🛠 HOW DID THIS HAPPEN? (TECHNICAL MOMENT)
The hacker didn't just 'hack the code'. He exploited a vulnerability in the USR stablecoin minting system.
Deposit of a couple of hundred thousand USDC.
Exploit of the issuance mechanism that allowed printing 80 million unsecured USR.
Quick exchange through liquidity pools (Curve/Uniswap) for ETH, while the price of USR did not crash by 80%.
🚧 PROSPECTS: WHY IS THE MONEY STUCK?
As of now, the hacker has three paths, and all of them are 'crooked':
'Dirty' mixer (Tornado Cash & Co):
Problem: In 2026, analytical systems (Chainalysis/Arkham) mark such funds instantly. Even after the mixer, any attempt to withdraw this money to an exchange (CEX) will result in automatic account blocking.
Result: Money can be transferred between wallets indefinitely, but it cannot be converted into real cash without the risk of arrest.
Chain-Hopping:
The hacker has already started to break down transactions through Base and Arbitrum. This is an attempt to 'cover their tracks' through bridges.
Problem: Modern bridges in 2026 have built-in AML filters. Large sums 'get stuck' at the protocol verification level.
White Hat Deal (The 'White Hacker' path):
The Resolv protocol has already offered a 10% bounty ($2.5 million) for the return of the remaining funds. This is the only legal way for the hacker to obtain 'clean' money that can be legalized.
Status: So far, there has been no response, but such negotiations usually last 48–72 hours.
📉 MARKET IMPACT:
These 11,409 ETH are 'dead weight'. They do not participate in trading but create psychological pressure. Once the hacker moves towards a large sale, the arbitrage bots on DEX Screener will react instantly, which may cause a local drop of 2–3%.


