Resolv USR Stablecoin Cloud-KMS Drain
Resolv Labs lost $25M after attackers compromised its AWS KMS keys; a $100K USDC deposit minted 50M USR and depegged the stablecoin 74% in 17 minutes.
- Date
- Victim
- Resolv Labs
- Chain(s)
- Status
- Funds Stolen
On March 22, 2026 at 02:21 UTC, attackers compromised Resolv Labs' AWS Key Management Service (KMS) environment and used the protocol's own privileged signing key to mint 80 million unbacked USR stablecoins from a starting position of $100,000 USDC. The USR price crashed from $1.00 to $0.025 in 17 minutes before partially recovering. Total realised loss: approximately $25 million in ETH extracted from the USR Counter contract.
What happened
USR was Resolv's dollar-pegged stablecoin, backed by a delta-neutral hedging strategy using ETH and BTC. Users could mint USR by depositing collateral; redemption mechanics were governed by smart contracts that interacted with both on-chain collateral and off-chain hedge positions.
The minting authority for USR was gated behind a privileged signing key stored in AWS KMS — Amazon's managed service for cryptographic key storage. The standard AWS KMS deployment is meaningfully secure; the keys themselves cannot be exported from the service. Operations are performed by sending requests to the KMS API, authenticated by AWS IAM credentials.
The attacker's path:
- Compromised Resolv's AWS cloud environment — specific vector was not publicly detailed but consistent with credential theft, vulnerable cloud-infra misconfiguration, or compromised IAM permissions.
- With access to the AWS environment, gained ability to invoke the KMS-stored signing key through the normal API path.
- Submitted minting authorisations for USR against arbitrary collateral inputs.
- Deposited 100,000 USDC into Resolv's USR Counter contract.
- The contract, accepting the KMS-signed minting authorisation, issued 50,000,000 USR to the attacker — 500× the legitimate ratio.
- Repeated the operation until ~80M USR had been minted.
- Swapped the freshly-minted USR for ETH via Curve and other DEXs before the market priced in the dilution.
Net extraction: ~$25M in ETH before USR's depeg made further extraction unprofitable.
Aftermath
- USR crashed from $1.00 to $0.025 within 17 minutes of the first malicious mint. It recovered partially to ~$0.85 but has not restored its peg as of public reporting; $0.27 by the following Monday.
- Resolv Labs published a post-mortem identifying the AWS KMS compromise as the root cause and acknowledging structural design failures including:
- Single-key controlled privileged minting authority.
- No oracle or amount checks on individual mint operations.
- No maximum mint limits to bound per-transaction or per-block damage.
- Recovery and protocol-restart plans were announced; details continued evolving through April 2026.
Why it matters
The Resolv incident is one of the cleanest cases for why cloud-managed key services do not eliminate operational-security risk — they merely shift it from "the private key file on disk" to "the cloud environment that can invoke the key." The attacker did not exfiltrate the KMS-stored key (they couldn't); they didn't need to. The ability to ask the KMS to sign a payload, on the protocol's behalf, was the entire compromise.
The structural lessons, particularly relevant to 2026 stablecoin and DeFi infrastructure:
-
Cloud KMS is necessary but not sufficient for high-value signing operations. The IAM permissions, network ACLs, and operational controls around the KMS environment are part of the trust boundary. A KMS environment with broad IAM permissions and weak operational monitoring is structurally equivalent to a hot-wallet key.
-
Minting paths require explicit invariants beyond signature verification. Resolv's contracts trusted the signed authorisation completely — no per-block mint limits, no collateral-ratio checks, no oracle anchoring. The contract did exactly what the (compromised) signing key told it to do.
-
Single-key designs for stablecoin issuance are unsafe at scale, regardless of how the key is protected. The mitigations — multi-sig with timelocks, on-chain rate limits, automatic pause on anomaly — exist; their absence in Resolv's design is the underlying cause.
The Resolv incident joins Bybit, Drift Protocol, and others in the 2025-2026 wave of incidents where the protocol's contracts were technically working correctly but the off-chain infrastructure controlling them had been compromised. The pattern is now sufficiently dominant that "smart contract audit" alone is increasingly recognised as covering a shrinking fraction of the actual attack surface.
Sources & on-chain evidence
- [01]coindesk.comhttps://www.coindesk.com/markets/2026/03/23/resolv-stablecoin-drops-70-after-usd80-million-exploit-after-attacker-mints-usr
- [02]theblock.cohttps://www.theblock.co/post/394582/resolvs-usr-stablecoin-depegs-after-attacker-mints-80-million-unbacked-tokens-extracts-roughly-25-million
- [03]decrypt.cohttps://decrypt.co/361984/resolv-labs-stablecoin-depegs-plunges-74-after-25m-exploit