or
Hacker Exploits Resolv for $23M - USR Stablecoin Crashes 97%
Security

Hacker Exploits Resolv for $23M - USR Stablecoin Crashes 97%

March 22, 20263 min read

The Resolv Labs protocol suffered a major exploit on March 22, 2026. An unknown attacker exploited a vulnerability in the USR stablecoin minting smart contract, creating 80 million unbacked tokens in just two transactions. The stolen funds were converted into Ethereum, totaling approximately $23.7 million.

Bottom line: The attacker spent only $100,000 in USDC to mint 80 million USR - 800 times the deposited amount. The stablecoin crashed to $0.025 on Curve, losing 97.5% of its value.

How the Hack Happened

The attack was executed in two stages. First, the hacker deposited approximately 100,000 USDC into the USR minting contract and received 50 million tokens in a single transaction - 500 times the normal exchange rate. A second transaction added another 30 million USR, bringing the total unbacked tokens to 80 million.

Analysts at D2 Finance determined that the root cause was a compromised privileged role in the smart contract. The so-called "service role" was controlled by a single externally owned account with no restrictions on minting volume and no price oracle verification. The contract checked only the minimum number of tokens to be minted but set no upper limit. Once the attacker gained access to the service key, they could specify any amount of USR - hundreds of times more than the actual collateral.

Aggressive Extraction Through DeFi

After obtaining 80 million unbacked USR, the hacker immediately began liquidation through multiple decentralized protocols. The tokens were swapped for USDC and USDT stablecoins across various platforms, then converted into Ethereum. According to on-chain analyst Ai Yi, the attacker purchased a total of 11,409 ETH worth approximately $23.7 million.

The massive USR sell-off instantly crashed the price on decentralized exchanges. On Curve Finance, the token dropped to an absolute low of $0.025 - a 97.5% loss from its $1 target price. The price later partially recovered to $0.85, but a full dollar peg restoration remains uncertain. The RESOLV governance token also declined 6% to $0.054.

Resolv Incident Details
Date of exploitMarch 22, 2026
Unbacked USR minted80,000,000
Attacker's cost~$100,000 USDC
Funds extracted~$23.7M (11,409 ETH)
USR price low$0.025 (-97.5%)
RESOLV token-6% ($0.054)

What Is Resolv and How USR Works

Resolv is a DeFi protocol that issues the USR stablecoin pegged 1:1 to the US dollar. Unlike centralized stablecoins such as USDC or USDT, USR maintains its peg through over-collateralization with crypto assets - primarily ETH, staked Ethereum, and Bitcoin. This makes it a decentralized alternative, but also introduces additional risks related to smart contract security.

The minting mechanism relies on a special service key that determines the amount of USR for each deposit. This is where the critical vulnerability lay: the contract trusted this key without limits, and the key itself was stored on a single external wallet without multisignature protection. In essence, the security of all user assets depended on a single private key.

Team Response and Recovery Prospects

Resolv Labs promptly paused all protocol functions to prevent further exploitation. In a statement on X, the team noted that the collateral pool "remains fully intact" and no underlying assets were lost. This means the funds backing previously issued USR were not stolen - losses were borne by those who purchased unbacked tokens on the secondary market.

The investigation continues with participation from on-chain analysts PeckShield and Ai Yi, who were the first to detect suspicious activity. There is currently no information on whether the stolen funds can be recovered, as the attacker has already converted them into ETH.

Lessons for DeFi Security

The Resolv hack serves as yet another reminder of the risks posed by privileged keys in DeFi protocols. Using a single external wallet to control a critical token minting function without multisignature, timelocks, or upper limits represents a serious architectural vulnerability that could have been avoided.

The incident reveals the importance of layered security: multisig wallets for administrative functions, strict limits on minting volume per transaction, and mandatory price oracle verification. For users of decentralized stablecoins, the USR attack is another reason to carefully evaluate collateral mechanisms and smart contract security before committing capital.

Comments

Your email address will not be published. Required fields are marked *

or verify by email