Written by Eric, Foresight News Around 10:21 AM Beijing time today, Resolv Labs, which issues the stablecoin USR using a Delta-neutral strategy, was hacked. AnWritten by Eric, Foresight News Around 10:21 AM Beijing time today, Resolv Labs, which issues the stablecoin USR using a Delta-neutral strategy, was hacked. An

Resolv Labs hacked, DeFi projects exploited once again.

2026/03/22 19:25
5 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Written by Eric, Foresight News

Around 10:21 AM Beijing time today, Resolv Labs, which issues the stablecoin USR using a Delta-neutral strategy, was hacked. An address starting with 0x04A2 minted 50 million USR from the Resolv Labs protocol using 100,000 USDC.

Resolv Labs hacked, DeFi projects exploited once again.

Following the exposure of the incident, USR immediately fell to around $0.25, before recovering to around $0.80 at the time of writing. The price of RESOLV token also briefly fell by nearly 10%.

The hackers then used the same method to mint 30 million USR with 100,000 USDC. As USR became significantly depegged, arbitrageurs acted quickly, and many lending markets on Morpho that supported USR, wstUSR, and other collateral were almost completely depleted. Lista DAO on BNB Chain also suspended new loan requests.

These lending protocols aren't the only ones affected. The Resolv Labs protocol also allows users to mint RLP tokens, which offer greater price volatility and higher returns, but also entitle them to liability for losses incurred by the protocol. Currently, there are nearly 30 million RLP tokens in circulation, with Stream Finance holding over 13 million, representing a net risk exposure of approximately $17 million.

That's right, Stream Finance, which previously suffered a major setback due to xUSD, may be about to be hit again.

As of this writing, the hacker has converted USR into USDC and USDT and continues to buy Ethereum, having already purchased over 10,000 coins. Using 200,000 USDC, the hacker has extracted over $20 million in assets, finding their "100x coin" during the bear market.

Once again, a loophole was exploited due to "lack of rigor".

The sharp drop on October 11th last year caused many stablecoins issued using Delta-neutral strategies to suffer collateral losses due to ADL (Automatic Deleveraging). Some projects using altcoins as their asset class suffered even greater losses, with some even disappearing altogether.

Resolv Labs, which was attacked this time, also used a similar mechanism to issue USR. The project announced in April 2025 that it had completed a $10 million seed round led by Cyber.Fund and Maven11, with Coinbase Ventures participating, and launched its token RESOLV in late May and early June.

However, the reason Resolv Labs was attacked was not due to extreme market conditions, but rather because the mechanism for minting USR was "not rigorous enough".

No security company or official body has yet analyzed the cause of this hacking incident. DeFi community member YAM's preliminary analysis suggests the attack was likely caused by hackers gaining control of the SERVICE_ROLE function, which is used in the protocol backend to provide parameters to the minting contract.

According to Grok's analysis, when a user mints USR, they initiate a request on-chain and call the contract's requestMint function, with parameters including:

_depositTokenAddress: The address where the token is deposited;

_amount: The amount to be stored;

_minMintAmount: Minimum expected amount of USR received (anti-slip point).

Afterwards, the user deposits USDC or USDT into the contract. The project's backend SERVICE_ROLE monitors the request, uses the Pyth oracle to check the value of the deposited asset, and then calls the completeMint or completeSwap function to determine the actual amount of USR minted.

The problem lies in the fact that the minting contract completely trusts the _mintAmount provided by SERVICE_ROLE, assuming that the number has been verified off-chain by Pyth. Therefore, it does not set an upper limit or verify it with an on-chain oracle, and directly executes mint(_mintAmount).

Based on this, YAM suspects that the hacker took control of SERVICE_ROLE, which should have been controlled by the project team (possibly due to an internal oracle malfunction, insider theft, or key theft), and directly set _mintAmount to 50 million during minting, thus achieving an attack that minted 50 million USR with 100,000 USDC.

Ultimately, Grok concludes that Resolv did not consider the possibility that the address (or contract) used to receive user minting requests could be controlled by hackers when designing the protocol. When the request to mint USR was submitted to the contract that ultimately minted USR, no maximum minting amount was set, and the minting contract did not use an on-chain oracle for secondary verification. Instead, it directly trusted all the parameters provided by SERVICE_ROLE.

