THORChain proposes recovery plan after May 15 exploit, no new RUNE minted
The cross-chain protocol's ADR028 recovery proposal absorbs $10.7 million in losses through Protocol-Owned Liquidity rather than diluting existing token holders.
THORChain lost roughly $10.7 million on May 15 after a rogue node operator exploited vulnerabilities in the protocol’s threshold signature scheme. Now the project has a plan to make things right, and it doesn’t involve printing more tokens.
The recovery proposal, known as ADR028, commits to covering losses through Protocol-Owned Liquidity first, with any remaining shortfall distributed proportionally among synthetic asset holders. No new RUNE will be minted or sold. For existing holders, that’s the detail that matters most.
What happened and how it was stopped
The attacker was a newly churned node operator who had entered the THORChain network just two days before the exploit. That brief window was enough to carry out an attack targeting the GG20 Threshold Signature Scheme, the cryptographic system that governs how vault keys are managed across THORChain’s decentralized infrastructure.
In English: THORChain uses a system where multiple node operators collectively control vault keys, so no single party can access funds alone. The attacker found a way to reconstruct critical vault private keys through vulnerabilities in this system, effectively picking the lock on the protocol’s treasury.
The good news is that THORChain’s automated solvency checker caught the anomaly within minutes. Trading and signing operations were paused, and node operators coordinated to fully freeze the network within approximately two hours. That speed prevented what could have been a significantly larger drain.
No direct losses hit user funds or liquidity provider positions, according to the protocol. The rapid response was enabled by THORChain’s Mimir governance system, which allows node operators to adjust critical parameters without waiting for lengthy governance cycles. Think of it as an emergency brake that actually works.
The recovery plan: ADR028
Here’s how ADR028 is structured. The first line of defense is Protocol-Owned Liquidity, essentially the protocol’s own capital reserves that exist within its liquidity pools. POL absorbs as much of the $10.7 million loss as possible before any other mechanism kicks in.
Whatever POL can’t cover gets distributed proportionally across synthetic asset holders. Synthetic assets on THORChain are derivative representations of assets like Bitcoin or Ethereum that exist within the protocol’s pools. Holders of these synthetics will shoulder a proportional share of any remaining deficit.
The critical commitment in ADR028 is what it explicitly won’t do: mint new RUNE tokens. In the aftermath of a hack, many protocols have turned to inflationary measures to recapitalize, effectively making every existing token worth slightly less to cover the shortfall. THORChain is taking the position that diluting holders is off the table.
This matters because token dilution after exploits has become something of a pattern in DeFi. It’s the easiest lever to pull, but it punishes the people who stuck around. By ruling it out upfront, THORChain is making a governance statement as much as a financial one.
The protocol has also offered a bounty for white-hat hackers willing to help return the stolen funds, a standard but often effective playbook in post-exploit recovery. Additional security patches targeting the GG20 TSS vulnerabilities are being implemented as part of the interim fix released shortly after the incident.
A broader pattern of cross-chain risk
Cross-chain protocols occupy a uniquely dangerous corner of decentralized finance. By design, they bridge assets across different blockchains, which means they must manage keys, signatures, and consensus mechanisms that span multiple networks simultaneously. Each additional chain is another attack surface.
The blockchain space has lost billions to exploits since 2021, and cross-chain bridges have consistently been among the most targeted infrastructure. THORChain itself has dealt with security incidents in previous years, making this latest exploit part of a recurring challenge rather than a one-off event.
Look, the two-hour response time and automated solvency checks are genuinely impressive for a decentralized system. Most traditional financial institutions would struggle to identify and contain a breach that quickly. But the fact that a node operator who joined just 48 hours earlier could reconstruct vault keys raises serious questions about onboarding security and the trust assumptions baked into the churning process.
What this means for investors
The no-dilution commitment in ADR028 is the single most investor-relevant detail. RUNE holders aren’t being asked to absorb the loss through inflation, which preserves the token’s supply dynamics. In a market where protocol treasuries and token economics can change overnight after a hack, that kind of explicit guarantee carries weight.
But confidence isn’t built on promises alone. Investors should watch how effectively THORChain patches the GG20 TSS vulnerabilities and whether the protocol implements stricter requirements for new node operators. A two-day window between joining the network and executing a $10.7 million exploit suggests that the barrier to entry for malicious actors needs significant tightening.
The synthetic asset holders bearing proportional losses is also worth monitoring. If the POL reserves can’t cover the full $10.7 million, the haircut on synthetic positions could affect liquidity and trading activity across THORChain’s pools. Reduced liquidity tends to widen spreads and make the protocol less competitive for cross-chain swaps.
For the broader DeFi market, THORChain’s recovery approach could set a precedent. If ADR028 successfully restores the protocol without dilution and without lasting damage to liquidity depth, it becomes a template other projects can point to. If it falls short, it becomes another data point in the growing case that cross-chain infrastructure needs fundamentally different security architecture than single-chain protocols.
The bounty for fund recovery adds a wildcard. Historically, some exploiters have returned funds in exchange for bounties and immunity from prosecution. Whether the attacker in this case takes that deal, or has already moved the funds through mixers and bridges, will determine how much of that $10.7 million deficit actually needs to be absorbed.
Earn with Nexo