$1 Billion Hack Yields $237K: The Flaws of Cross-Chain Bridges
Crypto Watch

$1 Billion Hack Yields $237K: The Flaws of Cross-Chain Bridges

An attacker successfully exploited a vulnerability in a major cross-chain bridge, minting one billion Polkadot tokens on the Ethereum network.

An attacker successfully exploited a vulnerability in a major cross-chain bridge, minting one billion Polkadot tokens on the Ethereum network. The exploit demonstrated a critical failure in cross-chain state proof validation, granting the attacker administrative control over the bridged token contract. Despite the ability to theoretically dump a supply valued at over $1.19 billion, the actual profit extracted was limited to approximately $237,000 worth of Ether. The incident highlights a persist

Subscribe to the channels

Key Points

  • The Anatomy of a Cross-Chain Failure
  • Liquidity: The Unforeseen Cap on Theft
  • Systemic Risks and the Bridge Problem

Overview

An attacker successfully exploited a vulnerability in a major cross-chain bridge, minting one billion Polkadot tokens on the Ethereum network. The exploit demonstrated a critical failure in cross-chain state proof validation, granting the attacker administrative control over the bridged token contract. Despite the ability to theoretically dump a supply valued at over $1.19 billion, the actual profit extracted was limited to approximately $237,000 worth of Ether.

The incident highlights a persistent, structural weakness in the multi-chain landscape: the bridge itself. These mechanisms, designed to facilitate asset movement between disparate blockchains, remain the weakest link in cross-chain architecture. The attack targeted the Hyperbridge Ethereum gateway contract, not Polkadot’s native network or core protocol. The fact that the vulnerability was bypassed through a forged cross-chain message underscores how deeply flawed the validation paths can be when multiple chains interact.

This case is not merely a record of a successful hack; it is a detailed blueprint of systemic risk. It proves that even when an attacker achieves the highest level of control—admin rights to mint unlimited supply—the ultimate success of the exploit is often dictated by market mechanics, specifically the liquidity depth of the destination pool.

The Anatomy of a Cross-Chain Failure
$1 Billion Hack Yields $237K: The Flaws of Cross-Chain Bridges

The Anatomy of a Cross-Chain Failure

The vulnerability lay within the Hyperbridge’s EthereumHost contract, specifically in how it processes and validates incoming cross-chain messages. Bridges are complex state machines, requiring rigorous proof that a transaction executed on Chain A actually occurred on Chain B. The exploit bypassed this necessary validation process.

On-chain analysis revealed that the attacker submitted a forged message via the `dispatchIncoming` function. This message was routed to the `TokenGateway.onAccept` function. The critical failure point was the request receipts check. This mechanism is designed to verify the incoming message against a valid cross-chain state commitment originating from Polkadot. Instead, the attacker managed to submit a message that presented an all-zeros commitment value, effectively circumventing the proof validation required for this specific call path.

Once the gateway processed the message as legitimate, the attacker executed the `changeAdmin` function on the bridged Polkadot token contract. This action transferred administrative control of the token—the ability to manage the supply and distribution—directly to the attacker’s address. With admin control established, the attacker executed a single transaction that minted one billion Polkadot tokens.


Liquidity: The Unforeseen Cap on Theft

The theoretical value of the minted supply was immense, but the actual profit realized was capped by the market structure of the Ethereum DOT pool. The attacker attempted to liquidate the entire supply by routing the tokens through Odos Router V3 into a Uniswap V4 DOT-ETH pool.

This is where the market mechanics worked against the attacker. Liquidity depth refers to the market’s ability to absorb large, sudden orders without significant price slippage. While a $1 billion supply could be minted, the existing depth of the DOT-ETH pool on Ethereum was insufficient to allow the attacker to offload the entire supply at stable prices.

The resulting liquidation was spread across multiple swaps, recorded at slightly different prices, culminating in the extraction of roughly 108.2 ETH. This outcome serves as a crucial lesson: even a perfect exploit that grants unlimited minting power does not guarantee maximum profit. The profitability is constrained by the weakest link in the transaction chain, which, in this instance, was the available capital in the exchange pool.


Systemic Risks and the Bridge Problem

The incident adds to a growing pattern of vulnerabilities across the multi-chain ecosystem. While the exploit did not compromise Polkadot's native DOT or its core network, it exposed the inherent fragility of the intermediary contracts.

Bridges, by their very nature, require high levels of trust and complex state management. They must act as secure custodians of assets moving between systems with different consensus mechanisms and security models. Because they often hold administrative control over token contracts on destination chains, a single validation failure can grant an attacker the ability to mint unlimited, unbacked supply.

The industry has seen dramatic examples of this risk in 2026. Just last month, the Drift Protocol suffered a $270 million drain on Solana, demonstrating that exploits can occur through various vectors—some involving code flaws, others involving social engineering and compromised infrastructure. These events collectively paint a picture of an immature, high-risk sector where the perimeter of security is constantly expanding and remains inadequately defended.