Invezz
2026-04-29 15:31:08

Litecoin MWEB exploit resolved, block reorganization corrected

Litecoin recently faced one of its most serious technical incidents tied to the Mimblewimble Extension Blocks (MWEB) feature, after a validation flaw allowed an attacker to generate an inflated peg-out of approximately 85,034 LTC. The issue was traced to a failure in block connection-level verification, where MWEB input metadata did not properly match the underlying UTXO being spent. While the incident briefly shook confidence in the extension layer, it was ultimately contained through coordinated miner response and rapid protocol fixes. How the MWEB exploit unfolded According to a postmortem released by Litecoin , the exploit began in March 2026 at block height 3,073,882, when an attacker successfully exploited the validation gap. By manipulating MWEB input data, the attacker made a small input appear to justify a much larger output during peg-out processing. In reality, the underlying input value was only around 1–2 LTC, but the system incorrectly accepted it as valid backing for more than 85,000 LTC. This was not a standard wallet- or transaction-layer issue. Instead, it originated in how MWEB blocks were validated during chain connection. While the mempool and transaction construction layers functioned correctly, the final consensus-level verification step failed to fully validate the integrity of MWEB metadata against the referenced outputs. Once the abnormal peg-out was detected, miners quickly identified the inconsistency and initiated coordinated action to prevent further propagation. The suspicious outputs were isolated, and a portion of the funds was frozen at the protocol level to prevent further movement across the network. Containment, recovery, and miner coordination Following detection, developers and major mining pools moved into emergency response mode. Mining pools, including F2Pool, played a central role in stabilising the network by aligning on updated validation rules and rejecting malformed MWEB data. This coordination helped prevent the exploit from spreading further across the chain. The attacker later entered negotiations and returned the majority of the exploited funds. Approximately 84,184 LTC was recovered through coordinated transactions, while an 850 LTC bounty was retained as part of the agreement in exchange for cooperation in resolving the incident. Rather than reversing the chain, developers opted for a reconciliation approach. The system effectively neutralised the inflated output by rebalancing MWEB accounting through controlled peg-in mechanisms and freezing invalid outputs. This approach allowed the network to restore consistency without requiring a full rollback. Second incident triggered a 13-block reorganisation A second related incident occurred in April 2026, when attempts to re-exploit the same vulnerability exposed a different weakness in how nodes handled malformed MWEB data. This time, the issue did not result in additional inflation but instead caused instability in node processing. Upgraded nodes experienced processing stalls when encountering mutated MWEB blocks, while some miners continued extending a chain built on outdated validation rules. This divergence led to a temporary 13-block chain reorganisation, with F2Pool mining a significant portion of the affected blocks during the unstable period. The reorganisation was short-lived. Once upgraded nodes gained majority hash power and rejected the invalid history, the network converged back to the correct chain. No permanent ledger corruption remained after reconciliation. Protocol fixes and final resolution Developers released emergency updates under the 0.21.5.x Core series, addressing both the original validation flaw and the secondary block-handling issue. The fixes strengthened MWEB input validation during block connection, improved handling of mutated block states, and reinforced consistency checks across mining and consensus layers. Post-incident analysis confirmed that the exploit did not result in lasting inflation or loss of final-chain integrity. However, it highlighted the sensitivity of extension-block systems like MWEB, where added privacy and complexity introduce new validation risks. With miner coordination restored, patched nodes deployed, and invalid outputs neutralised, the network has returned to stable operation. The post Litecoin MWEB exploit resolved, block reorganization corrected appeared first on Invezz

가장 많이 읽은 뉴스

관련뉴스

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.