Holders of assets on the Verus-Ethereum bridge
Between May 17 and May 18, 2026, an attacker successfully drained approximately $11.58 million from the Verus-Ethereum Bridge, a protocol designed to facilitate cross-chain asset transfers. The exploit was not the result of a private key compromise or a cryptographic failure, but rather a fundamental logical flaw in the bridge's validation mechanism. The attacker crafted a transaction on the Verus chain with no economic value, obtained valid cryptographic signatures from the bridge's notaries, and presented this proof to the Ethereum smart contract. The contract verified the signatures but failed to validate the underlying value of the source transaction, leading it to release 103.6 tBTC, 1,625 ETH, and 147,000 USDC from its reserves. The stolen funds were quickly consolidated and swapped for 5,402.4 ETH. This incident serves as a stark reminder that in the DeFi space, economic validation is as critical as cryptographic validation.
The attack was first detected by blockchain security firm Blockaid and later confirmed by PeckShield. The attacker's wallet was initially funded with 1 ETH from the privacy mixer Tornado Cash, indicating a deliberate and planned operation. The core of the attack was a logic bomb within the bridge's design.
The attack chain was as follows:
The root cause was a failure in the smart contract's business logic. While it correctly implemented T1573.002 - Asymmetric Cryptography to verify signatures, it failed to perform a basic economic sanity check. The bridge operated on the assumption that a cryptographically valid proof from the notaries implied an economically valid underlying transaction. The attacker exploited this gap between cryptographic truth and economic reality.
Security analysts at Blockaid stated that the entire exploit could have been prevented with a few additional lines of Solidity code. A simple check to ensure that the value of the assets being claimed on the Ethereum side was equal to the value of the assets locked on the Verus side would have thwarted the attack.
// Example of a missing check (conceptual)
require(sourceTransaction.value == requestedPayout.value, "Payout value must match source value");
This type of logical flaw is reminiscent of previous major bridge hacks like the Wormhole and Nomad exploits, which also stemmed from faulty validation logic rather than broken cryptography.
The immediate impact is a direct financial loss of $11.58 million for the Verus protocol and its liquidity providers. This has severe consequences:
0x65Cb…C25F9Detecting this type of exploit requires on-chain monitoring with a focus on economic validation.
Preventing similar attacks requires a shift towards more robust smart contract development and auditing practices.
Implement strict validation rules within the smart contract logic to ensure economic invariants are maintained, such as matching source and destination values.
Provide developers with secure coding guidelines that specifically address business logic flaws and economic exploits common in DeFi applications.
Attacker begins exploiting the logical flaw in the Verus-Ethereum bridge.
The total amount drained from the bridge reaches approximately $11.58 million, and the incident is publicly reported by security firms.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.