Crypto Security Crisis Deepens as Three Major Hacks Drain Over $32 Million in Four Days The decentralized finance sector is facing renewed scrutiny after a rCrypto Security Crisis Deepens as Three Major Hacks Drain Over $32 Million in Four Days The decentralized finance sector is facing renewed scrutiny after a r

$32M Gone in 4 Days: Crypto Hacks Shock THORChain, Verus & Echo

2026/05/19 21:32
8 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Crypto Security Crisis Deepens as Three Major Hacks Drain Over $32 Million in Four Days

The decentralized finance sector is facing renewed scrutiny after a rapid series of high-value exploits drained more than $32 million from multiple protocols within just four days, raising urgent questions about the safety of cross-chain infrastructure and lending systems in 2026.

Between May 15 and May 19, three separate attacks targeted THORChain, the Verus Ethereum Bridge, and Echo Protocol. Each exploit used a different technical approach, but all resulted in significant financial losses and exposed persistent weaknesses in decentralized financial infrastructure.

Source: X(formerly Twitter)
Security analysts say the speed and coordination of these incidents signal an evolving threat landscape where attackers are increasingly focusing on bridges, verification systems, and protocol-level trust assumptions rather than individual wallets.

A Rapid Wave of Exploits Shakes Confidence in DeFi Systems

The latest series of incidents has intensified concerns across the crypto industry, particularly because of the short time frame in which they occurred.

Within less than a week, attackers successfully extracted millions of dollars from three separate ecosystems, highlighting structural vulnerabilities that continue to exist in cross-chain and decentralized lending platforms.

While each exploit differed technically, they all shared one common outcome: real assets were drained after protocol-level verification systems were bypassed or manipulated.

Industry observers describe this pattern as part of a broader trend in which attackers are increasingly targeting infrastructure layers rather than end-user accounts.

THORChain Exploit Opens the Week With $10.8 Million Loss

The first major incident occurred on May 15, 2026, when THORChain, a cross-chain liquidity protocol, suffered an exploit that resulted in losses estimated at approximately $10.8 million.

THORChain is designed to enable native asset swaps across different blockchains without the need for wrapped tokens. However, attackers were able to exploit weaknesses in the system’s transaction validation process.

According to blockchain investigators including ZachXBT and security firm PeckShield, the attack affected multiple networks including Bitcoin, Ethereum, BNB Chain, and Base.

A total of 36.75 BTC and additional assets across multiple chains were drained from liquidity pools and moved into attacker-controlled wallets.

Following the exploit, THORChain temporarily suspended trading and signing operations as developers began investigating the breach.

The protocol’s native token, RUNE, experienced a sharp decline of approximately 14% in the immediate aftermath of the incident.

Early analysis suggests the vulnerability may be linked to issues in the GG20 signature scheme, which is used to validate cross-node transactions. However, a full post-mortem has not yet been released.

Verus Ethereum Bridge Hit by $11.5 Million Cross-Chain Exploit

Just three days later, on May 18, 2026, another major exploit targeted the Verus Ethereum Bridge, a cross-chain infrastructure protocol designed to facilitate asset transfers between separate blockchain networks.

This second attack resulted in the loss of approximately $11.58 million in digital assets, including tBTC, ETH, and USDC.

Source: Arkham Intelligence
Unlike traditional smart contract vulnerabilities, this exploit reportedly involved a forged transfer submission that bypassed verification checks on the bridge network.

Security firm Blockaid detected the suspicious activity in real time and flagged the transaction pattern as malicious. Investigators later confirmed that the attacker was able to manipulate the system’s verification process, causing the protocol to release funds from reserves without legitimate backing.

Reports indicate that eight out of fifteen notaries responsible for validating transactions signed a fraudulent state root, allowing the exploit to succeed.

Before executing the attack, the perpetrator reportedly funded their wallet using Tornado Cash and paid minimal transaction fees to initiate the exploit.

After draining the assets, the attacker consolidated holdings into Ethereum before dispersing funds across multiple addresses.

Security experts say the attack highlights a recurring issue in cross-chain infrastructure: reliance on distributed validation systems that can be compromised if a subset of validators is exploited or misled.

Echo Protocol Incident Pushes Total Losses Beyond $32 Million

The third and most recent exploit occurred on May 19, 2026, when Echo Protocol became the latest victim in the ongoing wave of DeFi attacks.

In this case, attackers exploited a vulnerability within the Curvance lending system integrated into Echo Protocol’s ecosystem.

The attacker reportedly minted 1,000 unbacked eBTC tokens, artificially inflating their value to more than $76 million on paper.

However, rather than attempting to liquidate the full amount, the attacker used a portion of the fabricated assets as collateral within Curvance, borrowing real-world assets including Wrapped Bitcoin and stablecoins.

