Coinpaper
2026-05-21 05:51:20

MAPO Crashes After Massive Cross-Chain Bridge Exploit

The attacker dumped around one billion MAPO tokens into Uniswap liquidity pools, draining roughly 52 ETH, and still reportedly controls close to a trillion tokens. After the incident, Map Protocol paused its mainnet and began a migration process, while Butter Network paused ButterSwap as investigations into the exploit continue. MAPO Exploit Wipes Out Token Value The crypto sector faced yet another security incident this week after MAPO, the native token of the Map Protocol ecosystem, crashed due to an exploit involving the Butter Network cross-chain bridge. The attack allowed a malicious actor to mint an enormous quantity of MAPO tokens, far exceeding the project’s legitimate circulating supply. MAP Protocol’s price action over the past 24 hours (Source: CoinCodex) According to reports, the attacker managed to mint approximately one quadrillion MAPO tokens through a vulnerability tied to the bridge’s Solidity smart contract layer. The exploit immediately destabilized the token’s value, which sent the price crashing from around $0.003 to almost $0.0001 in only a few hours. Blockchain security firm Blockaid stated that the attacker used a newly created externally-owned account to dump around one billion MAPO tokens into Uniswap liquidity pools, draining approximately 52 ETH, valued at roughly $180,000 at the time. Despite already extracting a lot of liquidity, the attacker reportedly still controls close to a trillion MAPO tokens. This raised concerns that even more decentralized exchanges, liquidity pools, and potentially even centralized exchange listings could be vulnerable if the remaining tokens are moved or sold. The exploit occurred during a particularly difficult month for the DeFi industry. At least 18 protocols reportedly suffered breaches or exploits. Recent victims included THORChain, Transit Finance, Echo Protocol, TrustedVolumes, Verus Protocol’s Ethereum bridge, Ekubo, and RetoSwap. Map Protocol later confirmed that the vulnerability originated from the Solidity contract layer rather than compromised private keys or broken light clients. According to Blockaid’s analysis, the attacker initially submitted a legitimate oracle multisig-signed message before deploying a malicious contract to a targeted address. The attacker then resent a manipulated retry message that appeared valid because it produced an identical hash structure. This ultimately tricked the bridge into authorizing the massive token mint. In response, Map Protocol paused its mainnet operations and announced that it started a migration process while the investigation continues. Butter Network also paused ButterSwap but said that user funds were not directly at risk. The project also stated that a new contract address would soon be announced, alongside a future asset snapshot to support token migration efforts. Any tokens linked to attacker-controlled wallets will reportedly be invalidated and excluded from future conversions.

가장 많이 읽은 뉴스

관련뉴스

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.