Crypto Exchange Halts Trading After $10M Theft; THORChain: Funds Safe

OpenAI & Leidos: AI to Transform Federal Operations

I was scrolling through market alerts when the first alarm hit: THORChain trading frozen, vaults open, funds moving. You could feel the room shorten—traders, devs and onlookers pinging for answers as the numbers adjusted. In less than an hour, a protocol that calls itself “unstoppable” was asking for breathers.

Traders watched order books blink out before the weekend

The protocol paused trading and signing after security tools flagged unauthorized outbound transactions from an Asgard vault. THORChain reported an initial loss near $10.7 million (€10.0 million), later revised to roughly $11 million (€10.3 million) across at least nine chains. Assets taken included about 36.75 BTC (≈€2.2 million) plus holdings on Ethereum, BNB Chain, Base, Avalanche, Dogecoin, Litecoin, Bitcoin Cash and the XRP Ledger.

I’m telling you this because the sequence matters: automated detection caught abnormal behavior, emergency safeguards kicked in, and validators elected to halt global operations to stop more bleeding. That pause—deliberate, human—was a reminder that “unstoppable” can be a marketing claim, not an operational guarantee.

What happened to THORChain?

Security researchers traced suspicious activity to one of THORChain’s Asgard vaults and zeroed in on the protocol’s threshold signature scheme. The exploit appears to have allowed unauthorized signatures that released funds from the vault, prompting an automated halt to trading, signing, and cross-chain operations while an investigation proceeds.

A hardware-wallet CTO noticed the threat model shifting in public

Charles Guillemet, CTO at Ledger, and figures like Adam Back framed the issue around multi-party computation and its changing risks. Guillemet warned on X that large-language models lower the bar for finding vulnerabilities in complex stacks; Adam Back called interactive MPC fragile and novel for ECDSA.

The practical takeaway: complex distributed signing schemes are attractive for cross-chain liquidity, but they create an attack surface that wasn’t present in simpler custody models. I’ve watched protocols treat online shards like safe drawers—until they leak, like a leaking ship.

How did the exploit occur?

Investigations point to the threshold signature implementation that manages cross-chain liquidity. Because the signing process involves multiple online validators and custom daemons, a successful compromise of enough parties could authorize outbound transfers without the broader network’s consent.

Users were told their funds were untouched while teams triaged

THORChain stated that end user funds were not affected by the incident. You’ll hear that line a lot after a breach, and sometimes it’s true: custodial and non-custodial distinctions matter. In this case, protocol maintainers claim the stolen assets came from operational vaults, not retail accounts.

Were user funds safe?

The project maintains that user funds remained separate and were not drained. But public confidence is a separate currency: when validators agree to pause trading and signing, that action signals a problem severe enough to interrupt normal service—something that shakes users’ trust whether their wallets were touched or not.

Across the industry, centralized levers keep reappearing

Last year, multiple chains froze or coordinated off-chain fixes after large exploits; Balancer’s roughly $120 million (€113 million) incident forced freeze-and-recover discussions, and Arbitrum’s security council moved hacked funds of about $71 million (€67 million) into a multisig controlled off-chain. Stablecoin issuers have also shown centralized power: Tether recently seized $344 million (€323 million) linked to sanctioned actors, and Circle raised $222 million (€209 million) to develop its own chain.

Those episodes taught me that many non-Bitcoin networks behave like firms when crisis hits—governed by councils, emergency keys and human coordination. That reality undercuts the pitch of decentralization and pushes some investors back toward Bitcoin, a trend noted by analysts at JPMorgan.

Tools and players you should watch right now

Ledger, Blockstream and security leads like Adam Back are shaping the public technical narrative. Wallet brands such as Unstoppable Wallet—ironically named—are now part of the story because they sit at the interface between users and these complex backend systems. If you follow the smart-money flow, you’ll see attention shift toward audit tooling, hardened MPC libraries and simpler custody primitives.

I’d be watching audits from established firms, on-chain monitoring tools, and how quickly THORChain’s validator set and signing software get patched or rolled back. The network pause buys time for forensics, but it also gives attackers windows to sell, mix or otherwise obfuscate proceeds.

What this means for you and the market

Traders and protocol users face three realities: risk is asymmetric, public narratives shape market confidence, and technology choices create new social trade-offs. The industry has a pattern—when complex primitives fail, human governance wakes up and sorts the mess. That pattern is repeating itself, and it asks you whether your exposure to non-Bitcoin networks matches your tolerance for governance-driven interruptions.

I’ve reported on many of these moments, and I’ll keep watching as auditors, devs and investigators trace the exploit chain. The question now is not only whether THORChain can harden its MPC stack, but whether the wider market will accept that “unstoppable” sometimes means “pause to fix”—so which side of the ledger are you on?