Resolv pauses USR after 80M unbacked mint, USR depeg and hack

Resolv has paused its protocol after an attack that minted 80M unbacked USR tokens. USR depegged sharply: it traded near $0.24 and reportedly hit as low as $0.14 versus its $1 peg. To contain the impact, Resolv Foundation said it is temporarily stopping all protocol functions, including the app, and freezing S4 airdrop claims plus RESOLV staking/unstaking. Resolv previously stated the collateral pool is intact with no underlying asset loss, but on-chain analysis suggests the attacker swapped most of the minted USR into ETH and sold roughly $25M. Resolv issued an on-chain ultimatum giving a “white-hat” 72-hour window: return 90% of the converted funds (about $25M in ETH) and all remaining USR, while keeping 10% as a bounty. Non-compliance could trigger escalation, including coordinated freezes with exchanges/bridges, tracing, and law-enforcement involvement. Security firm Cyvers’ Michael Pearl said redemptions are being reopened only for legitimate holders who held USR before the exploit, as abnormal USR is investigated. He also noted the USR depeg may revive wider DeFi stress, echoing Terra/UST-style stablecoin risk and prompting platforms to reassess peg assumptions. For traders, USR remains the key focus: protocol shutdowns, forced investigations, and potential escalation can increase volatility around the USR peg and related DeFi liquidity.
Bearish
This event is bearish for USR specifically. The protocol pause and frozen actions signal that peg restoration is uncertain in the near term. The depeg was driven by 80M unbacked USR minting, and the attacker’s cash-out (sold ~25M in ETH) increases immediate selling/market confidence risk even if Resolv claims the collateral pool remains intact. Also, only pre-exploit legitimate holders being allowed to redeem can create asymmetry and liquidity gaps, keeping USR under pressure. In the short run, expect higher volatility around $USR, wider spreads, and potential contagion narratives across DeFi stablecoin assumptions. In the longer run, any successful attacker recovery within the 72-hour window could reduce downside, but the need for escalation with exchanges/bridges and potential legal involvement suggests tail-risk remains.