Invezz
2026-04-29 15:31:08

Litecoin MWEB exploit resolved, block reorganization corrected

Litecoin recently faced one of its most serious technical incidents tied to the Mimblewimble Extension Blocks (MWEB) feature, after a validation flaw allowed an attacker to generate an inflated peg-out of approximately 85,034 LTC. The issue was traced to a failure in block connection-level verification, where MWEB input metadata did not properly match the underlying UTXO being spent. While the incident briefly shook confidence in the extension layer, it was ultimately contained through coordinated miner response and rapid protocol fixes. How the MWEB exploit unfolded According to a postmortem released by Litecoin , the exploit began in March 2026 at block height 3,073,882, when an attacker successfully exploited the validation gap. By manipulating MWEB input data, the attacker made a small input appear to justify a much larger output during peg-out processing. In reality, the underlying input value was only around 1–2 LTC, but the system incorrectly accepted it as valid backing for more than 85,000 LTC. This was not a standard wallet- or transaction-layer issue. Instead, it originated in how MWEB blocks were validated during chain connection. While the mempool and transaction construction layers functioned correctly, the final consensus-level verification step failed to fully validate the integrity of MWEB metadata against the referenced outputs. Once the abnormal peg-out was detected, miners quickly identified the inconsistency and initiated coordinated action to prevent further propagation. The suspicious outputs were isolated, and a portion of the funds was frozen at the protocol level to prevent further movement across the network. Containment, recovery, and miner coordination Following detection, developers and major mining pools moved into emergency response mode. Mining pools, including F2Pool, played a central role in stabilising the network by aligning on updated validation rules and rejecting malformed MWEB data. This coordination helped prevent the exploit from spreading further across the chain. The attacker later entered negotiations and returned the majority of the exploited funds. Approximately 84,184 LTC was recovered through coordinated transactions, while an 850 LTC bounty was retained as part of the agreement in exchange for cooperation in resolving the incident. Rather than reversing the chain, developers opted for a reconciliation approach. The system effectively neutralised the inflated output by rebalancing MWEB accounting through controlled peg-in mechanisms and freezing invalid outputs. This approach allowed the network to restore consistency without requiring a full rollback. Second incident triggered a 13-block reorganisation A second related incident occurred in April 2026, when attempts to re-exploit the same vulnerability exposed a different weakness in how nodes handled malformed MWEB data. This time, the issue did not result in additional inflation but instead caused instability in node processing. Upgraded nodes experienced processing stalls when encountering mutated MWEB blocks, while some miners continued extending a chain built on outdated validation rules. This divergence led to a temporary 13-block chain reorganisation, with F2Pool mining a significant portion of the affected blocks during the unstable period. The reorganisation was short-lived. Once upgraded nodes gained majority hash power and rejected the invalid history, the network converged back to the correct chain. No permanent ledger corruption remained after reconciliation. Protocol fixes and final resolution Developers released emergency updates under the 0.21.5.x Core series, addressing both the original validation flaw and the secondary block-handling issue. The fixes strengthened MWEB input validation during block connection, improved handling of mutated block states, and reinforced consistency checks across mining and consensus layers. Post-incident analysis confirmed that the exploit did not result in lasting inflation or loss of final-chain integrity. However, it highlighted the sensitivity of extension-block systems like MWEB, where added privacy and complexity introduce new validation risks. With miner coordination restored, patched nodes deployed, and invalid outputs neutralised, the network has returned to stable operation. The post Litecoin MWEB exploit resolved, block reorganization corrected appeared first on Invezz

Crypto Haber Bülteni Al
Feragatnameyi okuyun : Burada sunulan tüm içerikler web sitemiz, köprülü siteler, ilgili uygulamalar, forumlar, bloglar, sosyal medya hesapları ve diğer platformlar (“Site”), sadece üçüncü taraf kaynaklardan temin edilen genel bilgileriniz içindir. İçeriğimizle ilgili olarak, doğruluk ve güncellenmişlik dahil ancak bunlarla sınırlı olmamak üzere, hiçbir şekilde hiçbir garanti vermemekteyiz. Sağladığımız içeriğin hiçbir kısmı, herhangi bir amaç için özel bir güvene yönelik mali tavsiye, hukuki danışmanlık veya başka herhangi bir tavsiye formunu oluşturmaz. İçeriğimize herhangi bir kullanım veya güven, yalnızca kendi risk ve takdir yetkinizdedir. İçeriğinizi incelemeden önce kendi araştırmanızı yürütmeli, incelemeli, analiz etmeli ve doğrulamalısınız. Ticaret büyük kayıplara yol açabilecek yüksek riskli bir faaliyettir, bu nedenle herhangi bir karar vermeden önce mali danışmanınıza danışın. Sitemizde hiçbir içerik bir teklif veya teklif anlamına gelmez