… it’s active exploitation, ongoing. And the most concerning part? The Resolve team hasn’t responded yet.
Transaction Hash:
0xfe37f25efd67d0a4da4afe48509b258df48757b97810b28ce4c649658dc33743
Attacker Address:
0x04A288a7789DD6Ade935361a4fB1Ec5db513caEd
Receiving Address:
0x6Db6006c38468CDc0fD7d1c251018b1B696232Ed
USDC0,01%
ETH-3,34%
post-image
post-image
post-image
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin