- Attackers exploited credentials to gain signing access, minting 80M USR and extracting $25M in ETH rapidly.
- Breach involved GitHub, cloud systems, and API keys, exposing multiple infrastructure weaknesses.
- Resolv revoked access, burned tokens, and began recovery, while investigations and system upgrades continue.
A coordinated attack struck Resolv’s infrastructure on March 22, 2026, leading to the minting of 80 million USR and a $25 million extraction in ETH. The breach involved unauthorized access to signing systems and unfolded across multiple layers. The team later confirmed containment, credential revocations, and partial recovery while investigations continue.
Attack Chain Exploited Infrastructure Weaknesses
According to Resolv, attackers first gained access through a compromised third-party project linked to a contractor account. This initial breach exposed GitHub credentials, which enabled entry into internal repositories.
However, production safeguards blocked direct code deployment, forcing attackers to change tactics. They instead deployed a malicious workflow to extract sensitive credentials silently.
Next, the attackers moved into cloud systems, where they mapped infrastructure and targeted API keys. Eventually, they escalated privileges by modifying access policies tied to a signing key. This step granted them authority to approve minting operations.
Unauthorized Minting Triggered Fast Asset Conversion
With signing control secured, attackers executed the first transaction at 02:21 UTC, minting 50 million USR. Shortly after, they began swapping tokens into ETH using multiple wallets and decentralized exchanges.
At 03:41 UTC, a second transaction minted another 30 million USR. In total, the attackers converted assets over roughly 80 minutes, extracting about $25 million.
Notably, monitoring systems flagged unusual activity early. This alert initiated a response that included halting backend services and preparing contract pauses.
Containment Actions and Recovery Efforts Underway
Resolv confirmed that it revoked compromised credentials by 05:30 UTC, cutting off attacker access. Additionally, the team paused relevant smart contracts and shut down affected infrastructure.
Following containment, the protocol neutralized approximately 46 million USR through token burns and blacklist controls. Meanwhile, pre-hack USR holders are receiving full compensation, with most redemptions already processed.
External firms, including Hypernative, Hexens, MixBytes, and SEAL 911, joined the investigation. Further reviews involve Mandiant and ZeroShadow, focusing on infrastructure security and fund tracing.
Resolv stated that operations remain paused as forensic analysis and system upgrades continue.

