Litecoin confirmed the incident in an official update Saturday. Non-updated mining nodes accepted an invalid MWEB transaction that should have been rejected. Attackers used the opening to peg out coins to decentralized exchanges before miners reversed the bad blocks. The bug is now patched. But the episode raises a difficult question: do privacy features increase validation risk more than they protect users?
- Litecoin developers patch a Mimblewimble Extension Blocks vulnerability that allowed attackers to trigger a 13-block reorganization on the network.
- The network reorganization exposed $600,000 in liquidity on NEAR Intents while THORSwap paused cross-chain trading for Litecoin, Bitcoin Cash, and Dogecoin.
- The incident proves that complex privacy features increase validation risks and threaten the security assumptions of decentralized finance protocols.
Privacy Becomes Attack Surface
Litecoin activated Mimblewimble Extension Block in May 2022. The upgrade allowed confidential transactions by obscuring amounts and peer information. For a chain often called “silver to Bitcoin’s gold,” MWEB was a genuine differentiator. Bitcoin prioritizes transparency. Litecoin would offer optional privacy.
That decision created new complexity. MWEB transactions require specialized validation logic that differs from standard Litecoin transactions. Non-updated nodes failed to perform that validation correctly. Attackers exploited the gap.
Zcash founder Zooko Wilcox noted the pattern on X: “This isn’t an isolated incident. There have been many of these rollback-and-double-spend attacks against Proof-of-Work-alone blockchains both years ago and recently, including recently against Monero and Grin.”
Litecoin’s team patched the bug swiftly. The network confirmed that no user funds vanished on-chain. But the MWEB vulnerability existed since the upgrade’s activation. For nearly four years, non-updated nodes could accept invalid MWEB transactions. No one noticed until an attacker did.
Genuine News Deserves Honest Attention.
High-conviction projects require an intelligent audience. Connect with readers who value sharp reporting.
👉 Submit Your PRCross-Chain DeFi Pays the Price
The attack rippled across protocols that never touched Litecoin’s node software directly. THORSwap, a cross-chain decentralized exchange, paused Litecoin swaps along with Bitcoin Cash and Dogecoin as a precaution.
THORSwap CEO paperX_Art posted: “This hurts all crosschain DeFi, we need to band together here.”
NEAR Intents reported roughly $600,000 in exposure during the reorg window and said it would cover any user losses.
The mechanism is straightforward. Cross-chain protocols accept Litecoin deposits with low confirmation counts for speed. During a reorg, those confirmations become unreliable. Attackers could deposit LTC, receive tokens on another chain, and then have the original deposit reversed once the reorg replaced the block. No on-chain funds vanished. But cross-chain platforms faced temporary exposure.
The deeper problem is structural. Cross-chain DeFi inherits the security assumptions of every connected chain. Most protocols assumed that reorgs beyond three to six blocks do not happen on major UTXO chains. Litecoin just proved that assumption wrong.
Chain Street’s Take
Litecoin added MWEB to stand out. Instead, it learned that privacy features on proof-of-work chains come with hidden costs.
The attack wasn’t brilliant but opportunistic. Non-updated nodes accepted invalid transactions. That’s not a cryptographic failure. It’s a coordination failure. Attackers found the gap between code releases and node operators who didn’t bother updating.
Cross-chain DeFi got caught in the blast radius. THORSwap’s pause was smart. But the industry needs reorg-aware swap logic and confirmation thresholds that reflect actual chain security, not marketing promises.
Litecoin patched the bug. The market moved on. But the next zero-day on a UTXO chain might not get caught in a few hours. And cross-chain DeFi might not get lucky twice.
Activate Intelligence Layer
Institutional-grade structural analysis for this article.





