Resolve attacker mints USR with 200k USDC, buys 9,111 ETH after USDC/USDT swaps

Onchain Lens data says the Resolve attacker used 200k USDC to mint 80M USR. The funds were then swapped into wstUSR, and subsequently converted into USDC and USDT. After these conversions, the Resolve attacker has reportedly deployed $17.24M (USDC/USDT) to buy 9,111 ETH, with additional ETH purchases possible. The pattern suggests the attacker is actively liquidating or repositioning value across stablecoins and ETH rather than pausing after the mint. For traders, this ties directly to potential near-term sell-pressure and volatility risk in ETH, driven by continued attacker rebalancing. Monitor on-chain flows for further USDC/USDT inflows to ETH DEX/CEX venues, as well as any changes in USR/wstUSR inventory that could foreshadow more trading activity.
Bearish
This is bearish mainly because the Resolve attacker is converting minted USR into stablecoins (USDC/USDT) and then actively purchasing ETH. When attackers liquidate into a large, trackable flow, markets often anticipate continued positioning changes. Even if the current visible action is “buy ETH,” the broader context is exploit fallout: large actors frequently rebalance again (e.g., ETH → stablecoins → other venues), which can later translate into sell pressure. Short-term impact: heightened ETH volatility risk. Traders may watch for subsequent USDC/USDT inflows to ETH trading pairs and for any speed-up in attacker transactions, similar to past exploit/mint-and-swap events where repeated on-chain legs led to choppy price action. Long-term impact: limited, unless USR/wstUSR dumping accelerates or spreads to more venues. If the attacker’s remaining USR inventory keeps being converted gradually without causing systemic liquidity issues, the market may absorb the flow. But any evidence of rapid conversion cycles can extend the bearish bias.