DeFi Stablecoin USR Under Attack; Hacker Drains $20M to Mint Nearly $100M

iconChaincatcher
Share
Share IconShare IconShare IconShare IconShare IconShare IconCopy
AI summary iconSummary

expand icon
A DeFi exploit targeted Resolv Labs’ stablecoin USR, as a hacker used 200,000 USDC to mint nearly 80 million USR, valued at over $20 million. On-chain analysis revealed a vulnerability in the protocol’s minting mechanism, which relied on an unsecured SERVICE_ROLE without on-chain verification. The attack caused USR’s price to plummet and disrupted DeFi lending platforms such as Morpho and Lista DAO. The hacker later converted the stolen assets into USDC, USDT, and over 10,000 ETH.

Article by Eric, Foresight News

Around 10:21 Beijing Time today, Resolv Labs, which issues the stablecoin USR using a delta-neutral strategy, was hacked. An address starting with 0x04A2 minted 50 million USR from the Resolv Labs protocol using 100,000 USDC.

As the incident became public, USR dropped to around $0.25, recovering to approximately $0.80 by the time of writing. The RESOLV token price also briefly fell by nearly 10%.

Subsequently, the hacker replicated the same method to mint 30 million USR using 100,000 USDC. As USR significantly deviated from its peg, arbitrageurs swiftly acted; many lending markets on Morpho that accepted USR, wstUSR, and other assets as collateral were nearly emptied, and Lista DAO on BNB Chain suspended new borrowing requests.

The impact extends beyond just these lending protocols. In Resolv Labs’ protocol design, users can also mint RLP tokens, which exhibit greater price volatility and higher yields but require holders to assume liability for losses incurred by the protocol. Currently, the circulating supply of RLP tokens is nearly 30 million, with the largest holder, Stream Finance, owning over 13 million RLP tokens, resulting in a net risk exposure of approximately $17 million.

Yes, Stream Finance, which previously suffered a collapse involving xUSD, may face another major blow.

As of the time of writing, the hacker has converted USR into USDC and USDT and has continued purchasing Ethereum, acquiring over 10,000 ETH so far. Using 200,000 USDC, the hacker has extracted over $20 million in assets, finding their own "100x coin" during the bear market.

Again exploited due to "lack of rigor"

On October 11 last year, the sharp market decline caused many stablecoins issued using delta-neutral strategies to suffer collateral losses due to ADL (Automatic De-leveraging). Projects that used altcoins as assets for their strategies suffered even heavier losses, with some outright abandoning their projects.

Resolv Labs, which was targeted in this attack, also issued USR using a similar mechanism. The project announced in April 2025 that it had completed a $10 million seed round led by Cyber.Fund and Maven11, with participation from Coinbase Ventures, and launched its RESOLV token in late May to early June.

However, Resolv Labs was attacked not due to extreme market conditions, but because the mechanism design for minting USR was insufficiently rigorous.

No security firm or official source has yet analyzed the cause of this hacking incident. The DeFi community YAM, through preliminary analysis, concluded that the attack likely occurred because the hacker gained control of the SERVICE_ROLE used by the protocol’s backend to provide parameters to the minting contract.

According to Grok's analysis, when users mint USR, they initiate a request on-chain and call the contract's requestMint function with the following parameters:

_depositTokenAddress: The address of the token being deposited;

_amount: Deposit amount;

_minMintAmount: Minimum expected amount of USR to receive (slippage protection).

Subsequently, the user deposits USDC or USDT into the contract; the project’s backend with the SERVICE_ROLE monitors the request, uses the Pyth oracle to verify the value of the deposited assets, and then calls the completeMint or completeSwap function to determine the actual number of USR tokens to mint.

The issue lies in the fact that the minting contract fully trusts the _mintAmount provided by SERVICE_ROLE, assuming it has been verified off-chain by Pyth, and therefore imposes no upper limit or on-chain oracle verification, directly executing mint(_mintAmount).

Accordingly, YAM suspects that the hacker gained control of the SERVICE_ROLE, which should have been controlled by the project team (possibly due to an internal oracle compromise, insider theft, or stolen keys), and directly set _mintAmount to 50 million during minting, enabling the attack that created 50 million USR using only 100,000 USDC.

Ultimately, Grok concluded that Resolv did not consider the possibility that the address (or contract) used to receive user minting requests could be compromised by hackers. When minting requests for USR were submitted to the final minting contract, no maximum minting limit was set, and the contract did not perform secondary verification using an on-chain oracle—it blindly trusted all parameters provided by SERVICE_ROLE.

Prevention is also inadequate

In addition to speculating on the cause of the hack, YAM also pointed out the project team's inadequate preparedness in responding to the crisis.

YAM stated on X that Resolv Labs paused the protocol three hours after the first hacker attack, with approximately one hour of delay caused by collecting the four signatures required for the multisig transaction. YAM believes that an emergency pause should require only one signature, and permissions should be distributed as widely as possible among team members or trusted external operators to increase vigilance for on-chain anomalies, improve the likelihood of rapid suspension, and better cover different time zones.

Although the suggestion to pause the protocol with a single signature may seem extreme, requiring multiple signatures across different time zones to pause the protocol could indeed cause critical delays during emergencies. The lesson from this incident is to introduce a trusted third party that continuously monitors on-chain activity, or to implement monitoring tools with emergency protocol pause capabilities.

Attacks on DeFi protocols have long moved beyond smart contract vulnerabilities. The Resolv Labs incident serves as a warning to project teams: assumptions about protocol security must assume that no component can be trusted—all parameters must undergo at least secondary verification, even for backends operated by the project team itself.

Disclaimer: The information on this page may have been obtained from third parties and does not necessarily reflect the views or opinions of KuCoin. This content is provided for general informational purposes only, without any representation or warranty of any kind, nor shall it be construed as financial or investment advice. KuCoin shall not be liable for any errors or omissions, or for any outcomes resulting from the use of this information. Investments in digital assets can be risky. Please carefully evaluate the risks of a product and your risk tolerance based on your own financial circumstances. For more information, please refer to our Terms of Use and Risk Disclosure.