Echo Admin key compromise enabled $76.7M unauthorized eBTC minting.
The attacker used pretend eBTC to borrow and bridge actual crypto property.
ECHO token dropped sharply as panic promoting hit the market quick.
The ECHO token got here beneath extreme strain after a significant safety breach tied to the Echo Protocol led to the unauthorized minting of roughly $76.7 million value of eBTC, triggering a pointy lack of confidence throughout the ecosystem.
The exploit centered on a compromise of privileged entry controls, permitting an attacker to bypass regular minting restrictions and generate artificial property with out collateral.
The exploit rapidly escalated from a technical breach right into a full-scale market disruption.
Inside hours of the assault turning into identified, the ECHO token recorded a steep double-digit decline as merchants rushed to exit positions amid uncertainty over the protocol’s stability and the standing of the inflated eBTC provide.
Admin key compromise enabled limitless minting of eBTC
The core of the exploit was a compromise of an admin-level personal key, which granted the attacker management over minting permissions contained in the Echo Protocol system.
With that entry, the attacker was in a position to mint roughly 1,000 eBTC tokens with out depositing any collateral.
These tokens weren’t backed by actual Bitcoin reserves, that means they functioned as artificially created provide contained in the system.
The sudden growth of eBTC provide to roughly $76 million in worth created instant imbalance dangers throughout any built-in lending or buying and selling platforms that accepted the asset as collateral.
As soon as minted, the attacker started routing the property by means of decentralized finance functions.
A portion of the pretend eBTC was deposited into lending markets equivalent to Curvance, the place it was used to borrow wrapped Bitcoin (WBTC).
From there, the borrowed funds have been bridged throughout networks, transformed into ETH, and partially routed by means of privateness instruments, together with Twister Money, in an try to obscure transaction trails.
Blockchain investigators monitoring the motion of funds famous that roughly 955 eBTC remained beneath attacker management, representing the overwhelming majority of the illicitly minted provide.
Solely a small fraction of the stolen worth was efficiently transformed into liquid property through the early levels of the exploit.
ECHO token drops sharply as panic spreads throughout the market
Because the exploit grew to become public, the ECHO token reacted with a speedy sell-off.
The value dropped by over 11% inside a brief interval, reflecting instant market concern over the protocol’s safety and the potential impression of the inflated eBTC provide on the broader ecosystem.

The market reacted to 2 key dangers.
The primary was the potential of additional minting or continued exploitation if entry controls weren’t absolutely secured.
The second was the uncertainty surrounding potential dangerous debt created in lending markets the place the unbacked eBTC had already been used as collateral.
Liquidity circumstances tightened as members diminished publicity to each ECHO and associated property.
The sudden exit of capital intensified draw back strain, accelerating the token’s decline and amplifying volatility throughout related buying and selling pairs.
Echo Protocol halts operations and begins investigation
In response to the breach, Echo Protocol moved to pause cross-chain operations, aiming to restrict additional motion of stolen funds and forestall further exploitation pathways.
The suspension affected bridging and cross-chain performance, which had been utilized by the attacker to maneuver property between networks through the laundering course of.
The incident didn’t have an effect on the underlying Monad blockchain, which continued working usually.
The difficulty was remoted to Echo Protocol’s entry management layer, particularly the privileged permissions tied to minting authority.
Safety researchers assessing the breach have pointed to the admin key compromise because the central failure level.
Reasonably than a flaw in token arithmetic or good contract logic, the assault exploited centralized management privileges that allowed unrestricted issuance of artificial property as soon as the important thing was uncovered.








