
What to know : Attackers exploited a previously patched but not fully deployed vulnerability in Litecoin’s Mimblewimble Extension Block protocol, triggering a 13-block chain reorganization that rewound about 32 minutes of activity. Public GitHub commits show the core consensus bug was privately fixed weeks before the exploit, creating a window in which some mining pools ran updated code while others remained vulnerable, a gap researchers say the attackers appeared to target. The Litecoin network ultimately reorganized back to the valid chain once denial-of-service attacks on patched miners ceased, but the foundation has not yet explained the patch timeline or disclosed how much LTC was affected during the invalid block window.
A 13-block chain reorganization on late Friday and Saturday rewound roughly 32 minutes of network activity after attackers used a vulnerability in its Mimblewimble Extension Block (MWEB) protocol.
The bug had enabled a denial-of-service attack against major mining pools, allowing the invalid MWEB transactions to slip through nodes that had not updated, before the network's longest valid chain corrected them.
The Foundation said in Asian morning hours on Sunday the bug was fully patched and the network is operating normally.
However, prominent researchers say the litecoin-project GitHub repository tells a different story. Security researcher bbsz, who works with the SEAL911 emergency response group for crypto exploits, posted the patch timeline pulled from the public commit log.
The consensus vulnerability that allowed the invalid MWEB peg-out was privately patched between March 19 and March 26, roughly four weeks before the attack. A separate denial-of-service vulnerability was patched on the morning of April 25.
Both fixes were rolled into release 0.21.5.4 the same afternoon, after the attack had already begun.
"The post-mortem says one zero-day caused a DoS that let an invalid MWEB transaction slip through," bbsz wrote. "The git log tells a slightly different story."
A zero-day refers to a vulnerability unknown to defenders at the time of an attack.
Litecoin's commit history shows the consensus vulnerability was known and patched privately a month before the exploit, but the fix had not been broadcast publicly or required to all mining pools.
That created a window where some miners ran the patched code while others ran the still-vulnerable version, and the attackers appear to have known which was which.
Alex Shevchenko, CTO of NEAR Foundation's Aurora project, raised parallel concerns in a thread.
Blockchain data showed the attacker pre-funded a wallet 38 hours before the exploit through a Binance withdrawal, with the destination address already configured to swap LTC into ETH on a decentralized exchange.
The denial-of-service attack and the MWEB bug were separate components, Shevchenko argued, with the DoS designed to take patched mining nodes offline so the unpatched ones would form the chain that included the invalid transactions.
The fact that the network automatically handled the 13-block reorganization once the DoS stopped suggests enough hashrate was running updated code to eventually overpower the attack, but only after the unpatched fork had run for 32 minutes.
A hit on Litecoin shows how attacks on various networks differ in how code maintainers and developers react to exploits. Newer chains with smaller, more centralized validator sets coordinate upgrades through chat groups and can push patches network-wide in hours.
Older proof-of-work networks like Litecoin and bitcoin rely on independent mining pools choosing when to upgrade, which works for non-urgent changes but creates a window of vulnerability when a security patch needs to reach everyone before an attacker exploits the gap.
The Litecoin Foundation has not publicly addressed the GitHub timeline as of Sunday morning.
The amount of LTC pegged out during the invalid block window and the value of any swaps completed before the reorganization reversed them have not been disclosed.
免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。