Echo Admin key compromise enabled $76.7M unauthorized eBTC minting.
The attacker used pretend eBTC to borrow and bridge actual crypto property.
ECHO token dropped sharply as panic promoting hit the market quick.
The ECHO token got here underneath extreme strain after a significant safety breach tied to the Echo Protocol led to the unauthorized minting of roughly $76.7 million value of eBTC, triggering a pointy lack of confidence throughout the ecosystem.
The exploit centered on a compromise of privileged entry controls, permitting an attacker to bypass regular minting restrictions and generate artificial property with out collateral.
The exploit shortly escalated from a technical breach right into a full-scale market disruption.
Inside hours of the assault changing into identified, the ECHO token recorded a steep double-digit decline as merchants rushed to exit positions amid uncertainty over the protocol’s stability and the standing of the inflated eBTC provide.
Admin key compromise enabled limitless minting of eBTC
The core of the exploit was a compromise of an admin-level personal key, which granted the attacker management over minting permissions contained in the Echo Protocol system.
With that entry, the attacker was in a position to mint roughly 1,000 eBTC tokens with out depositing any collateral.
These tokens weren’t backed by actual Bitcoin reserves, that means they functioned as artificially created provide contained in the system.
The sudden growth of eBTC provide to roughly $76 million in worth created speedy imbalance dangers throughout any built-in lending or buying and selling platforms that accepted the asset as collateral.
As soon as minted, the attacker started routing the property by means of decentralized finance functions.
A portion of the pretend eBTC was deposited into lending markets akin to Curvance, the place it was used to borrow wrapped Bitcoin (WBTC).
From there, the borrowed funds have been bridged throughout networks, transformed into ETH, and partially routed by means of privateness instruments, together with Twister Money, in an try and obscure transaction trails.
Blockchain investigators monitoring the motion of funds famous that roughly 955 eBTC remained underneath attacker management, representing the overwhelming majority of the illicitly minted provide.
Solely a small fraction of the stolen worth was efficiently transformed into liquid property in the course of the early levels of the exploit.
ECHO token drops sharply as panic spreads throughout the market
Because the exploit turned public, the ECHO token reacted with a speedy sell-off.
The worth dropped by over 11% inside a brief interval, reflecting speedy market concern over the protocol’s safety and the potential impression of the inflated eBTC provide on the broader ecosystem.

The market reacted to 2 key dangers.
The primary was the potential for additional minting or continued exploitation if entry controls weren’t totally secured.
The second was the uncertainty surrounding potential unhealthy debt created in lending markets the place the unbacked eBTC had already been used as collateral.
Liquidity situations tightened as contributors decreased publicity to each ECHO and associated property.
The sudden exit of capital intensified draw back strain, accelerating the token’s decline and amplifying volatility throughout related buying and selling pairs.
Echo Protocol halts operations and begins investigation
In response to the breach, Echo Protocol moved to pause cross-chain operations, aiming to restrict additional motion of stolen funds and stop further exploitation pathways.
The suspension affected bridging and cross-chain performance, which had been utilized by the attacker to maneuver property between networks in the course of the laundering course of.
The incident didn’t have an effect on the underlying Monad blockchain, which continued working usually.
The difficulty was remoted to Echo Protocol’s entry management layer, particularly the privileged permissions tied to minting authority.
Safety researchers assessing the breach have pointed to the admin key compromise because the central failure level.
Somewhat than a flaw in token arithmetic or sensible contract logic, the assault exploited centralized management privileges that allowed unrestricted issuance of artificial property as soon as the important thing was uncovered.








