Protect Your Project Today
Strengthen your project with the largest web3 security provider.
A CertiK security expert will review your request and follow up shortly.

Resolv Protocol Incident Analysis

Reports ·Incident Analysis ·
Resolv Protocol Incident Analysis

Incident Summary

On 22 March 2026, the Revolv protocol was exploited, resulting in a loss of ~$26.8M due to a compromise of the project's cloud infrastructure which gave access to Resolv’s AWS Key Management Service (KMS).

Resolv uses a hybrid system where users deposit collateral (like USDC) and an off-chain service verifies the deposit before authorizing the minting of USR. The attacker made small legitimate deposits (approx. 100,000100,000–200,000 in USDC). They then used a compromised 'SERVICE ROLE' to call the completeSwap() function, manually inflating the output of USR, gaining 80M USR over two transactions.

The over-minting caused a crash of the USR price from 1to1 to0.03, which led to other platforms pausing their pools like Lista DAO or Re7 Labs.

Background

To keep their keys secure, Resolv implemented Amazon's KMS (Key Management Service), a cloud-based system for managing cryptographic keys at scale.

Why use KMS for crypto keys:

  1. Security at scale - If you manage wallets for thousands of users (like Coinbase, Binance), you can't use hardware wallets for each one. KMS gives HSM-level security programmatically.
  2. Access control - Only specific services/people can request signatures. You can enforce multi-approval workflows using IAM policies.
  3. Compliance & audit - Every time a private key is used to sign a transaction, it's logged. Critical for regulated crypto businesses.
  4. Disaster recovery - Keys are backed up automatically across AWS regions. Lose your Ledger? Your crypto is gone. KMS keys can be recovered.
  5. Automation - Your application can sign transactions automatically (for withdrawals, rebalancing, smart contract interactions) without manual hardware wallet approvals.

Within KMS was Resolv’s signing key which gave the attacker access to the ‘SERVICE ROLE’ that enabled the attacker to:

  • Sign any minting amount they wanted, as the contract enforced a minimum USR output but had no maximum output.
  • Create signatures that the smart contract would accept as legitimate.
  • Mint 80 million USR tokens against deposits of only 100,000100,000-200,000 by using the compromised access to call completeSwap().

Attack Flow

Addresses:

Exploiter:

  • 0x04A288a7789DD6Ade935361a4fB1Ec5db513caEd
  • 0x8ED8cF0C1c531C1b20848E78f1CB32fa5B99b81C
  • 0x6Db6006c38468CDc0fD7d1c251018b1B696232Ed
  • 0xb945eC1be1f42777F3AA7D683562800B4CDD3890
  • 0x9FeeEAEc113E6d2DCD5ac997d5358eee41836e5f

Victim:

  • USR Counter contract: 0xa27a69Ae180e202fDe5D38189a3F24Fe24E55861
  • ‘SERVICE_ROLE’ EOA: 0x15CAd41e6BdCaDc7121ce65080489C92CF6de398

Step by Step Event Flow:

Mar-22-2026 01:50:59 - Txn

  1. First the attacker created a swap request on Resolv: USR Counter with 100K USDC. resolv1

02:21:35 - Txn 2. From the compromised ‘SERVICE ROLE’, call Resolv USR Counter’s completeSwap() function to resolve the request (id=30) and mint 50M Resolv USD, minus 50K fee, to the exploit address. resolv2 3. The above tactic was successfully executed again ~ 2 hours later (create request, resolve request) to mint an additional 30M Resolv USD. resolv3

Vulnerability

The root cause of this incident has been confirmed as a compromise of Resolv’s AWS Key Management Service (KMS) where the attacker gained access to a private key for wallet 0x15CAd41e6BdCaDc7121ce65080489C92CF6de398. This wallet had previously been assigned the ‘SERVICE ROLE’’ which was granted on Dec-26-2024 (txn). resolv4

Fund Flow

0x04A288a7789DD6Ade935361a4fB1Ec5db513caEd

  • Received 80M USR from the exploit. resolv5

As of 24 March:

0x04A288a7789DD6Ade935361a4fB1Ec5db513caEd

  • Holds 20,420,750.43 wstUSR ($1,263,554.35).

0x8ed8cf0c1c531c1b20848e78f1cb32fa5b99b81c

  • Holds 11,408.85 ETH ($24,783,759.96)

0x9FeeEAEc113E6d2DCD5ac997d5358eee41836e5f

  • Holds 12,000,000 wstUSR (742,513)and25.93ETH(742,513) and 25.93 ETH (56,465.26).

To keep up to date on the latest incident alerts and statistics, follow @certikalert on X, or read our latest analysis on certik.com.

Related Blogs

Movie Token Incident Analysis

Movie Token Incident Analysis

On 10 March 2026, the Movie Token (MT) contract was exploited for approximately $242,000 due to a critical flaw in its 'sell' logic. The vulnerability stemmed from a double-counting error: when a user sold MT tokens, the contract simultaneously transferred them to the liquidity pair for the swap and added that same balance to a pendingBurnAmount variable. When distributeDailyRewards() subsequently burned those pending tokens, it created an artificial supply shock, inflating the MT price and allowing the attacker to drain value from the pool.

SOF/LAXO Incident Analysis

SOF/LAXO Incident Analysis

In February 2026 two separate exploits occurred on the BNB Smart Chain (BSC), affecting SOF and LAXO tokens, leveraging the same class of vulnerability: a flawed token burn mechanism that allowed price manipulation within a single transaction.

Gyroscope Incident Analysis

Gyroscope Incident Analysis

On 30 January 2026, Gyroscope announced via their X account that they had paused liquidity pools due to an issue with their cross-chain contract. The issue led to losses of 6M Gyro Dollar (GYD) tokens with approximately $807k of liquidity extracted by the attacker.