Resolv 黑客事件:一枚被盗密钥印发了 2300 万美元。
The Resolv hack: How one compromised key printed $23M

原始链接: https://www.chainalysis.com/blog/lessons-from-the-resolv-hack/

## Resolv DeFi 黑客事件:摘要 2026年3月22日,Resolv DeFi 协议遭受了 2300 万美元的攻击,并非由于智能合约缺陷,而是其链下基础设施遭到入侵。攻击者获得了 Resolv 的 AWS 环境中的一个特权私钥,从而铸造了 8000 万枚无抵押的 USR 稳定币,仅需 10 万至 20 万美元的 USDC 存款。 该协议的设计依赖于此链下密钥来授权铸造,但缺乏链上限制或检查——本质上允许密钥持有者决定 USR 的创建数量。攻击者迅速将铸造的 USR 转换为 wstUSR,然后将其兑换为 ETH,导致 USR 贬值 80%。 这起事件凸显了 DeFi 中攻击面的扩大,因为协议越来越多地依赖外部服务。尽管 Resolv 经过多次审计,但漏洞却不在智能合约本身。实时链上威胁检测和自动化响应系统,例如 Chainalysis Hexagate,可以检测到异常的铸造活动并可能暂停合约,从而防止攻击。 Resolv 黑客事件强调了必须假设漏洞*会*发生,并实施积极的安全措施,而不仅仅是传统的智能合约审计,以保护免受链下漏洞的影响。

## 黑客新闻摘要:8000万美元稳定币被盗 一名黑客入侵了Resolv Lab的AWS账户,获取了用于铸造USR稳定币的私钥。随后,他们提取了2500万美元的ETH,之后协议功能被暂停。这次黑客攻击并非智能合约漏洞,而是利用薄弱的链下密钥管理进行的传统黑客攻击。 讨论的中心在于,该事件是否指向内部人员作案,以及“去中心化”系统中固有中心化控制的风险,以及稳定币的实际效用。许多评论员质疑其目的,强调它们对传统金融系统的依赖以及容易出现故障。 有人对管理员“锁定”交易的能力表示担忧,质疑了加密货币的核心原则。 另一些人指出,稳定币可能被用于非法活动和国际贸易,在传统金融难以开展的地区。 最终,该事件凸显了稳定币生态系统中的安全漏洞和中心化故障点。
相关文章

原文

On March 22, 2026, the Resolv DeFi protocol became the latest example of how quickly things can unravel in DeFi when security assumptions fail. In a matter of minutes, an attacker was able to mint tens of millions of Resolv’s unbacked stablecoins (USR) and extract roughly $23 million in value, triggering a sharp de-peg and forcing the protocol to halt operations.

At first glance, this might look like another smart contract exploit. But it wasn’t. The code worked exactly as intended.

Instead, it was a case of overly trusting off-chain infrastructure. As DeFi systems become more complex and use more external services, privileged keys, and cloud infrastructure, the attack surface expands far beyond the blockchain itself.

In this post, we’ll look at what happened and what the impact was. We’ll also explore how when off-chain components are compromised, only real-time, on-chain threat detection and response mechanisms can act as the critical final line of defence and make the difference between a contained incident and a multi-million dollar exploit.

What happened, in a nutshell

The attacker started by depositing a relatively small amount (around $100K–$200K in USDC) and used it to interact with Resolv’s USR stablecoin minting system. Normally, users deposit USDC and receive an equivalent amount of USR in return. However, in this case, the attacker was able to mint around 80 million USR tokens, far beyond what their deposit should have allowed.

This was possible because minting approvals depended on an off-chain service that used a privileged private key to sign off on how much USR could be created. Unfortunately, the smart contract itself did not enforce any maximum limit on minting – it only checked that a valid signature existed.

After minting the unbacked USR, the attacker quickly converted it into a staked version (wstUSR), then gradually swapped it into other stablecoins and eventually into ETH. By the end of the attack, they had extracted approximately $25 million in ETH. The sudden flood of unbacked USR into the market also caused the token’s price to drop by around 80%.

With the outcome known, let’s take a quick look at how the minting design made this hack possible.

How Resolv’s token minting is supposed to work

Understanding how this attack happened requires first understanding Resolv’s minting design.

