Other
Resolv Protocol DeFi Exploit β $24 Million Minted via Smart Contract Vulnerability
Primary Source βIncident Details
In March 2026, an attacker exploited a vulnerability in Resolv Protocol β an Ethereum-based decentralised finance (DeFi) stablecoin protocol β to mint approximately $24 million in tokens without legitimate collateral. Resolv Protocol is a yield-bearing stablecoin protocol that issues USR (Resolv USD) backed by Ethereum and delta-neutral positions. The exploit involved the attacker identifying a flaw in the protocol’s minting or collateral verification logic that allowed creation of tokens without providing equivalent value β effectively stealing from the protocol’s liquidity pools and legitimate token holders. Resolv Protocol confirmed the exploit and paused protocol operations while investigating. The attacker’s transactions were visible on-chain, and blockchain analytics firms including Chainalysis and Elliptic assisted in tracing the stolen funds. DeFi protocol exploits of this type β targeting smart contract logic rather than traditional software vulnerabilities β continue at a sustained rate, with over $1.8 billion stolen from DeFi protocols in 2025 according to Chainalysis. The Resolv exploit was reported in the same week as the Uranium Finance case charges (April 2, 2026), the Drift Protocol $285M DPRK exploit (April 1, 2026), and the Bitrefill breach linked to Lazarus Group β indicating an active week for crypto-sector attacks. Resolv Protocol subsequently implemented additional smart contract auditing and patched the vulnerability.
Technical Details
- Initial Attack Vector
- Attacker exploited a vulnerability in Resolv Protocol's smart contracts on Ethereum, allowing unauthorized minting of tokens worth approximately $24 million; the specific technical exploit involved manipulating the protocol's collateralization or price oracle mechanisms
- Vendor / Product
- Resolv Protocol (Ethereum DeFi stablecoin protocol)
Timeline
- 2026-03-22 Breach occurred
- 2026-03-22 Publicly disclosed