Summary:
- Echo Protocol suffered a major exploit after an attacker minted 1,000 unauthorized eBTC worth roughly $76.7 million.
- Early findings suggest the issue was caused by an admin private key compromise, not a smart contract flaw.
- The attacker has already moved part of the stolen funds through Tornado Cash, laundering nearly 5% of the total amount.
- Roughly 955 eBTC worth around $73 million remains in the attacker's wallet.
- Monad confirmed its blockchain infrastructure remains unaffected.
- The exploit adds to a difficult year for DeFi, with multiple major attacks already recorded in 2026.
Another major DeFi exploit has landed at a time when the sector is already under heavy pressure. Bitcoin liquidity protocol Echo Protocol confirmed a serious security incident after an attacker minted around 1,000 synthetic Bitcoin (eBTC) without authorization, creating losses estimated at $76.7 million. The exploit was first flagged Tuesday by blockchain security firm PeckShield and onchain analytics platform Lookonchain, both of which traced suspicious minting activity tied to the protocol's bridge infrastructure on Monad, the high-performance EVM-compatible layer-1 blockchain where Echo is deployed.
Source : PeckShield report
Echo quickly acknowledged the incident and temporarily halted all bridge-related activity while its team investigates what happened.
That immediate pause was likely necessary to prevent additional unauthorized transfers while forensic teams reviewed internal controls and wallet activity. For users unfamiliar with Echo, the protocol focuses on Bitcoin liquidity aggregation and yield generation. It allows users to deposit BTC-based assets and receive eBTC, a synthetic Bitcoin asset designed for staking, restaking, bridging, and broader DeFi use. The model depends heavily on trust in minting controls. Once those controls fail, confidence can disappear quickly. This exploit arrives during one of the roughest periods DeFi has faced this year. At least 12 separate protocols have been compromised this month alone, including incidents involving THORChain, Verus Protocol's Ethereum bridge, Transit Finance, TrustedVolumes, and Ekubo. That pattern is becoming difficult to ignore. The weak points are shifting away from pure contract code and increasingly toward infrastructure operations and privileged access systems.
Attack Flow Shows Laundering Attempts Through Curvance and Tornado Cash
According to PeckShield's onchain investigation, the attacker did not immediately dump the newly minted eBTC. Instead, they used a more calculated route. The attacker deposited 45 eBTC worth approximately $3.45 million into DeFi lending protocol Curvance, then borrowed wrapped Bitcoin against that collateral. PeckShield explained:
That process allowed the attacker to convert a portion of synthetic collateral into liquid ETH before sending 384 ETH, worth roughly $822,000, through Tornado Cash. It's a common laundering path for attackers seeking to break transaction traceability. According to wallet tracking data from DeBank, the attacker still controls 955 eBTC worth around $73 million. That means only a small fraction of the exploit has actually been cashed out so far. This leaves investigators with an opportunity to monitor movement and possibly coordinate with exchanges or analytics firms if liquidation attempts begin. Meanwhile, Curvance clarified that its own contracts were not exploited. The team stated it detected the unusual collateral behavior, paused the affected market, and began internal review. Curvance statement:
Freshly minted collateral was accepted without deeper supply validation. That kind of assumption can create dangerous knock-on effects across interconnected DeFi systems.
Private Key Failure Highlights DeFi's Growing Operational Security Problem
Early technical analysis suggests the exploit was not caused by broken smart contract logic. Blockchain developer Marioo reported that the root issue appears to be an admin private key compromise. According to their review, the eBTC contract itself functioned correctly. The real problem was operational design. The protocol reportedly relied on a single-signature admin role, with no timelock, no minting cap, no rate limiter, and no supply sanity checks before collateral could enter connected protocols. That meant whoever gained access to the admin key effectively gained unrestricted mint authority. Marioo described the failure as "operational, not technical." Smart contract audits can catch code flaws. They cannot fix weak operational controls. Monad co-founder Keone Hon also moved quickly to separate the incident from the underlying network itself. He stated:

That clarification is important for ecosystem confidence. The exploit was isolated to Echo's application-layer security model. Still, the timing is difficult. The broader DeFi industry is already facing rising pressure after several major breaches this year, including Drift Protocol's $285 million exploit and Kelp DAO's $292 million loss in April. Together, these incidents show the same uncomfortable truth. Echo Protocol says further updates will be shared through official channels as investigations continue. For now, the attacker still holds most of the minted eBTC.
READ MORE: THORChain Issues $10M Exploit Update, Warns Users Over Fake Refund Claims