Все публикации

IoTeX Hack: How a Private Key Compromise Triggered a Large-Scale Cross-Chain Bridge Attack

IoTeX hack. A review by a Bitcoin mixer: mixer.money
IoTeX Hack: How a Private Key Compromise Triggered a Large-Scale Cross-Chain Bridge Attack

  1. Anatomy Of the Breach: What Went Wrong?
  2. Damage Estimates: $2 Million Or Nearly $9 Million?
  3. Network Response And Emergency Measures
  4. The Bridge And Private Key Problem: an Industry-Wide Vulnerability
  5. IoTeX’s Future And the Implications For the DePIN Sector

The Decentralized Physical Infrastructure Networks (DePIN) sector, along with projects at the intersection of AI and blockchain (Crypto-AI), is experiencing rapid growth. But as popularity and market capitalization rise, these ecosystems are increasingly becoming targets for attackers. A recent example is the IoTeX blockchain project, which suffered a major exploit after a private key was compromised. As a result, millions of dollars in assets were drained from bridge contracts, and the network itself was forced to halt operations.

Anatomy Of the Breach: What Went Wrong?

Last Saturday, the IoTeX cross-chain bridge infrastructure was compromised. According to leading blockchain security firm PeckShield and an independent on-chain analyst known as Specter, the root cause was the compromise of a private key.

This leak granted the attacker unauthorized, full control over two critical smart contracts: TokenSafe and MinterPool.

In decentralized finance (DeFi) and cross-chain bridges, contracts like TokenSafe are used to lock assets on one chain before minting their wrapped equivalents on another. By gaining control of these contracts through the compromised key, the attacker effectively obtained the “keys to the vault,” enabling unrestricted withdrawals of user funds and manipulation of token issuance.

At 4:20 a.m. EST, Specter was among the first to raise the alarm on X, reporting that the IoTeX bridge contracts were being drained and liquidity was being siphoned from multiple pools.

Damage Estimates: $2 Million Or Nearly $9 Million?

The scale of the theft quickly became a topic of heated debate, as independent on-chain estimates differed sharply from the IoTeX team’s official statements.

Independent analyst data
According to Specter, roughly $4.3 million in assets was initially withdrawn from the TokenSafe vault. Stolen funds included stablecoins USDC, USDT, and BUSD, along with wrapped Bitcoin (WBTC) and the network’s native token, IOTX.

But the attack went beyond simply draining existing funds. Using control over the MinterPool contract, the attacker also minted tokens without authorization.

Approximately 111 million CIOTX tokens (IoTeX’s cross-chain asset standard used to provide multichain liquidity in DePIN protocols) were minted, with an estimated value of around $4 million. Specter later updated the figures, adding 9.3 million stolen CCS tokens worth about $4.5 million.
By these independent calculations, total losses may have reached $8.8 million.

IoTeX’s official position
IoTeX co-founder Raullen Chai responded quickly, stating that “the situation is under control.” The team disputed the higher estimates.

In an email to The Block, Chai said: “We are still collecting data, but at this time the damage is estimated at approximately $2 million.”

Such discrepancies are common in the early stages of blockchain incident investigations. In many cases, a portion of newly minted tokens cannot actually be sold due to limited liquidity, meaning their realizable market value is significantly lower than their nominal value.

Network Response And Emergency Measures

Large-scale exploits require immediate action. Once the breach was confirmed, the IoTeX blockchain was halted. Around 10:00 a.m. EST, the network stopped producing new blocks.

A blockchain halt is an extreme measure used only in critical situations to prevent further outflows and preserve the network’s state for recovery.

At the same time, the IoTeX team coordinated with centralized exchanges (CEXs) to blacklist the attacker’s addresses. According to Chai: “They won’t even be able to deposit the tokens.”

Blocking stolen funds from being cashed out through centralized platforms is standard practice and significantly complicates money laundering, forcing attackers to rely on mixers or more complex obfuscation strategies.

The Bridge And Private Key Problem: an Industry-Wide Vulnerability

The IoTeX incident highlights one of the most serious structural weaknesses in today’s crypto industry: cross-chain bridge security and operational centralization.

Bridges aggregate enormous amounts of locked liquidity (TVL), making them extremely attractive targets. Yet the weakest link often isn’t smart contract bugs—it’s operational security, particularly private key management.

Compromising an administrator key (or multiple keys in a multisig wallet) effectively grants “superuser” privileges. As seen in IoTeX’s case, this enables both asset withdrawals and unrestricted token minting.

This attack vector is not new. A similar incident occurred last December on Flow, where a compromised key allowed an attacker to mint tokens and extract about $3.9 million before the network controversially attempted a transaction rollback.

These cases show that even technologically advanced ecosystems—whether DePIN, Crypto-AI, or NFT infrastructure—remain vulnerable to basic operational security failures.

IoTeX’s Future And the Implications For the DePIN Sector

IoTeX is one of the flagship projects within the DePIN narrative, aiming to connect billions of IoT devices to Web3 infrastructure. With the project’s market capitalization exceeding half a billion dollars, the exploit represents a serious reputational challenge.

To rebuild trust among investors and users, the team will need not only to fully restore network operations but also to publish a detailed post-mortem report.

The crypto community will expect clear answers to several key questions:
1. How exactly was the private key compromised?
2. Why did the bridge contracts rely on a single point of failure instead of timelocks, strict multisig controls, or hardware-backed security modules?
3. What compensation plan will be offered to affected users?


logo bitcoin mixer mixer.money

Our Bitcoin mixer publishes a weekly roundup
of interesting news from the world of cryptocurrencies.
Visit our blog: