Litecoin Sees First Privacy Layer Hack: MWEB Zero-Day Vulnerability Triggered 13-Block Reorganization

ChainNewsAbmedia
LTC0,1%

According to a report by The Block, the Litecoin Foundation on Saturday 4/25 confirmed that the attacker targeted a zero-day vulnerability in the MimbleWimble Extension Block (MWEB) privacy layer, forcing the main chain to roll back once across 13 blocks over a period of three hours. This is the first major attack incident involving MWEB since it was enabled in 2022.

The MWEB vulnerability lets older nodes pass forged peg-out transactions

The core issue is that miner nodes running older software would treat an invalid MWEB transaction as legitimate. The attacker exploited this to peg out LTC from the privacy layer to the main chain, then route it into decentralized exchanges to swap it into other assets—effectively creating money out of thin air. At the same time, several major mining pools were also implicated and subjected to targeted DoS attacks.

MWEB is Litecoin’s privacy extension layer that was launched via a soft fork in May 2022, with the goal of giving LTC a value-obfuscation feature similar to Monero. For more than three years, the functionality has operated reliably. This is the first time it has been effectively used to attack the main network.

13-block rollback, fork lasting more than 3 hours

The affected fork extended from block 3,095,930 to 3,095,943, for a total of 13 blocks. This three-hour window gave the attacker enough time to carry out double-spends against cross-chain exchange protocols that accepted MWEB peg-outs: when the exchange protocol transferred the assets to the counterparty but then lost the corresponding MWEB settlement during the subsequent rollback, the isolated transactions became effectively invalid.

NEAR Intents exposes about $600k; mining pools hit with DoS as well

Among the affected protocols, NEAR Intents was the one with the highest publicly disclosed amount. Initial reports said it exposed about $600k, and the team stated it would absorb the users’ losses itself. Litecoin later confirmed that all invalid transactions were wiped from the main chain along with the rollback, so the actual settlement losses should be far lower than the initial estimate.

On the mining pool side, the same vulnerability triggered the DoS conditions, forcing pools to pause or fail to produce blocks. This is also key to how the attacker managed to keep the fork going for three hours—without mainstream hash power immediately cutting off the invalid chain, the attack chain had time to accumulate blocks.

A patched version has been released; mining pools and nodes need to upgrade immediately

Within a few hours after the incident, Litecoin’s development team released a patched version, instructing all node and mining pool operators to upgrade immediately to the latest version. The foundation said the network has returned to normal operation and advised exchanges to temporarily pause processing MWEB-related withdrawals and conversions until the upgrade is complete.

For LTC holders, this incident does not affect legitimate transactions on the main chain or existing balances, but it highlights the trade-off between “reducing observability” and “reducing the difficulty of debugging” in the privacy extension layer—when problems arise, it becomes harder for the community to track anomalies from on-chain data in the first place. Litecoin only listed a staking ETF in the United States in October 2025, so institutional investors’ focus on network stability is likely to increase.

This article, Litecoin’s first privacy-layer hack: MWEB zero-day triggers 13-block chain reorganization, first appeared on Lian News ABMedia.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Address Linked to Avi Eisenberg Shows New On-Chain Activity, Raising Security Concerns

Gate News message, April 26 — Blockchain analytics platform Arkham has identified renewed on-chain activity from an address believed to be connected to Avi Eisenberg, the attacker who profited approximately $110 million from the 2022 Mango Markets exploit. Eisenberg was previously sentenced to

GateNews38m ago

Sui DeFi lending protocol Scallop is hacked, with a vulnerability in the old contract leading to 150k SUI stolen

Scallop was attacked on the Sui chain, and the side contract involved led to the sSUI rewards pool being exploited. Approximately 150k SUI were stolen. The core contract is secure, and deposits and withdrawals have been restored. The official statement applies only to the deprecated rewards contract; users’ funds were not affected. Former NEAR developer Vadim said the vulnerability originated from an outdated V2 package from 17 months ago, where not initializing last_index caused rewards to accumulate starting in 2023. The fix requires adding a version field to the shared object and strengthening version checks to prevent risks caused by outdated packages.

ChainNewsAbmedia1h ago

Scallop Discovers sSUI Reward Pool Vulnerability, Suffers 150K SUI Loss but Pledges Full Reimbursement

Gate News message, April 26 — Scallop, a lending protocol in the Sui ecosystem, announced the discovery of a vulnerability in an auxiliary contract associated with its sSUI reward pool, resulting in a loss of approximately 150,000 SUI. The affected contract has been frozen, and Scallop confirmed

GateNews5h ago

Litecoin Undergoes Deep Chain Reorganization After MWEB Privacy Layer Zero-Day Exploit

Gate News message, April 26 — Litecoin experienced a deep chain reorganization on Saturday (April 26) after attackers exploited a zero-day vulnerability in its MimbleWimble Extension Block (MWEB) privacy layer, according to the Litecoin Foundation. The reorg spanned blocks 3,095,930 to 3,095,943 and

GateNews6h ago

Aave, Kelp, LayerZero Seek $71M Frozen ETH Release from Arbitrum DAO

Aave Labs, Kelp DAO, LayerZero, EtherFi, and Compound filed a Constitutional AIP on the Arbitrum forum Saturday morning requesting the network's DAO release approximately $71 million in frozen ETH to support rsETH recovery efforts following last week's $292 million Kelp DAO exploit. The proposal

CryptoFrontier9h ago

Litecoin Suffers Deep Chain Reorganization After MWEB Zero-Day Exploit, Erasing Three Hours of History

Gate News message, April 26 — Litecoin experienced a deep chain reorganization (reorg) on Saturday after attackers exploited a zero-day vulnerability in its MimbleWimble Extension Block (MWEB) privacy layer, according to the Litecoin Foundation. The bug allowed mining nodes running older software to

GateNews15h ago
Comment
0/400
No comments