Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

Litecoin says its 13-block reorg was not a 'zero-day, but GitHub commit history shows otherwise

CN
coindesk
Follow
20 hours ago
AI summarizes in 5 seconds.


What to know : Attackers exploited a previously patched but not fully deployed vulnerability in Litecoin’s Mimblewimble Extension Block protocol, triggering a 13-block chain reorganization that rewound about 32 minutes of activity. Public GitHub commits show the core consensus bug was privately fixed weeks before the exploit, creating a window in which some mining pools ran updated code while others remained vulnerable, a gap researchers say the attackers appeared to target. The Litecoin network ultimately reorganized back to the valid chain once denial-of-service attacks on patched miners ceased, but the foundation has not yet explained the patch timeline or disclosed how much LTC was affected during the invalid block window.

A 13-block chain reorganization on LTC$56.29 late Friday and Saturday rewound roughly 32 minutes of network activity after attackers used a vulnerability in its Mimblewimble Extension Block (MWEB) protocol.

The bug had enabled a denial-of-service attack against major mining pools, allowing the invalid MWEB transactions to slip through nodes that had not updated, before the network's longest valid chain corrected them.

The Foundation said in Asian morning hours on Sunday the bug was fully patched and the network is operating normally.

However, prominent researchers say the litecoin-project GitHub repository tells a different story. Security researcher bbsz, who works with the SEAL911 emergency response group for crypto exploits, posted the patch timeline pulled from the public commit log.

The consensus vulnerability that allowed the invalid MWEB peg-out was privately patched between March 19 and March 26, roughly four weeks before the attack. A separate denial-of-service vulnerability was patched on the morning of April 25.

Both fixes were rolled into release 0.21.5.4 the same afternoon, after the attack had already begun.

"The post-mortem says one zero-day caused a DoS that let an invalid MWEB transaction slip through," bbsz wrote. "The git log tells a slightly different story."

A zero-day refers to a vulnerability unknown to defenders at the time of an attack.

Litecoin's commit history shows the consensus vulnerability was known and patched privately a month before the exploit, but the fix had not been broadcast publicly or required to all mining pools.

That created a window where some miners ran the patched code while others ran the still-vulnerable version, and the attackers appear to have known which was which.

Alex Shevchenko, CTO of NEAR Foundation's Aurora project, raised parallel concerns in a thread.

Blockchain data showed the attacker pre-funded a wallet 38 hours before the exploit through a Binance withdrawal, with the destination address already configured to swap LTC into ETH on a decentralized exchange.

The denial-of-service attack and the MWEB bug were separate components, Shevchenko argued, with the DoS designed to take patched mining nodes offline so the unpatched ones would form the chain that included the invalid transactions.

The fact that the network automatically handled the 13-block reorganization once the DoS stopped suggests enough hashrate was running updated code to eventually overpower the attack, but only after the unpatched fork had run for 32 minutes.

A hit on Litecoin shows how attacks on various networks differ in how code maintainers and developers react to exploits. Newer chains with smaller, more centralized validator sets coordinate upgrades through chat groups and can push patches network-wide in hours.

Older proof-of-work networks like Litecoin and bitcoin rely on independent mining pools choosing when to upgrade, which works for non-urgent changes but creates a window of vulnerability when a security patch needs to reach everyone before an attacker exploits the gap.

The Litecoin Foundation has not publicly addressed the GitHub timeline as of Sunday morning.

The amount of LTC pegged out during the invalid block window and the value of any swaps completed before the reorganization reversed them have not been disclosed.

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by coindesk

10 hours ago
Running out of time on Clarity: State of Crypto
12 hours ago
Aave raises nearly 80% of the $200 million it needs to cover bad debt left by Kelp DAO exploit
12 hours ago
Why DeFi isn\\\'t dead despite massive exploits and $13 billion investor exodus
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatarbitcoin.com
8 minutes ago
This Week in Crypto Law (Apr. 19, 2026)
avatar
avatarbitcoin.com
1 hour ago
Chainalysis: EU’s New Sanctions on Russia Mark ‘a New Era’ of Crypto Enforcement
avatar
avatarbitcoin.com
3 hours ago
Coinbase Brings USDC Payouts to Nium’s Network Across 190+ Countries
avatar
avatarbitcoin.com
4 hours ago
Great Time to Buy Crypto May Follow 50% Index Drop, Bloomberg Strategist Says
avatar
avatarbitcoin.com
5 hours ago
DeFi United Secures $160M as Industry Moves to Cover Aave Bad Debt Crisis
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink