Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
A full-blown mess and it escalated fast🥶.
A critical issue in the Resolve system let an attacker mint 50 MILLION #USR using just 100K USDC .. yeah… a 500x imbalance. From there, things spiraled quickly. The attacker converted a huge chunk into wstUSR, started swapping into USDC and USDT, and then rotated that liquidity straight into ETH .. already accumulating around $4.5M worth early on.
And the market reacted instantly.
$USR crashed hard -- dropping all the way to $0.25 (-74%) before bouncing back near $0.86. But even that recovery doesn’t really mean stability… it just shows how chaotic things got.
👇What’s worse… it didn’t stop there👇
Within just a couple of hours, the same exploit was used again -- total minted supply jumped to 80 MILLION USR using only $200K USDC. That capital was then used to buy roughly 9,191 ETH (~$19.3M), with funds already being split and moved -- including 5,500 ETH sent to a fresh wallet.
At this point, it’s not just a bug… it’s active exploitation, ongoing. And the most concerning part? The Resolve team hasn’t responded yet.
Transaction Hash:
0xfe37f25efd67d0a4da4afe48509b258df48757b97810b28ce4c649658dc33743
Attacker Address:
0x04A288a7789DD6Ade935361a4fB1Ec5db513caEd
Receiving Address:
0x6Db6006c38468CDc0fD7d1c251018b1B696232Ed