THORChain's $10.7M Hack Is a Warning for All of DeFi, Not Just One Protocol

 





THORChain lost $10.7 million on May 15. But the bigger story is not the money. It is how it was taken, and which other protocols could be next.

The attacker did not exploit a smart contract or steal a private key through phishing. They joined THORChain's validator set legally, bonding RUNE just like any legitimate operator. Then, over multiple signing sessions, they collected fragments of private key material that were leaking from a flaw in GG20, the threshold signature cryptography library THORChain relies on.

Once they had accumulated enough leaked data, they mathematically reconstructed the vault's full private key. Then they signed unauthorized transactions as if they were the vault itself. The funds left through completely normal channels, because technically, from the network's perspective, the signatures were valid.

This is the part that should concern anyone holding liquidity across cross-chain protocols.

GG20's weaknesses were documented publicly in 2023 through the Alpha-Rays attack published by Verichains, and through TSSHOCK, presented at BlackHat the same year. Major institutional custody providers including Fireblocks and Coinbase Custody had already migrated away from GG20-family implementations before THORChain was hit. The industry saw it coming.

Several other protocols still share the same library lineage as THORChain. Mayachain, a direct fork of THORChain, is on that list. So are Sygma, a cross-chain bridge, and Keep Network's tBTC v1. Any service still running on bnb-chain/tss-lib or ZenGo-X/multi-party-ecdsa faces the same exposure.

THORChain has now been exploited six times in five years through six completely different attack vectors: smart contracts, validator software, TSS keygen, economic design failure, social engineering, and now TSS cryptography. Total losses across all incidents are estimated at approximately $227 million.

The protocol has also warned users that scam accounts are circulating fake refund and airdrop offers following the incident. THORChain confirmed it is running no such programs. Users should verify all updates only through official THORChain channels.

For the full technical breakdown of how the GG20 flaw was exploited, which protocols face exposure, and what the recovery options on the table look like, the complete report is published at CryptoNewsLive.org.

Comments

Popular posts from this blog

Ripple Is Building XRPL's Defense Against Quantum Computing, and the Clock Is Already Running

Hoskinson Just Said Everything Nobody Else Will Say About Crypto in 2026

: KelpDAO's $292M Bridge Hack Just Broke Aave and Locked Real Lenders Out