BlockNews
FOLLOW ON X
  • BITCOIN
  • CRYPTO
    • ETHEREUM
    • RIPPLE XRP
    • SOLANA
    • CARDANO
    • BINANCE BNB
    • DOGECOIN
    • TRON
    • SUI
    • CHAINLINK
    • LITECOIN
  • FINANCE
  • POLITICS
  • MEMECOINS
  • NFT
  • OPINION
No Result
View All Result
BlockNews
  • BITCOIN
  • CRYPTO
    • ETHEREUM
    • RIPPLE XRP
    • SOLANA
    • CARDANO
    • BINANCE BNB
    • DOGECOIN
    • TRON
    • SUI
    • CHAINLINK
    • LITECOIN
  • FINANCE
  • POLITICS
  • MEMECOINS
  • NFT
  • OPINION
No Result
View All Result
BlockNews
Home CRYPTO BITCOIN

A $76M Headline That Was Really an $816K Problem — With a Compromised Key

Michael Juanico by Michael Juanico
May 19, 2026
in BITCOIN, CRYPTO, ETHEREUM, FINANCE, OPINION
Share on XShare in TelegramShare on Reddit
  • An attacker minted 1,000 fake eBTC tokens on Echo Protocol’s Monad deployment using a compromised admin key
  • The headline number reached $76.7 million, but the actual realized loss was closer to $816,000
  • Echo has since burned the remaining fake tokens, regained admin control, and paused cross-chain operations

Another week, another DeFi exploit — except this one was less about brilliant smart contract manipulation and more about catastrophic operational security.

Echo Protocol suffered an attack on its Monad deployment after an attacker gained access to a compromised admin key and minted 1,000 unauthorized eBTC tokens out of thin air. On paper, those tokens represented roughly $76.7 million in synthetic Bitcoin exposure. In reality, the exploiter only managed to extract around $816,000 before the operation was stopped.

Still bad. Just not seventy-six-million-dollars bad.

The Smart Contracts Weren’t the Problem

According to blockchain developer Marioo, the core eBTC contracts themselves functioned exactly as intended. The vulnerability came from the infrastructure around them.

The attacker exploited a single-signature admin setup with no timelock protections, no minting cap, and no meaningful safeguards limiting how much collateral could suddenly appear inside the system.

Once the fake eBTC was minted, the attacker used it as collateral on Curvance, borrowed roughly 11.29 WBTC against it, bridged the funds to Ethereum, and ultimately routed around 384 ETH through Tornado Cash.

The exploit was essentially a permissions disaster disguised as a protocol attack.

The Security Design Was Shockingly Weak

The most concerning part may not even be the dollar loss itself, but how basic the failure appears in hindsight.

There was reportedly no multisig protection on the admin controls, no delay mechanism for high-risk minting actions, and no supply sanity checks preventing newly minted collateral from immediately being leveraged elsewhere inside the ecosystem.

In traditional security terms, this was closer to leaving the vault keys on the table than discovering some impossible cryptographic vulnerability.

Echo Is Now in Damage Control Mode

Echo Protocol confirmed it has regained control of the compromised admin keys and burned the remaining 955 fake eBTC still held by the attacker.

The project also paused its Aptos bridge and broader cross-chain infrastructure while conducting a full security review across the ecosystem.

The timing adds to growing concerns around DeFi security overall. This exploit arrived only days after THORChain suffered another major breach and the Verus-Ethereum bridge lost roughly $11.6 million in a separate attack.

DeFi’s Biggest Weakness Is Still Humans

The Echo exploit is another reminder that many crypto failures are no longer purely technical coding issues. Increasingly, the weak points are operational controls, admin privileges, infrastructure management, and key security.

The smart contracts can be perfectly audited, formally verified, and mathematically sound — but if one compromised admin key can mint unlimited collateral, the entire system remains vulnerable anyway.

And unfortunately for DeFi, attackers understand that very well.

