AI People joins Dubai’s Innovation One program: Declares war on the forgetting of humanity
07/22/2025 - Updated on 07/23/2025
An attacker minted nearly $76.7 million in unauthorized eBTC tokens on Echo Protocol’s Monad deployment after compromising administrative credentials, forcing the platform to suspend its cross-chain bridge, though investigators say only around $816,000 in real value was successfully extracted due to liquidity constraints in the Monad ecosystem.
Blockchain security firms and on-chain analysts reported Tuesday that roughly 1,000 synthetic Bitcoin tokens tied to Echo Protocol’s eBTC asset were illicitly created during the breach. Early forensic findings suggest the incident was not caused by a flaw in the Monad blockchain itself, but rather by compromised administrative credentials connected to Echo’s infrastructure.
The Echo Protocol exploit immediately reignited industry concerns over centralized points of failure inside supposedly decentralized systems, especially as DeFi platforms continue to lose millions to operational security weaknesses in 2026.
According to blockchain security company PeckShield and analytics platform Lookonchain, the attacker rapidly moved part of the unauthorized supply into lending markets in an attempt to extract real liquidity from the synthetic assets.
Data shared by Onchain Lens showed the exploiter deposited 45 eBTC into lending protocol Curvance as collateral before borrowing approximately 11.29 wrapped Bitcoin valued at nearly $868,000.
The attacker then bridged the borrowed WBTC to Ethereum, swapped the assets into ETH, and routed hundreds of ETH through crypto mixer Tornado Cash, according to investigators tracking the movement of funds.
As details emerged, security analysts increasingly focused on what appears to have been the root cause of the Echo Protocol exploit: compromised administrative access.
Echo Protocol initially disclosed only that it was investigating a “security incident impacting the Echo bridge on Monad.” However, blockchain developer Marioo later stated that the incident was linked to a compromised admin private key rather than a vulnerability in the smart contract itself.
That distinction matters enormously for the broader DeFi ecosystem.
According to Marioo, the eBTC contract functioned as designed, but the surrounding operational architecture created the conditions for disaster. The researcher highlighted several weaknesses, including the use of a single-signature admin structure, the absence of a timelock mechanism, and the lack of minting limits that could have slowed or stopped the attack.
The Echo Protocol exploit also exposed weaknesses in collateral verification processes across interconnected DeFi applications. Researchers noted that newly minted eBTC was accepted too easily by external lending markets without sufficient safeguards against abnormal issuance activity.
Curvance later confirmed it had paused the affected market as a precautionary measure. The platform stressed that its isolated market design prevented the problem from spilling into unrelated lending pools.
“There is no indication Curvance smart contracts themselves were compromised,” the protocol stated following the incident.
Meanwhile, Keone Hon emphasized that the Monad network itself remained operational and secure throughout the attack.
In a later update, Hon said security researchers estimated that only around $816,000 in actual value had been successfully extracted despite the massive unauthorized mint. Most of the synthetic supply remains trapped due to liquidity constraints.
One of the most unusual aspects of the Echo Protocol exploit is that the attacker appears unable to fully cash out the majority of the stolen assets.
On-chain data from Lookonchain and DeBank showed the exploiter still controls roughly 955 eBTC worth more than $73 million. Yet analysts believe the tokens are effectively stranded because the Monad ecosystem lacks sufficient decentralized exchange and lending liquidity to absorb an exit of that magnitude.
That reality may have prevented the Echo Protocol exploit from becoming one of the largest realized DeFi thefts in crypto history.
Nick Sawinyh warned that the incident should serve as a wake-up call for users rushing into newly launched DeFi ecosystems without understanding how collateral systems are governed.
“For anyone using newly launched lending markets on newly launched chains, the practical takeaway is narrow: before you supply real assets, look at what the borrowable collateral actually is, who can mint it, and whether anything stops them from minting more,” Sawinyh said.
He added that users should demand transparency around administrative controls and mint authority before trusting protocols with significant capital.
The Echo Protocol exploit has therefore become more than just another hack. It is increasingly being viewed as a case study in how governance shortcuts and operational centralization continue to undermine DeFi’s promise of trust minimization.
The Echo Protocol exploit arrives during one of the most turbulent periods for decentralized finance security in recent memory.
2026 has already seen multiple major attacks targeting bridges, lending systems, and smart contract infrastructure. Earlier this month, Verus Protocol suffered an Ethereum bridge exploit that resulted in losses exceeding $11.6 million.
Before that, Drift Protocol reportedly lost around $285 million in a separate exploit, while Kelp DAO suffered losses estimated at roughly $292 million.
More recently, THORChain halted trading activity after blockchain investigator ZachXBT flagged a suspected $10 million exploit. Meanwhile, Transit Finance disclosed an attack involving a deprecated smart contract that led to nearly $1.88 million in losses.
Against that backdrop, the Echo Protocol exploit underscores a harsh reality confronting the DeFi sector: technological innovation continues to move faster than security standards.
Even as protocols introduce increasingly sophisticated financial products, attackers are still finding success through compromised keys, weak operational controls, and poorly monitored collateral systems.
Echo Protocol has since suspended cross-chain transfers while investigations continue. The team said future updates regarding the Echo Protocol exploit will be communicated through official channels as security experts work to assess the full scope of the breach.
For investors and users, the latest incident is another reminder that in decentralized finance, infrastructure risks often extend far beyond smart contracts themselves.