Nexo Earn with Nexo
Berachain validators halt network for emergency hard fork to fix Balancer V2-related exploits

Berachain validators halt network for emergency hard fork to fix Balancer V2-related exploits

Immediate action aims to secure user funds and restore stability after vulnerabilities impact key decentralized protocols on Berachain.

Berachain validators today halted the network for an emergency hard fork to address Balancer V2 exploits affecting the blockchain’s ecosystem.

The halt specifically targets vulnerabilities in Balancer V2, a decentralized protocol facing recent exploit risks within integrated ecosystems. BEX, a Berachain-native exchange platform, was among the components affected by the protocol vulnerabilities.

Berachain has paused honey minting and related pools to mitigate potential damage from the Balancer exploit. The foundation emphasized ongoing monitoring of exchange features as part of the ecosystem protection measures during the security response.

Disclosure: This article was edited by Vivian Nguyen. For more information on how we create and review content, see our Editorial Policy.

Berachain validators halt network for emergency hard fork to fix Balancer V2-related exploits

Berachain validators halt network for emergency hard fork to fix Balancer V2-related exploits

Immediate action aims to secure user funds and restore stability after vulnerabilities impact key decentralized protocols on Berachain.

Berachain validators today halted the network for an emergency hard fork to address Balancer V2 exploits affecting the blockchain’s ecosystem.

The halt specifically targets vulnerabilities in Balancer V2, a decentralized protocol facing recent exploit risks within integrated ecosystems. BEX, a Berachain-native exchange platform, was among the components affected by the protocol vulnerabilities.

Berachain has paused honey minting and related pools to mitigate potential damage from the Balancer exploit. The foundation emphasized ongoing monitoring of exchange features as part of the ecosystem protection measures during the security response.

Disclosure: This article was edited by Vivian Nguyen. For more information on how we create and review content, see our Editorial Policy.