Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

Attacker mints $1 billion Polkadot tokens on Ethereum, ends up stealing just $250,000

CN
coindesk
Follow
5 hours ago
AI summarizes in 5 seconds.


What to know : An attacker exploited a vulnerability in Hyperbridge's Ethereum gateway contract to mint 1 billion bridged Polkadot tokens and dump them for about $237,000 in ether. The exploit, which did not affect Polkadot's core network or native DOT, abused a flawed cross-chain message validation path to seize admin control of the bridged token contract. The attacker’s profit was limited by shallow liquidity in the Ethereum DOT pool, but security firms warn that similar bridge flaws on deeper pools or higher-value assets could lead to far larger losses.

Crypto hacks are nothing new, but cases where attackers take big risks and walk away with peanuts aren't common. That rare scenario played out on Sunday.

An attacker exploited a vulnerability in Hyperbridge's cross-chain gateway that connects different blockchains, minting 1 billion Polkadot tokens ($1.19 billion) on Ethereum and dumping them for approximately $237,000 worth of ether.

The exploit adds to a growing list of bridge vulnerabilities in 2026. Last month saw a $270 million Drift Protocol drain on Solana, while a social engineering attack, rather than a code exploit, similarly involved compromised infrastructure.

The Sunday exploit targeted the bridge contract, not Polkadot's core network. Polkadot's native token DOT was unaffected. The vulnerability sat in how Hyperbridge's EthereumHost contract validates incoming cross-chain messages before passing them to the TokenGateway.

Bridges, which help move coins from one blockchain to another, remain the weakest link in cross-chain architecture because they hold admin-level control over token contracts on destination chains, meaning a single validation failure can grant an attacker the ability to mint unlimited supply.

Here's how attack unfolded

On-chain traces show that the attacker submitted a forged message via dispatchIncoming, which was routed to TokenGateway.onAccept.

The request receipts check, which should have verified the message against a valid cross-chain state commitment from Polkadot, stored an all-zeros commitment value, suggesting the proof validation was either absent or circumventable for this specific call path. The gateway processed the message as legitimate.

The accepted message executed changeAdmin on the bridged Polkadot token contract, transferring admin rights to the attacker's address. With admin control, the attacker minted 1 billion tokens in a single transaction and routed them through Odos Router V3 into a Uniswap V4 DOT-ETH pool, extracting roughly 108.2 ETH across what appears to be multiple swaps at slightly different prices.

Liquidity worked against the attacker

Weak liquidity/depth, or the market's ability to absorb large orders at stable prices, is usually a major issue for whales. But, in this case, it worked against the attacker, capping its profit.

The bridged DOT pool on Ethereum held limited depth, meaning 1 billion tokens overwhelmed the available liquidity and the attacker received a fraction of a cent per token.

On a deeper pool or a higher-value bridged asset, the same vulnerability would have produced significantly larger losses. DOT trades just under $1.20 as of Asian morning hours on Monday.

CertiK flagged the exploit, confirming the attack vector was the Hyperbridge gateway contract and that the attacker profited approximately $237,000 from minting and selling the bridged tokens.

Hyperbridge has not publicly commented on the exploit or disclosed whether other bridged token contracts using the same gateway are vulnerable to the same forged-message attack vector.

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

星球发贴瓜分10万U
广告
|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by coindesk

14 minutes ago
WLFI mints $25 million in fresh USD1 and burns $3 million, days after repayment claim
35 minutes ago
Michael Saylor\\\'s Strategy added 13,927 bitcoin for $1 billion
53 minutes ago
Bank of Korea calls for stock-style circuit breakers on BTC exchanges
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatarcoindesk
14 minutes ago
WLFI mints $25 million in fresh USD1 and burns $3 million, days after repayment claim
avatar
avatarbitcoin.com
33 minutes ago
Strategy Buys 13,927 Bitcoin for $1 Billion, Total Holdings Hit 780,897 BTC
avatar
avatarcoindesk
35 minutes ago
Michael Saylor\\\'s Strategy added 13,927 bitcoin for $1 billion
avatar
avatarcoindesk
53 minutes ago
Bank of Korea calls for stock-style circuit breakers on BTC exchanges
avatar
avatarcoindesk
1 hour ago
AI agents are set to power crypto payments, but a hidden flaw could expose wallets
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink