Verus–Ethereum bridge exploit still active, $11.6M drained across tBTC, ETH, and USDC

An active exploit on the Verus–Ethereum bridge has siphoned $11.6M, including 103.6 tBTC, 1,625 ETH, and 147,000 USDC. Here’s what the asset mix signals and how bridges can curb damage.

Bitcoin
Cryptocurrency
Regulations
Economy
Because Bitcoin
Because Bitcoin

Because Bitcoin

May 18, 2026

An attack on the Verus–Ethereum bridge remains in progress, with approximately $11.6 million already siphoned. Security firm Blockaid flagged the incident as ongoing, while on-chain monitors at PeckShield identified funds moving out in the form of 103.6 tBTC, 1,625 ETH, and 147,000 USDC. That asset mix matters because it reveals how sophisticated actors pick liquidity that’s fast to off-ramp and hard to claw back.

The detail to focus on is composable liquidity selection. Attackers didn’t just seize whatever was easiest; they prioritized three rails that behave very differently under stress. tBTC is a decentralized, threshold-signature wrapped bitcoin widely used in DeFi; once tBTC is dispersed across DEX pools or swapped into other assets, coordinated recovery is difficult because there’s no centralized freeze lever. ETH, by contrast, is the base asset of the settlement layer—deep liquidity makes it trivial to route, split, and launder quickly. USDC is the outlier: it’s freeze-capable at the issuer level, which can sometimes cap further damage if blacklisting is timely and well-scoped. Seeing all three in the same drain suggests the attacker balanced speed, fungibility, and potential counterparty intervention risk to maximize realized PnL.

Why this keeps happening to bridges is less mysterious than many admit. Bridges aggregate multiple failure modes: complex verification logic, privileged key management, and dependencies on off-chain relayers. When one control slips—whether a signature validation bug, an oracle assumption, or an operational key compromise—the blast radius extends to whatever assets the contract escrows. That’s why the most dangerous dynamic here isn’t the headline number; it’s the time-to-detection versus time-to-containment. Blockaid’s early warning and PeckShield’s asset breakdown show the defense playbook is improving, but incident response still hinges on minutes, not hours.

Operationally, the presence of USDC among the drained funds is a double-edged sword. If the recipient addresses are quickly identified, issuer blacklisting can freeze a portion of the haul, but it also creates uneven outcomes across users depending on what the attacker touched and when. ETH and tBTC, meanwhile, highlight the practical limits of ex-post recovery in permissionless assets: once liquidity is routed through aggregators and privacy-preserving paths, tracing helps attribution more than restitution.

Teams running bridges should assume exploit attempts are continuous and design for graceful failure. A few pragmatic controls tend to cut blast radius without neutering UX: - Hard, on-chain circuit breakers that rate-limit or pause withdrawals based on anomaly thresholds. - Key material that’s not just multisig, but diversified across hardware, geography, and organizations, with automated liveness checks. - Independent watchers with slashing/alerts tied to verifiable conditions, not manual discretion. - Real-time telemetry that stakeholders actually act on—alerts are only as good as the pause switches they can trigger.

For users, the safest interim stance is obvious: avoid initiating new transfers through the affected bridge until maintainers confirm isolation and remediation, and review any active token approvals connected to the bridge’s contracts.

Incidents like this reinforce a broader market truth: bridges are essential plumbing for liquidity, but they’re not homogenous. Designs that minimize trust assumptions, isolate asset risk, and embed rapid, objective shutdowns tend to survive contact with adversaries. Anything else remains an invitation to latency arbitrage by attackers who only need one gap to land a hit.