Particle.news
Download on the App Store

Litecoin Reverses 13 Blocks After MWEB Exploit as 'Zero-Day' Claim Faces Scrutiny

Commit logs suggesting a private fix weeks earlier now cast doubt on the 'zero-day' label.

Overview

  • Litecoin rewrote 13 blocks Saturday after attackers used a bug in its MimbleWimble Extension Block privacy layer to push an invalid transaction onto a fork.
  • A denial-of-service attack hit mining pools running updated code and let older, unpatched nodes extend the fork until the main chain overtook it and erased the invalid transfers.
  • Cross-chain swap services that accepted MWEB peg-outs during the fork saw double-spend attempts, with NEAR Intents exposure estimated at about $600,000.
  • The Litecoin Foundation says the vulnerability is fixed and the network is stable, yet it has not named the affected mining pools or disclosed the value tied to the invalid activity.
  • Researchers cite GitHub commits from March 19–26 and a wallet funded about 38 hours before the exploit to question the 'zero-day' framing and warn that uneven upgrades on proof-of-work networks create attack windows.