- An attacker minted 1,000 fake eBTC tokens on Echo Protocol’s Monad deployment using a compromised admin key
- The headline number reached $76.7 million, but the actual realized loss was closer to $816,000
- Echo has since burned the remaining fake tokens, regained admin control, and paused cross-chain operations
Another week, another DeFi exploit — except this one was less about brilliant smart contract manipulation and more about catastrophic operational security.

Echo Protocol suffered an attack on its Monad deployment after an attacker gained access to a compromised admin key and minted 1,000 unauthorized eBTC tokens out of thin air. On paper, those tokens represented roughly $76.7 million in synthetic Bitcoin exposure. In reality, the exploiter only managed to extract around $816,000 before the operation was stopped.
Still bad. Just not seventy-six-million-dollars bad.
The Smart Contracts Weren’t the Problem
According to blockchain developer Marioo, the core eBTC contracts themselves functioned exactly as intended. The vulnerability came from the infrastructure around them.
The attacker exploited a single-signature admin setup with no timelock protections, no minting cap, and no meaningful safeguards limiting how much collateral could suddenly appear inside the system.
Once the fake eBTC was minted, the attacker used it as collateral on Curvance, borrowed roughly 11.29 WBTC against it, bridged the funds to Ethereum, and ultimately routed around 384 ETH through Tornado Cash.
The exploit was essentially a permissions disaster disguised as a protocol attack.
The Security Design Was Shockingly Weak
The most concerning part may not even be the dollar loss itself, but how basic the failure appears in hindsight.
There was reportedly no multisig protection on the admin controls, no delay mechanism for high-risk minting actions, and no supply sanity checks preventing newly minted collateral from immediately being leveraged elsewhere inside the ecosystem.

In traditional security terms, this was closer to leaving the vault keys on the table than discovering some impossible cryptographic vulnerability.
Echo Is Now in Damage Control Mode
Echo Protocol confirmed it has regained control of the compromised admin keys and burned the remaining 955 fake eBTC still held by the attacker.
The project also paused its Aptos bridge and broader cross-chain infrastructure while conducting a full security review across the ecosystem.
The timing adds to growing concerns around DeFi security overall. This exploit arrived only days after THORChain suffered another major breach and the Verus-Ethereum bridge lost roughly $11.6 million in a separate attack.
DeFi’s Biggest Weakness Is Still Humans
The Echo exploit is another reminder that many crypto failures are no longer purely technical coding issues. Increasingly, the weak points are operational controls, admin privileges, infrastructure management, and key security.
The smart contracts can be perfectly audited, formally verified, and mathematically sound — but if one compromised admin key can mint unlimited collateral, the entire system remains vulnerable anyway.
And unfortunately for DeFi, attackers understand that very well.
Disclaimer: BlockNews provides independent reporting on crypto, blockchain, and digital finance. All content is for informational purposes only and does not constitute financial advice. Readers should do their own research before making investment decisions. Some articles may use AI tools to assist in drafting, but every piece is reviewed and edited by our editorial team of experienced crypto writers and analysts before publication.

1 hour ago
11








English (US) ·