THORChain Unveils "NoRunesMinted" Recovery Plan After $10.7M Exploit
THORChain said it suffered roughly $10.7 million in losses on May 15 after a malicious node operator exploited weaknesses in the protocol's threshold signature setup. The project has now floated a recovery proposal that explicitly avoids token inflation.
The plan, filed as ADR028, would first use Protocol-Owned Liquidity (POL) to cover the loss. Any remaining gap would be allocated pro rata to synthetic asset holders. The proposal also states that no new RUNE will be minted or sold.
What happened — and how it was contained
According to THORChain, the attacker was a newly churned node operator that joined the network just two days before the incident. The exploit targeted the GG20 Threshold Signature Scheme (TSS), the mechanism used to distribute control of vault keys across the network so that no single operator can unilaterally access funds.
THORChain said the attacker was able to reconstruct critical vault private keys by exploiting vulnerabilities in that scheme, effectively gaining access to assets held by the protocol.
The protocol said its automated solvency checker flagged the anomaly within minutes. Trading and signing were halted, and node operators coordinated to freeze the network in about two hours. THORChain said there were no direct losses to user funds or liquidity provider positions.
The rapid shutdown was enabled via the Mimir governance system, which allows node operators to adjust key parameters quickly without waiting through longer governance processes.
ADR028: How losses would be allocated
Under ADR028, POL — the protocol's own capital deployed in its liquidity pools — would absorb as much of the $10.7 million shortfall as possible. Any remaining deficit would be distributed proportionally across synthetic asset holders.
THORChain synthetics are derivative representations of assets such as Bitcoin and Ethereum that live inside the protocol's pools. If POL does not fully cover the loss, synthetic positions would take a proportional haircut.
The proposal's central pledge is what it rules out: minting new RUNE. In prior DeFi exploits, projects have often recapitalized through inflationary issuance, diluting existing holders. THORChain is positioning non-dilution as both a financial and governance commitment.
The protocol also said it is offering a whitehat bounty aimed at recovering stolen funds. In parallel, additional patches addressing GG20 TSS weaknesses are being rolled out as part of the interim fix released shortly after the incident.
Crosschain risk remains in focus
The incident underscores persistent risks for crosschain protocols, which must manage keys and signatures across multiple blockchains. Bridges and crosschain infrastructure have been among the most frequently targeted components in crypto since 2021, with industry losses totaling in the billions.
THORChain has faced prior security issues, and the latest exploit adds to a broader track record of recurring pressure on crosschain designs. While the two-hour containment and automated solvency checks were notable, the fact that a node operator could join and execute an attack within 48 hours raises questions about node onboarding controls and assumptions in the churn process.
What investors will watch next
For markets, the no-dilution language in ADR028 is the most consequential point: RUNE holders are not being asked to socialize losses through inflation, preserving supply dynamics.
Execution will matter. Investors are likely to monitor how thoroughly THORChain closes the GG20 TSS attack vectors and whether stricter requirements are introduced for new node operators. The proposed allocation to synthetic holders also bears watching. If POL falls short, haircuts on synthetics could reduce liquidity and trading activity, widening spreads and weakening THORChain's competitiveness for crosschain swaps.
More broadly, THORChain's approach could become a reference case. A successful recovery without dilution and without sustained liquidity damage could influence how other protocols respond post-exploit. If it fails to stabilize conditions, it may reinforce calls for fundamentally different security architecture for crosschain systems.
The whitehat bounty adds uncertainty: in some cases, exploiters return funds in exchange for a payout and leniency. Whether any portion of the $10.7 million is recovered will determine how much of the deficit ultimately needs to be absorbed through POL and synthetic haircuts.