news

THORChain Issues $10M Exploit Update, Warns Users Over Fake Refund Claims

Nidhi Saini
Published: May 16, 2026
6 min read
THORChain Issues $10M Exploit Update, Warns Users Over Fake Refund Claims

STAY UPDATED WITH COTI

Follow COTI across social media platforms to get the latest news, updates and community discussions.

Make us preferred on Google

Summary:

  • THORChain contributors shared a fresh update on the network incident linked to a suspected $10 million exploit.
  • Early findings point to a newly churned node potentially linked to a single malicious operator.
  • Investigators believe the attacker may have exploited a weakness in GG20 TSS key-sharing infrastructure to reconstruct vault key material.
  • The network remains partially paused while recovery discussions continue.
  • THORChain later warned users about fake refund websites, fake airdrop claims and impersonator accounts spreading false information.
  • THORChain says no official refund, airdrop or compensation program exists, and initial findings suggest user funds were not lost.

THORChain is working through one of its most closely watched security incidents in recent months after contributors published new findings tied to a suspected exploit that temporarily disrupted network activity and raised fresh concerns around decentralized infrastructure security. The update, shared through THORChain's development channels and later circulated publicly, outlined what investigators currently believe happened. According to contributors, current evidence points toward a newly churned validator node potentially linked to the incident. Developers say blockchain analysis has identified connections between Ethereum wallets used to acquire and bond RUNE for that node and wallets that later received suspicious outbound transfers. While the investigation is still ongoing, contributors believe the activity was likely carried out by a single malicious operator. The technical explanation centers on THORChain's GG20 threshold signature scheme implementation - a cryptographic system designed to split private key authority across multiple validators rather than allowing one party to control vault funds.

Investigators say the leading theory is serious enough to explain how unauthorized outbound transactions may have occurred. As the Thorchain team explained:

" the leading theory is the attacker exploited a vulnerability within the GG20 TSS implementation which allowed sensitive key material from vault participants to leak over time. By accumulating enough leaked information, the attacker was ultimately able to reconstruct the vault's TSS private key and execute unauthorized outbound transactions." Source

That matters because threshold signature systems are meant to prevent exactly this type of failure. Instead of one private key sitting in one location, pieces of key material are distributed among trusted participants. If enough information leaks gradually, however, reconstruction becomes possible. That appears to be what investigators are now focused on. The discovery triggered an immediate response from validators across the network. As multiple node operators executed emergency pause commands, THORChain entered a temporary network pause state to contain any further risk while investigators assessed damage and discussed recovery options. According to official statement from the team "Due to multiple node operators executing make pause, the network is currently paused. Unless further action is taken, the pause state will automatically expire in approximately 12 hours" The team later clarified the current operational state:

" Current network status:
-- The network is paused after multiple node operators executed make pause
-- RUNE transfers and chain observation may resume within ~12h unless decided otherwise by the nodes.
-- Trading, LP actions, signing, and sensitive operations remain paused for now Recovery discussions currently include slashing affected node bonds, using POL to absorb losses, or other community-driven solutions" Source

That means some network observation activity may gradually return, but key transactional functions remain suspended until validators agree on next steps. Recovery will likely involve governance coordination. Possible solutions include slashing validator bonds tied to affected vaults or allowing protocol-owned liquidity to absorb part of the impact. No final decision has been made. Contributors acknowledged that bringing THORChain fully back online will not happen overnight. According to the announcement:

"The team is continuing to work on a complete recovery and restart plan for the network. Bringing trading and full functionality back online will likely take several days, and potentially longer depending on the complexity of the chosen remediation path." Source

For now, security teams, including THOR and blockchain forensic specialists at Outrider Analytics, continue collecting evidence while coordinating with relevant law enforcement agencies.