According to blockchain data, approximately 45 eBTC were deposited as collateral, enabling the attacker to extract around 11.29 WBTC, valued at roughly $866,000.

Additional transactions involved stablecoin movements and Ethereum withdrawals, resulting in further realized losses estimated at over $800,000.

Security analysts stress that while the minted eBTC figure appears extremely large, the actual liquid losses were significantly lower due to liquidity constraints and emergency response actions taken by developers.

Nevertheless, the incident exposed a critical vulnerability in how synthetic assets are validated within decentralized lending systems.

A Coordinated Pattern or Coincidental Timing?

The rapid succession of these three major exploits has prompted speculation about whether attackers are coordinating efforts or simply exploiting widely known vulnerabilities across different protocols.

Security researchers tracking blockchain activity note that all three incidents targeted infrastructure-level weaknesses rather than isolated smart contract bugs.

This includes cross-chain bridges, validator-based verification systems, and lending protocols that rely on external collateral assumptions.

According to aggregated data from security firms such as PeckShield, bridge-related exploits alone accounted for hundreds of millions in losses in early 2026, making them one of the most targeted sectors in decentralized finance.

Why Cross-Chain Infrastructure Is a Prime Target

Cross-chain bridges and interoperability systems are among the most complex components in blockchain ecosystems. They are designed to move assets between networks that do not inherently trust each other.

This creates multiple points of potential failure, particularly in how transactions are verified and approved across independent systems.

Security analysts say attackers are increasingly exploiting these trust assumptions by manipulating validator sets, forging transaction proofs, or targeting weak governance structures within decentralized systems.

The result is a growing number of high-value exploits that bypass traditional smart contract vulnerabilities entirely.

What Users Should Take Away From the Latest Hacks

Following the recent wave of attacks, cybersecurity experts are urging users to take additional precautions when interacting with DeFi platforms, especially those involving cross-chain transfers or lending protocols.

Recommended safety measures include:

  • Verifying whether protocols have undergone recent security audits
  • Monitoring on-chain activity before depositing large amounts of capital
  • Avoiding large transfers during periods of heightened exploit activity
  • Tracking wallet exposure using blockchain analytics tools
  • Diversifying assets across multiple secure platforms

Experts also emphasize that while decentralized finance offers significant innovation, it continues to carry structural risks that are not present in traditional financial systems.

Market Impact and Investor Sentiment

The cumulative effect of more than $32 million in losses over four days has contributed to increased caution across the crypto market.

Tokens associated with affected protocols experienced downward pressure following the announcements, while broader market sentiment remained cautious amid fears of further exploits.

However, analysts note that the total figure likely underrepresents the broader risk exposure, as additional undisclosed vulnerabilities may still exist across similar infrastructure systems.

Conclusion: A Warning Sign for DeFi Infrastructure in 2026

The series of exploits targeting THORChain, Verus Ethereum Bridge, and Echo Protocol highlights an ongoing and escalating challenge for decentralized finance platforms.

Rather than isolated incidents, the attacks suggest a systemic vulnerability in cross-chain infrastructure and decentralized verification systems that continues to be exploited by sophisticated attackers.

With over $32 million drained in just four days, the events of May 2026 serve as a stark reminder that DeFi security remains an evolving battlefield.

As the industry continues to expand, experts warn that without stronger verification standards, improved validator security, and more robust cross-chain architecture, similar incidents are likely to continue.

For now, the focus remains on containment, recovery efforts, and reinforcing trust in systems that underpin the future of decentralized finance.

hoka.news – Not Just Crypto News. It’s Crypto Culture.

Writer @Erlin
Erlin is an experienced crypto writer who loves to explore the intersection of blockchain technology and financial markets. She regularly provides insights into the latest trends and innovations in the digital currency space.
 
 Check out other news and articles on Google News


Disclaimer:


The articles published on hoka.news are intended to provide up-to-date information on various topics, including cryptocurrency and technology news. The content on our site is not intended as an invitation to buy, sell, or invest in any assets. We encourage readers to conduct their own research and evaluation before making any investment or financial decisions.
hoka.news is not responsible for any losses or damages that may arise from the use of information provided on this site. Investment decisions should be based on thorough research and advice from qualified financial advisors. Information on hoka.news may change without notice, and we do not guarantee the accuracy or completeness of the content published.

Market Opportunity
4 Logo
4 Price(4)
$0.010239
$0.010239$0.010239
+1.21%
USD
4 (4) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

No Chart Skills? Still Profit

No Chart Skills? Still ProfitNo Chart Skills? Still Profit

Copy top traders in 3s with auto trading!