BlocktoBlockto
THORChain Exploit Linked to GG20 Signature Flaw and Malicious Node Attack
NEWS

Photo: Illustrative

THORChain Exploit Linked to GG20 Signature Flaw and Malicious Node Attack

THORChain has confirmed that a malicious node exploited a vulnerability in its GG20 threshold signature system, leading to the theft of around $10.7 million from one of its vaults. The GG20 system is designed to split private key control across multiple nodes so no single operator can access full signing power. However, investigators found that “progressive key material leakage” allowed the attacker to reconstruct a complete private key and drain funds.

Tristan R.
By Tristan R.

Senior Author · May 22, 2026

2 min
Key takeaways
THORChain has confirmed that a malicious node exploited a vulnerability in its GG20 threshold signature system, leading to the theft of around $10.7 million from one of its vaults.
The GG20 system is designed to split private key control across multiple nodes so no single operator can access full signing power.
However, investigators found that “progressive key material leakage” allowed the attacker to reconstruct a complete private key and drain funds.

THORChain has confirmed that a malicious node exploited a vulnerability in its GG20 threshold signature system, leading to the theft of around $10.7 million from one of its vaults. The GG20 system is designed to split private key control across multiple nodes so no single operator can access full signing power. However, investigators found that “progressive key material leakage” allowed the attacker to reconstruct a complete private key and drain funds.

Timeline of the $10 million THORChain exploit.

Automated Safeguards Halt Further Losses

The protocol’s automatic solvency checks activated within minutes of the exploit, stopping signing and trading activity across multiple chains. A full network halt was later coordinated by node operators through Discord, followed by a security patch deployment. THORChain confirmed that these safeguards prevented additional losses and limited the impact of the attack.

Recovery Plan and Community Debate Over GG20 Security

The protocol is now considering recovery options under governance proposal ADR-028, which suggests covering losses through protocol-owned liquidity without minting or selling RUNE tokens. The attacker has also been offered a bounty for returning funds. While some analysts praised the emergency response system, others warned that GG20 may have structural weaknesses that require deeper redesign. RUNE prices fell 15.5% after the exploit before a slight recovery.

$RUNE 1-week chart

How markets are positioning

Live market reaction

🛢️WTI Crude
+3.4%
Gold
+1.8%
Bitcoin
-1.8%
$DXY
+0.6%

Disclaimer

This content is for informational purposes only and does not constitute financial, investment, or legal advice. Cryptocurrency trading involves risk and may result in financial loss.

Exclusive partner offer

Start trading
with BloFin today

Up to $500 sign-up bonus and zero-fee trading on your first 30 days.

Buy crypto now

You will be redirected to BloFin

Share article

About the author

Tristan R.
Tristan R.

8+ years covering crypto markets, macro, and geopolitics. Previously at Decrypt and CoinDesk. Focused on the intersection of digital assets and traditional finance.