Key Points
- A critical vulnerability in Litecoin’s blockchain resulted in a 13-block chain reorganization over the weekend
- Hackers targeted the MimbleWimble Extension Block (MWEB) privacy feature to inject fraudulent transactions into the network
- Coordinated denial-of-service attacks temporarily disabled mining pools operating patched software, reducing their computational power
- Evidence including a Binance-linked funding address indicates the breach was orchestrated in advance, raising questions about its classification as a zero-day exploit
- The vulnerability has been completely resolved; legitimate transactions remained intact, though cross-chain platforms reported losses totaling approximately $600,000 on NEAR Intents
Litecoin experienced a significant security breach over the weekend when malicious actors leveraged a previously unknown vulnerability in its MimbleWimble Extension Block privacy feature to execute what appears to be the first successful attack on this system since its 2022 implementation.
The security flaw enabled legacy mining nodes to approve a fraudulent transaction, allowing the perpetrators to withdraw coins from the privacy layer and transfer them to decentralized exchanges and cross-chain bridging services.
Simultaneously, mining operations utilizing current, patched software versions faced coordinated denial-of-service assaults. These attacks temporarily eliminated their computational contribution to the network, effectively allowing outdated nodes to assume control of transaction validation.
When the denial-of-service interference ceased, the upgraded nodes reasserted network authority and initiated a 13-block chain reorganization. This action invalidated the malicious transactions and eliminated more than three hours of compromised blockchain data from Litecoin’s permanent ledger.
The Litecoin Foundation verified that every legitimate transaction processed during the affected timeframe remains preserved on the primary chain. According to the organization, the security vulnerability has been comprehensively addressed.
The alternative chain extended from block 3,095,930 through 3,095,943 and persisted for over three hours. Throughout this period, attackers successfully executed double-spend operations against several cross-chain swap services that had processed the subsequently invalidated withdrawals.
Aurora Labs CEO Alex Shevchenko characterized the incident as a “coordinated attack.” He further revealed that an address associated with Binance provided funding to the attacker days before the exploit, indicating premeditation.
Security Experts Challenge “Zero-Day” Classification
Shevchenko contested whether the vulnerability genuinely qualified as a zero-day exploit. He observed that since the network autonomously executed the reorganization following the cessation of denial-of-service attacks, a portion of the mining infrastructure must have already deployed updated software.
“This bug was known, and it’s not a zero-day,” Shevchenko stated on X.
Blockchain developer Vadim corroborated that the precise timing and strategic targeting suggested a calculated operation rather than an opportunistic discovery.
Financial Impact Spans Multiple Platforms
Shevchenko calculated that NEAR Intents sustained approximately $600,000 in damages from the incident. He recommended all cryptocurrency trading platforms processing Litecoin conduct comprehensive audits of their transaction records and asset reserves.
The Litecoin Foundation has not identified which mining pools experienced the denial-of-service attacks or disclosed the total quantity of Litecoin generated through the fraudulent transactions.
Litecoin was exchanging hands near $56.00 approximately 4:30 p.m. ET on Saturday, declining roughly 1% for the day, with markets showing minimal immediate response to the security breach. The cryptocurrency has depreciated nearly 25% since the beginning of the year.
This incident represents another chapter in the ongoing series of cryptocurrency security compromises throughout 2026. Decentralized finance protocols have suffered more than $750 million in losses from exploits through mid-April, including the $292 million Kelp DAO bridge exploitation on April 19 and a $285 million compromise of Solana-based perpetuals platform Drift on April 1.
Cross-chain bridging infrastructure has emerged as the primary vulnerability vector in the majority of these incidents, including Saturday’s Litecoin security breach.