READ MORE: Bitrefill Hack Linked to Lazarus Group: 18,500 Records Exposed and Hot Wallets Drained

Fake Refund Claims Spread as Impersonators Exploit Confusion

As often happens during major crypto security incidents, misinformation appeared almost immediately. Shortly after the initial incident update circulated, fake social media accounts and fraudulent websites began promoting false claims about THORChain compensation programs. Some impersonator accounts claimed users could connect wallets to receive refunds. Others promoted fake airdrops or compensation portals pretending to represent official recovery efforts. The spread became significant enough that THORChain issued a second public warning directly addressing the misinformation campaign. The Thorchain stated:

" To be absolutely clear:
Initial findings indicate that no user funds were lost in the incident
THORChain is currently conducting no refund, airdrop, or compensation program Any account claiming otherwise is impersonating THORChain or spreading misinformation." Source

Periods of uncertainty often create ideal conditions for scammers. Users looking for updates may be more likely to click unfamiliar links or trust accounts that appear official at first glance. THORChain's statement confirmed there is no active compensation portal and no refund claim process underway. Any site suggesting otherwise should be treated as malicious. This issue reportedly grew large enough that even major crypto media outlets accidentally amplified false claims before corrections were made.

Source: Cointelegraph

Independent investigation by the CotiNews team found some fake links had circulated widely across crypto social channels, adding to confusion around the real incident status. The COTINews team noticed that a Cointelegraph author mistakenly promoted a fake X account and a fraudulent recovery portal in an article. Our team has already reached out to the Cointelegraph team to make them aware of this issue.

That kind of misinformation often spreads faster than official updates, particularly when communities are waiting for answers. For users, the safest move remains simple. Ignore all unsolicited compensation links and rely only on THORChain's verified channels for network updates.

A Wider Security Wake-Up Call for DeFi

THORChain's incident arrives during one of the harshest periods for crypto security in recent memory. April alone saw $629.7 million in crypto-related losses, making it the industry's worst month since February 2025, when hacks exceeded $1.47 billion. Two exploits drove most of that damage. KelpDAO's $293 million exploit and Drift Protocol's $280 million breach together accounted for more than 80% of total losses. Attackers are increasingly targeting infrastructure layers - validator systems, privileged operational access, bridge security models and key management frameworks. That appears consistent with what THORChain investigators are now examining. The incident may ultimately become another reminder that decentralized systems are only as secure as their most complex underlying coordination mechanisms.

THORChain has weathered serious pressure before and historically recovered through rapid community coordination. This time will test that resilience again. The coming days will show whether validators can align around a repair strategy quickly enough to restore confidence. For now, The investigation continues and the network is stabilizing. Also users should ignore anyone promising refunds that do not exist.

READ MORE : MEV Bot Nets $9.9M After $50M AAVE Swap Goes Wrong, User Receives Only $36K

About the Project


About the Author

Nidhi Saini

Nidhi Saini

Nidhi Saini is a writer and co-founder of CotiNews, with over four years of experience working in Web3 marketing. She brings a practitioner’s perspective to her writing, shaped by years spent understanding how blockchain products are positioned, communicated, and adopted. As a co-founder, she is also involved in shaping the platform’s editorial direction, ensuring the publication stays thoughtful, credible, and grounded.

Disclaimer

The views and opinions expressed in this article are those of the authors and do not necessarily reflect the official stance of CotiNews or the COTI ecosystem. All content published on CotiNews is for informational and educational purposes only and should not be construed as financial, investment, legal, or technological advice. CotiNews is an independent publication and is not affiliated with coti.io, coti.foundation or its team. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. Readers are strongly encouraged to do their own research (DYOR) before making any decisions based on the content provided. For corrections, feedback, or content takedown requests, please reach out to us at

contact@coti.news

Stay Ahead of the Chain

Subscribe to the CotiNews newsletter for weekly updates on COTI V2, ecosystem developments, builder insights, and deep dives into privacy tech and industry.
No spam. Just the alpha straight to your inbox.

We care about the protection of your data. Read our Privacy Policy.