Prevention was also inadequate

Besides speculating on the reasons for the hack, YAM also pointed out the project team's lack of preparedness in dealing with the crisis.

YAM stated on X that Resolv Labs only suspended the protocol three hours after the initial hack, with approximately one hour of that delay stemming from collecting the four signatures required for multi-signature transactions. YAM believes that emergency suspensions should require only one signature, and that this authority should be allocated to team members or trusted external operators whenever possible. This would increase awareness of on-chain anomalies, improve the likelihood of rapid suspensions, and better cover different time zones.

While the suggestion of suspending a protocol with only a single signature is somewhat radical, requiring multiple signatures across different time zones to suspend a protocol could indeed cause significant delays in emergency situations. Introducing a trusted third party that continuously monitors on-chain behavior, or using monitoring tools with emergency suspension permissions, are lessons learned from this incident.

Hacker attacks on DeFi protocols have long been limited to contract vulnerabilities. The Resolv Labs incident serves as a warning to project teams: the assumption regarding protocol security should be that no part of the protocol can be trusted, and all links involving parameters must undergo at least two verifications, even the backend operated by the project team itself.

Market Opportunity
Resolv Logo
Resolv Price(RESOLV)
$0.05439
$0.05439$0.05439
-10.33%
USD
Resolv (RESOLV) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

XRP price dips to $1.40: What’s behind the latest decline?

XRP price dips to $1.40: What’s behind the latest decline?

XRP struggles at $1.40, with retail demand driving its growth despite institutional caution and broader market uncertainty.
Share
Crypto.news2026/03/22 21:44
Chorus One and MEV Zone Team Up to Boost Avalanche Staking Rewards

Chorus One and MEV Zone Team Up to Boost Avalanche Staking Rewards

The post Chorus One and MEV Zone Team Up to Boost Avalanche Staking Rewards appeared on BitcoinEthereumNews.com. Through the partnership with MEV Zone, Chorus One users will earn extra yield automatically. The Chorus One Avalanche node has a total stake of over 1.7 million, valued at around $55 million. This collaboration will introduce MEV Zone to both public nodes and Validator-as-a-Service. The Avalanche network stands to benefit from fairer and more efficient markets due to enhanced transparency. Chorus One, a highly decorated institutional-grade staking provider, has inked a strategic partnership with MEV Zone to enhance yield generation on the Avalanche (AVAX) network. The Chorus One partnered with MEV Zone to increase the AVAX staking yields, while simultaneously contributing to the general growth of the Avalanche network. “At Chorus One, we see this as an important step in our ongoing journey to provide robust infrastructure and innovative yield strategies for our partners and clients,” the announcement noted.  Why Did Chorus One Partner With MEV Zone? The Chorus One platform has grown to a top-tier institutional-grade staking ecosystem, with more than 40 blockchains, since 2018. In a bid to evolve with the needs of crypto investors and the supported blockchains, Chorus One has inked several strategic partnerships in the recent past, including MEV Zone. In the recent past, MEV Zone has specialized in addressing the Maximal Extractable Value (MEV) challenges on the Avalanche network. The MEV Zone will help Chorus One’s AVAX node validator to use Proposer-Builder Separation (PBS). As such, Chorus One’s AVAX node will seamlessly select certain transactions that are more profitable when making blocks. For instance, MEV Zone will help Chorus One’s AVAX node validator to capture arbitrage and liquidation transactions more often since they are more profitable.  How will Chorus One’s AVAX Stakers Benefit Via This Partnership? The Chorus One AVAX node has grown over the years to more than 1.77 million coins staked, valued…
Share
BitcoinEthereumNews2025/09/18 03:19
VP Sara: Sustain insurgency drive

VP Sara: Sustain insurgency drive

VICE-PRESIDENT (VP) Sara Duterte-Carpio on Sunday urged the Philippine Army to sustain its campaign against insurgency and terrorism while upholding institutional
Share
Bworldonline2026/03/22 19:08