When a user wants to mint Resolv’s native token, USR, they don’t interact with an autonomous on-chain mechanism. Instead, they go through a two-step off-chain process:

  1. requestSwap – The user deposits USDC into the USR Counter contract and submits a minting request.
  2. completeSwap – An off-chain service, controlled by a privileged private key called the SERVICE_ROLE, reviews the request and calls back to the contract to finalize how much USR to mint.

The contract enforces a minimum USR output – but critically, no maximum. There is no on-chain ratio check between the collateral deposited and the USR to be minted. No price oracle. No cap. No maximum mint ratio. So, whatever the key holder signs will get minted.

A step by step breakdown of the attack

Step 1. Gaining Access to Resolv’s AWS KMS Environment

The attacker compromised Resolv’s cloud infrastructure to gain access to Resolv’s AWS Key Management Service (KMS) environment where the protocol’s privileged signing key was stored. With control over the KMS environment, the attacker could use Resolv’s own minting key to authorize any minting operation they chose.

Step 2. Minting the USR Tokens

Armed with the signing key, the attacker made two swap requests, each funded with a modest USDC deposit totaling approximately $100K – $200K across a handful of transactions. The SERVICE_ROLE key was then used to call completeSwap with inflated output amounts, authorizing tens of millions of USR in exchange for the USDC deposits.

Two primary transactions have been identified on-chain:

In total, 80 million USR tokens were minted, approximately $25 million.

Step 3. Bypassing Liquidity with wstUSR

The attacker then converted USR into wstUSR (wrapped staked USR), a derivative token that represents a share of the staking pool rather than a fixed number of USR. By staking into wstUSR, the attacker moved their position out of a form that would immediately tank the market and into a less liquid but more fungible derivative.

Step 4. Cashing Out

From wstUSR, the attacker swapped into stablecoins, then into ETH, rotating through multiple DEX pools and bridges to maximize their extraction and obscure the trail.

At the time of writing, the attacker’s wallet holds:

  • ~11,400 ETH (~$24 million)
  • ~20 million wstUSR (~$1.3 million at depressed prices)

The consequences for USR holders were immediate and severe.

The 80 million newly minted, unbacked tokens began hitting DEX liquidity pools. As the supply flooded the markets, USR’s dollar peg collapsed. The token dropped as low as $0.20 (an 80% collapse) before recovering partially to around $0.56 in the hours that followed.

Following the attack, Resolv Labs issued a statement and suspended all protocol functions to prevent further damage and began investigating the breach. The urgency to prevent further damage couldn’t have been stronger either, especially as the attacker was trying to mint even more, hence the importance of having as an immediate response as possible to such an attack.

Resolv hack timeline

How Hexagate could have protected Resolv

The hack on Resolv is a good example of what real-time on-chain monitoring is designed to catch. With Chainalysis Hexagate, two concrete detection approaches would have been available:

Option 1: Monitor for anomalous minting events

A monitoring system like Hexagate could have been configured to watch for any completeSwap function call where the minted USR output was disproportionate to the deposited collateral input.

A $100K USDC deposit authorizing 50 million USR is an anomaly that no legitimate user would ever generate. An alert on this function call pattern with a threshold that flags ratios above, say, 1.5x the normal range, would have flagged both primary transactions instantly.

Hexagate screen

Hexagate’s customized monitor that would have triggered an automated response upon detecting the minting anomaly that exploited Resolv’s minting mechanism.

Option 2: Gatesigner with custom functionality for this critical contract event

The attacker had to go through the requestSwap → completeSwap flow, and this flow generates on-chain events at every stage. Hexagate’s GateSigner combined with contract event monitoring could have been configured to detect the anomalous Mint event and automatically trigger a contract pause before a single dollar of the 80 million USR reached the open market.

Good security means assuming something will go wrong

While Resolv had undergone all the classic security measures, and had undergone as many as 18 audits, the hack on Resolv is, in one sense, a simple story: an attacker got a key, used it to print money, and sold the fake money before anyone noticed.

But in a deeper sense, it’s a story about how DeFi protocols inherit the security assumptions, and the vulnerabilities, of the off-chain infrastructure they depend on. The on-chain smart contract worked perfectly. The broader system design and off-chain infrastructure of the compromised key apparently did not.

Real-time monitoring and automated response mechanisms are now a necessity, not a luxury, as exploits unfold in minutes, leaving no time for reactive measures once the damage is visible.

Learn more about how Hexagate’s real-time on-chain threat detection monitors and automated response can prevent you from being a victim of the next big heist, or request a demo today.

联系我们 contact @ memedata.com