Attacker Mints 1B DOT, Dumps for $237K ETH
Polkadot-linked ERC-20 exploit mints 1B DOT and dumps it instantly, causing a near-total price crash on decentralized exchanges.

Quick Take
Summary is AI generated, newsroom reviewed.
Exploit mints 1B DOT tokens
Tokens dumped in a single transaction
Attacker walks away with ~108 ETH
Price crashes nearly 100% on DEX
A security incident involving Polkadot has raised concerns, but it’s important to clarify the scope. The exploit did not impact the native Polkadot network. Instead, it targeted an ERC-20 version of DOT operating on the Ethereum network.
Polkadot(@Polkadot) has been exploited. 🚨
— Lookonchain (@lookonchain) April 13, 2026
The attacker minted 1B $DOT and dumped it all in a single transaction for 108.2 $ETH($237K).https://t.co/4pStYrGb8y pic.twitter.com/wRplAWNnBg
This distinction matters because the vulnerability existed in a separate smart contract—not in Polkadot’s core protocol. However, for users holding or interacting with the Ethereum-based version, the consequences were immediate and severe.
How the Attack Unfolded
The attacker exploited a flaw in contract permissions, gaining access to an admin role. With that control, they minted 1 billion DOT tokens out of thin air, something that should never be possible in a secure system.
Once minted, the attacker wasted no time. The entire supply was dumped in a single move through decentralized platforms like Uniswap and routing aggregators. This sudden flood of tokens completely overwhelmed the market.
The result:
• Around 108 ETH extracted (≈ $237,000)
• Instant price collapse of the affected token
• Near-total loss of value within minutes
What This Means for Crypto Security
While DOT itself remains secure, the incident highlights a critical issue in crypto—the risks of wrapped and cross-chain assets.
As ecosystems expand across chains like Ethereum, complexity increases. More integrations mean more potential نقاط of failure, especially when:
• Smart contract permissions are misconfigured
• Admin controls are too centralized
• Security audits miss edge-case vulnerabilities
The bigger takeaway is clear: even if a core blockchain is robust, extensions built around it can introduce significant risk.
This exploit serves as a reminder that in crypto, understanding what version of an asset you hold—and where it lives—is just as important as the asset itself.
References
Follow us on Google News
Get the latest crypto insights and updates.

