The decentralized finance sector is facing renewed scrutiny after a rapid series of high-value exploits drained more than $32 million from multiple protocols within just four days, raising urgent questions about the safety of cross-chain infrastructure and lending systems in 2026.
Between May 15 and May 19, three separate attacks targeted THORChain, the Verus Ethereum Bridge, and Echo Protocol. Each exploit used a different technical approach, but all resulted in significant financial losses and exposed persistent weaknesses in decentralized financial infrastructure.
| Source: X(formerly Twitter) |
The latest series of incidents has intensified concerns across the crypto industry, particularly because of the short time frame in which they occurred.
Within less than a week, attackers successfully extracted millions of dollars from three separate ecosystems, highlighting structural vulnerabilities that continue to exist in cross-chain and decentralized lending platforms.
While each exploit differed technically, they all shared one common outcome: real assets were drained after protocol-level verification systems were bypassed or manipulated.
Industry observers describe this pattern as part of a broader trend in which attackers are increasingly targeting infrastructure layers rather than end-user accounts.
The first major incident occurred on May 15, 2026, when THORChain, a cross-chain liquidity protocol, suffered an exploit that resulted in losses estimated at approximately $10.8 million.
THORChain is designed to enable native asset swaps across different blockchains without the need for wrapped tokens. However, attackers were able to exploit weaknesses in the system’s transaction validation process.
According to blockchain investigators including ZachXBT and security firm PeckShield, the attack affected multiple networks including Bitcoin, Ethereum, BNB Chain, and Base.
A total of 36.75 BTC and additional assets across multiple chains were drained from liquidity pools and moved into attacker-controlled wallets.
Following the exploit, THORChain temporarily suspended trading and signing operations as developers began investigating the breach.
The protocol’s native token, RUNE, experienced a sharp decline of approximately 14% in the immediate aftermath of the incident.
Early analysis suggests the vulnerability may be linked to issues in the GG20 signature scheme, which is used to validate cross-node transactions. However, a full post-mortem has not yet been released.
Just three days later, on May 18, 2026, another major exploit targeted the Verus Ethereum Bridge, a cross-chain infrastructure protocol designed to facilitate asset transfers between separate blockchain networks.
This second attack resulted in the loss of approximately $11.58 million in digital assets, including tBTC, ETH, and USDC.
| Source: Arkham Intelligence |
Security firm Blockaid detected the suspicious activity in real time and flagged the transaction pattern as malicious. Investigators later confirmed that the attacker was able to manipulate the system’s verification process, causing the protocol to release funds from reserves without legitimate backing.
Reports indicate that eight out of fifteen notaries responsible for validating transactions signed a fraudulent state root, allowing the exploit to succeed.
Before executing the attack, the perpetrator reportedly funded their wallet using Tornado Cash and paid minimal transaction fees to initiate the exploit.
After draining the assets, the attacker consolidated holdings into Ethereum before dispersing funds across multiple addresses.
Security experts say the attack highlights a recurring issue in cross-chain infrastructure: reliance on distributed validation systems that can be compromised if a subset of validators is exploited or misled.
The third and most recent exploit occurred on May 19, 2026, when Echo Protocol became the latest victim in the ongoing wave of DeFi attacks.
In this case, attackers exploited a vulnerability within the Curvance lending system integrated into Echo Protocol’s ecosystem.
The attacker reportedly minted 1,000 unbacked eBTC tokens, artificially inflating their value to more than $76 million on paper.
However, rather than attempting to liquidate the full amount, the attacker used a portion of the fabricated assets as collateral within Curvance, borrowing real-world assets including Wrapped Bitcoin and stablecoins.
According to blockchain data, approximately 45 eBTC were deposited as collateral, enabling the attacker to extract around 11.29 WBTC, valued at roughly $866,000.
Additional transactions involved stablecoin movements and Ethereum withdrawals, resulting in further realized losses estimated at over $800,000.
Security analysts stress that while the minted eBTC figure appears extremely large, the actual liquid losses were significantly lower due to liquidity constraints and emergency response actions taken by developers.
Nevertheless, the incident exposed a critical vulnerability in how synthetic assets are validated within decentralized lending systems.
The rapid succession of these three major exploits has prompted speculation about whether attackers are coordinating efforts or simply exploiting widely known vulnerabilities across different protocols.
Security researchers tracking blockchain activity note that all three incidents targeted infrastructure-level weaknesses rather than isolated smart contract bugs.
This includes cross-chain bridges, validator-based verification systems, and lending protocols that rely on external collateral assumptions.
According to aggregated data from security firms such as PeckShield, bridge-related exploits alone accounted for hundreds of millions in losses in early 2026, making them one of the most targeted sectors in decentralized finance.
Cross-chain bridges and interoperability systems are among the most complex components in blockchain ecosystems. They are designed to move assets between networks that do not inherently trust each other.
This creates multiple points of potential failure, particularly in how transactions are verified and approved across independent systems.
Security analysts say attackers are increasingly exploiting these trust assumptions by manipulating validator sets, forging transaction proofs, or targeting weak governance structures within decentralized systems.
The result is a growing number of high-value exploits that bypass traditional smart contract vulnerabilities entirely.
Following the recent wave of attacks, cybersecurity experts are urging users to take additional precautions when interacting with DeFi platforms, especially those involving cross-chain transfers or lending protocols.
Recommended safety measures include:
Experts also emphasize that while decentralized finance offers significant innovation, it continues to carry structural risks that are not present in traditional financial systems.
The cumulative effect of more than $32 million in losses over four days has contributed to increased caution across the crypto market.
Tokens associated with affected protocols experienced downward pressure following the announcements, while broader market sentiment remained cautious amid fears of further exploits.
However, analysts note that the total figure likely underrepresents the broader risk exposure, as additional undisclosed vulnerabilities may still exist across similar infrastructure systems.
The series of exploits targeting THORChain, Verus Ethereum Bridge, and Echo Protocol highlights an ongoing and escalating challenge for decentralized finance platforms.
Rather than isolated incidents, the attacks suggest a systemic vulnerability in cross-chain infrastructure and decentralized verification systems that continues to be exploited by sophisticated attackers.
With over $32 million drained in just four days, the events of May 2026 serve as a stark reminder that DeFi security remains an evolving battlefield.
As the industry continues to expand, experts warn that without stronger verification standards, improved validator security, and more robust cross-chain architecture, similar incidents are likely to continue.
For now, the focus remains on containment, recovery efforts, and reinforcing trust in systems that underpin the future of decentralized finance.
hoka.news – Not Just Crypto News. It’s Crypto Culture.