Disclaimer: BlockNews provides independent reporting on crypto, blockchain, and digital finance. All content is for informational purposes only and does not constitute financial advice. Readers should do their own research before making investment decisions. Some articles may use AI tools to assist in drafting, but every piece is reviewed and edited by our editorial team of experienced crypto writers and analysts before publication.
Tags: BitcoincryptoDeFiethereumsecurity
TweetShareShare
Michael Juanico

Michael Juanico

Michael is a BSBA Management graduate from Mindanao State University and has been a professional content writer since 2019. He began exploring cryptocurrency in 2021 and has since made blockchain and digital assets his primary focus. For nearly four years, Michael has contributed research and editorial content at Aiur Labs and BlockNews, producing clear and accessible coverage of market trends, trading strategies, and project developments. He is transparent about his personal holdings in Bitcoin, TRON, and select meme tokens, combining writing expertise with hands-on market experience to deliver trustworthy insights to readers.

DON'T MISS THESE! HOT OFF THE PRESS

Bitcoin Miners Are Now Power Landlords — And Wall Street Just Figured It Out
BITCOIN

Bitcoin Miners Are Now Power Landlords — And Wall Street Just Figured It Out

May 19, 2026
Revolut Launches Dogecoin Debit Card – Here Is Why Crypto Payments Keep Going Mainstream
CRYPTO

Revolut Launches Dogecoin Debit Card – Here Is Why Crypto Payments Keep Going Mainstream

May 19, 2026
Rarible Partners With D00ds to Power FORGED00DS — and Burns Are the Whole Point
NFT

Rarible Partners With D00ds to Power FORGED00DS — and Burns Are the Whole Point

May 19, 2026
Iran Turns to Bitcoin for Hormuz Trade Routes – Here Is Why the Dollar Debate Is Heating Up
BITCOIN

Iran Turns to Bitcoin for Hormuz Trade Routes – Here Is Why the Dollar Debate Is Heating Up

May 19, 2026
Eight Gone and Counting: What Exactly Is Happening at the Ethereum Foundation?
CRYPTO

Eight Gone and Counting: What Exactly Is Happening at the Ethereum Foundation?

May 19, 2026
Republicans Sneak a CBDC Ban Into a Housing Bill — And That’s Actually Working
CRYPTO

Republicans Sneak a CBDC Ban Into a Housing Bill — And That’s Actually Working

May 19, 2026
Load More

Related News

A $76M Headline That Was Really an $816K Problem — With a Compromised Key

A $76M Headline That Was Really an $816K Problem — With a Compromised Key

May 19, 2026
Bitcoin Miners Are Now Power Landlords — And Wall Street Just Figured It Out

Bitcoin Miners Are Now Power Landlords — And Wall Street Just Figured It Out

May 19, 2026
Revolut Launches Dogecoin Debit Card – Here Is Why Crypto Payments Keep Going Mainstream

Revolut Launches Dogecoin Debit Card – Here Is Why Crypto Payments Keep Going Mainstream

May 19, 2026
Rarible Partners With D00ds to Power FORGED00DS — and Burns Are the Whole Point

Rarible Partners With D00ds to Power FORGED00DS — and Burns Are the Whole Point

May 19, 2026
Iran Turns to Bitcoin for Hormuz Trade Routes – Here Is Why the Dollar Debate Is Heating Up

Iran Turns to Bitcoin for Hormuz Trade Routes – Here Is Why the Dollar Debate Is Heating Up

May 19, 2026
Twitter Telegram Threads

BLOCKNEWS.COM

BlockNews is your premier source for real-time cryptocurrency, blockchain, political and financial market news.

Stay ahead of the herd with BlockNews

RESOURCES

  • About Us
  • Contact Us
  • Editorial Policies
  • Terms and Conditions
  • Privacy Policy
  • Sitemap

DISCLOSURES AND POLICIES

BlockNews provides independent reporting on crypto, blockchain, and digital finance. Content is for informational purposes only and does not constitute financial advice. Sponsored material is always disclosed. By using this site, you agree to our Terms and Conditions and Privacy Policy.

© 2025 BlockNews

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
No Result
View All Result
  • HOME
  • BITCOIN
  • CRYPTO
    • ETHEREUM
    • RIPPLE XRP
    • SOLANA
    • CARDANO
    • BINANCE BNB
    • DOGECOIN
    • TRON
    • LITECOIN
    • CHAINLINK
    • SUI
  • MEMECOINS
  • POLITICS
  • FINANCE
  • NFT
  • DEFI
  • GUIDES

© 2025 BlockNews