🚨 JUST IN: Crypto AI Agent is here!!! Watch the video 🎥

Deutsch한국어日本語中文EspañolFrançaisՀայերենNederlandsРусскийItalianoPortuguêsTürkçePortfolio TrackerSwapCryptocurrenciesPricingOpen APIIntegrationsNewsEarnBlogNFTWidgetsDeFi Portfolio TrackerCrypto Gaming24h ReportPress KitAPI Docs
CoinStats

Crypto Hack News: Echo Protocol Exploit Drained $77M

bullish:

0

bearish:

0

Key Insights

  • Crypto hack news intensified after Echo Protocol lost unauthorized eBTC.
  • The attacker moved stolen funds through Ethereum and Tornado Cash.
  • Developers linked the exploit to a compromised admin private key.

Crypto hack news dominated decentralized finance discussions on May 19 after Echo Protocol suffered a multimillion-dollar exploit on Monad. Blockchain investigators revealed that an attacker minted unauthorized eBTC tokens before extracting liquidity through Curvance and laundering part of the proceeds through Ethereum.

Lookonchain tracked the exploit flow shortly after the incident surfaced on X. The analytics platform stated that the attacker minted 1,000 synthetic Bitcoin-backed eBTC tokens before using the assets as collateral. The exploiter later bridged wrapped Bitcoin to Ethereum, swapped it into Ether, and routed the funds through Tornado Cash.

The crypto scam added pressure on decentralized finance security discussions because several protocols suffered breaches this month. Security firms and developers increasingly focused on bridge infrastructure, admin key management, and collateral validation weaknesses following repeated cross-chain exploits.

Crypto Hack News Exposed Echo Protocol Weaknesses

PeckShield identified the exploit after monitoring unusual minting activity on Echo Protocol’s Monad deployment. The blockchain security firm stated that the attacker generated unauthorized eBTC assets before moving a portion into Curvance to secure loans against the collateral.

Source: X
Source: X

That sequence created immediate concerns around collateral verification systems inside decentralized lending markets. Curvance later paused the affected market after detecting abnormal transactions linked to the exploit flow. The lending protocol clarified that its contracts remained operational and unaffected during the incident.

Echo Protocol suspended cross-chain transfers while investigators reviewed the attack path. The team confirmed that bridge operations stopped temporarily as engineers examined the exploit and monitored wallet movements tied to the attacker.

Monad co-founder Keone Hon responded publicly after confusion spread across social media. He stated that the Monad network itself continued operating normally and suffered no infrastructure compromise.

This crypto hack news arrived during a period of rising decentralized finance attacks. Several protocols reported breaches across bridges, liquidity systems, and deprecated smart contracts over recent weeks. The repeated incidents heightened concerns about operational security standards in smaller ecosystems.

Crypto Scam Laundering Flow Triggered Security Concerns

Onchain Lens reconstructed the attacker’s movements after the exploit became public. The analytics platform showed that the exploiter deposited a portion of the minted assets into Curvance before borrowing wrapped Bitcoin against the collateral.

Source: Onchain Len/X
Source: Onchain Len/X

The attacker later bridged the borrowed assets to Ethereum and converted them into Ether. Tornado Cash then received hundreds of Ether linked to the exploit wallet, raising concerns about laundering activity tied to decentralized mixers.

DeBank wallet data showed the exploiter still controlled most of the unauthorized eBTC supply after the initial laundering transactions were completed. That remaining balance created uncertainty around potential liquidation risks and further attempts to extract liquidity through secondary protocols.

The crypto scam also exposed weaknesses in collateral sanity checks across interconnected decentralized finance applications. Developers questioned why freshly minted collateral passed through lending infrastructure without additional safeguards or delayed validation procedures.

Blockchain developer Marioo argued that the exploit resulted from operational failures rather than faulty smart contract logic. He explained that the attacker likely compromised an admin private key tied to minting permissions.

Marioo added that Echo Protocol relied on a single-signature administrative structure without a timelock mechanism. The protocol also lacked minting caps, transaction rate limits, and broader supply validation controls during collateral onboarding.

Crypto Hack News Added Pressure on DeFi Builders

Echo Protocol operated as a Bitcoin-focused decentralized finance platform on Monad. The protocol offered Bitcoin liquidity aggregation, liquid staking, restaking, and yield strategies through synthetic Bitcoin-backed assets like eBTC.

The exploit placed renewed pressure on developers building cross-chain products around wrapped assets and collateralized lending systems. Security researchers increasingly criticized projects relying on centralized administrative structures while marketing decentralized infrastructure.

That reaction mirrored broader concerns surrounding bridge security across decentralized finance ecosystems. Attackers frequently targeted bridges because they controlled asset minting permissions, liquidity pools, and cross-chain verification systems.

Recent exploits across THORChain, Verus Protocol, Transit Finance, and other decentralized applications amplified scrutiny around bridge architecture. Security analysts warned that operational weaknesses often created the same damage as direct smart contract flaws.

Crypto hack news stories also heightened regulatory scrutiny of decentralized finance platforms. Several lawmakers and enforcement agencies have already questioned whether cross-chain systems carry sufficient consumer protections during exploit scenarios.

Developers increasingly faced pressure to adopt multi-signature controls, withdrawal delays, collateral caps, and automated anomaly detection systems. Protocols without layered security controls now attract stronger criticism from both investors and researchers.

The immediate focus now remains on whether the attacker attempts further laundering activity or collateral extraction. Echo Protocol stated that investigators continued monitoring the exploit while preparing additional updates through official channels.

The post Crypto Hack News: Echo Protocol Exploit Drained $77M appeared first on The Coin Republic.

bullish:

0

bearish:

0

Manage all your crypto, NFT and DeFi from one place

Securely connect the portfolio you’re using to start.