Echo Admin key compromise enabled $76.7M unauthorized eBTC minting.
The attacker used pretend eBTC to borrow and bridge actual crypto belongings.
ECHO token dropped sharply as panic promoting hit the market quick.
The ECHO token got here underneath extreme strain after a significant safety breach tied to the Echo Protocol led to the unauthorized minting of roughly $76.7 million price of eBTC, triggering a pointy lack of confidence throughout the ecosystem.
The exploit centered on a compromise of privileged entry controls, permitting an attacker to bypass regular minting restrictions and generate artificial belongings with out collateral.
The exploit shortly escalated from a technical breach right into a full-scale market disruption.
Inside hours of the assault changing into recognized, the ECHO token recorded a steep double-digit decline as merchants rushed to exit positions amid uncertainty over the protocol’s stability and the standing of the inflated eBTC provide.
Admin key compromise enabled limitless minting of eBTC
The core of the exploit was a compromise of an admin-level non-public key, which granted the attacker management over minting permissions contained in the Echo Protocol system.
With that entry, the attacker was in a position to mint roughly 1,000 eBTC tokens with out depositing any collateral.
These tokens weren’t backed by actual Bitcoin reserves, that means they functioned as artificially created provide contained in the system.
The sudden growth of eBTC provide to roughly $76 million in worth created quick imbalance dangers throughout any built-in lending or buying and selling platforms that accepted the asset as collateral.
As soon as minted, the attacker started routing the belongings by means of decentralized finance functions.
A portion of the pretend eBTC was deposited into lending markets comparable to Curvance, the place it was used to borrow wrapped Bitcoin (WBTC).
From there, the borrowed funds had been bridged throughout networks, transformed into ETH, and partially routed by means of privateness instruments, together with Twister Money, in an try to obscure transaction trails.
Blockchain investigators monitoring the motion of funds famous that roughly 955 eBTC remained underneath attacker management, representing the overwhelming majority of the illicitly minted provide.
Solely a small fraction of the stolen worth was efficiently transformed into liquid belongings through the early levels of the exploit.
ECHO token drops sharply as panic spreads throughout the market
Because the exploit grew to become public, the ECHO token reacted with a speedy sell-off.
The value dropped by over 11% inside a brief interval, reflecting quick market concern over the protocol’s safety and the potential influence of the inflated eBTC provide on the broader ecosystem.

The market reacted to 2 key dangers.
The primary was the potential for additional minting or continued exploitation if entry controls weren’t absolutely secured.
The second was the uncertainty surrounding potential unhealthy debt created in lending markets the place the unbacked eBTC had already been used as collateral.
Liquidity circumstances tightened as individuals decreased publicity to each ECHO and associated belongings.
The sudden exit of capital intensified draw back strain, accelerating the token’s decline and amplifying volatility throughout linked buying and selling pairs.
Echo Protocol halts operations and begins investigation
In response to the breach, Echo Protocol moved to pause cross-chain operations, aiming to restrict additional motion of stolen funds and forestall further exploitation pathways.
The suspension affected bridging and cross-chain performance, which had been utilized by the attacker to maneuver belongings between networks through the laundering course of.
The incident didn’t have an effect on the underlying Monad blockchain, which continued working usually.
The problem was remoted to Echo Protocol’s entry management layer, particularly the privileged permissions tied to minting authority.
Safety researchers assessing the breach have pointed to the admin key compromise because the central failure level.
Somewhat than a flaw in token arithmetic or good contract logic, the assault exploited centralized management privileges that allowed unrestricted issuance of artificial belongings as soon as the important thing was uncovered.







