StablR's EURR and USDR stablecoins depegged sharply after an attacker exploited a compromised multisig key to execute a $10.4 million token mint and swap operation. The protocol lost $2.8 million in the attack, triggering immediate price deviations across both assets.
The attacker gained control of a multisig wallet that governs critical StablR functions. This access allowed the bad actor to mint EURR and USDR tokens without proper collateral backing, then dump the freshly created supply into liquidity pools. The massive swap overwhelmed available depth, crashing both tokens below their intended $1.00 peg.
EURR, StablR's euro-denominated stablecoin, and USDR, its dollar-equivalent, both hemorrhaged value as market participants rushed to exit positions. The timing and execution suggest the attacker acted swiftly before multisig guardians could intervene.
The incident highlights persistent risks within multisig security architectures. A single compromised key across n-of-m approval schemes can prove fatal if thresholds remain too low or if coordinating guardians face delays in detecting and responding to unauthorized activity. StablR's defenders failed to block the transactions in real time, allowing the attacker to complete the exploit and exit with extracted value before recovery was possible.
Stablecoin protocols typically maintain reserve assets to back circulating supply. The unauthorized minting stripped this backing, leaving EURR and USDR holders with tokens worth less than their promised redemption value. Recovery hinges on whether StablR's treasury contains sufficient assets to recapitalize and restore confidence.
This breach follows a pattern of multisig failures across DeFi. Poly Network, Ronin, and other protocols suffered similar governance compromises that drained millions. The StablR case underscores that stablecoin security depends not just on smart contract code, but on the operational discipline and monitoring of key holders. Protocol teams must implement real-time alert systems and execute rapid response procedures when unusual