Skip to content
Est. MMXXVIVol. VI · № 273RSS
Blockchain Breaches

An archive of cryptocurrency security incidents — hacks, exploits, bridge failures and rug pulls, documented with on-chain evidence.

Dossier № 047Bridge Exploit

THORChain Bifrost Twin Exploit

$13M+ drained from THORChain across two attacks one week apart, both exploiting fake-deposit flaws in the Bifrost Ethereum bridge weeks into Chaosnet.

Date
Victim
THORChain
Status
Partially Recovered

In July 2021, THORChain — the cross-chain liquidity protocol then operating in its "Chaosnet" launch phase — was exploited twice in one week for a combined loss of approximately $13 million. Both incidents exploited the same class of vulnerability in its Bifrost Ethereum bridge module.

What happened

THORChain's Bifrost module was responsible for observing deposits on external chains (ETH, BTC, BNB, etc.) and crediting the depositor on THORChain. The module contained an override loop intended for vault-transfer migration scenarios — never to be invoked under normal user-facing conditions.

Attack 1 — July 16 (~$5M)

The attacker wrapped THORChain's Ethereum router contract with their own contract, used the override loop to manipulate the msg.value reported to Bifrost, and triggered the module to register a 200-ETH deposit when zero ETH had actually been sent. They then withdrew the synthetic credit as real ETH from THORChain's pools.

The initial loss estimates ran as high as $24M (13,000 ETH) before being progressively revised downward to roughly $4.9M after on-chain accounting reconstructed the actual extracted value.

Attack 2 — July 23 (~$8M)

A separate attacker — likely an independent operator who had reverse-engineered the first exploit — used a different variant of the same fake-deposit pattern on Bifrost. This time the protocol caught the exploit faster and limited the loss to roughly $8M before pausing.

Aftermath

  • THORChain paused Chaosnet and shipped Bifrost patches.
  • The team offered both attackers 10% white-hat bounties for return of funds. The first attacker accepted and returned the bulk of the loss; the second returned a partial amount.
  • The protocol revised its trading caps, slowed its Chaosnet rollout, and emerged in 2022 as a meaningfully more conservative system.

Why it matters

THORChain's twin July incidents reinforced a recurring lesson about cross-chain message observation: a bridge's view of external-chain state is only as trustworthy as the code that constructs that view. Any function in the observer module that can be manipulated by a depositor — even debug paths, override loops, or migration helpers — can produce fake credits that the rest of the protocol treats as real funds. The same pattern played out at much larger scale in Nomad (2022) and Qubit Finance (2022).

THORChain is also one of a small set of mid-size protocols where both attackers returned a substantial portion of the loss — a function of the protocol's small, identifiable team, active community presence, and clear on-chain visibility of every laundering attempt.

Sources & on-chain evidence

  1. [01]halborn.comhttps://www.halborn.com/blog/post/explained-the-thorchain-hack-july-2021
  2. [02]slowmist.medium.comhttps://slowmist.medium.com/slowmist-analysis-of-three-consecutive-attacks-on-thorchain-6223f1c691be
  3. [03]coindesk.comhttps://www.coindesk.com/markets/2021/07/23/blockchain-protocol-thorchain-suffers-8m-hack

Related filings