StablR Had a MiCA License and Tether Backing: One Compromised Key Took It Down

0

Key Takeaways

  • StablR’s EURR and USDR stablecoins depegged after a $2.8 million exploit on May 24
  • A compromised multisig key let the attacker mint over $10.4 million in new tokens
  • StablR holds a MiCA license and an EMI license from Malta, regulation did not prevent the exploit

StablR is not a DeFi wild west project. It holds an Electronic Money Institution license from Malta’s financial regulator. It operates under the EU’s Markets in Crypto-Assets Regulation. It received a strategic investment from Tether in late 2024.

It was also protected by a 1-of-3 multisig where a single compromised key handed the attacker full control of the minting contract.

One key. That is all it took.

What Happened

Blockchain security firm Blockaid flagged an ongoing exploit on StablR early Saturday morning. The attacker had compromised one of three authorized keys on the minting multisig governing StablR’s token issuance on Ethereum.

With that single key, the attacker added their own address as an owner, removed the two legitimate signers, and gained full unilateral control of the minting contract. They then minted 8.35 million USDR and 4.5 million EURR, a combined face value of roughly $10.4 million at peg.

Both tokens lost their pegs immediately. EURR fell roughly 20% on tracked Ethereum liquidity. USDR also lost its dollar peg as sell pressure overwhelmed available pools.

StablR coingecko - StablR Had a MiCA License and Tether Backing: One Compromised Key Took It Down

EURR drops 24.9% from $1.15 to $0.8694 in minutes after the attacker minted 4.5 million tokens through a compromised multisig key. Note the GoPlus proxy contract warning visible on CoinGecko. Source: CoinGecko

The attacker’s actual haul was limited by thin liquidity on decentralized exchanges. Swapping $10.4 million in freshly minted tokens into shallow pools yielded only about 1,115 ETH, worth roughly $2.8 million. Blockaid was direct about the cause: “This is not a smart contract bug. It is a key management and governance failure.”

The 1-of-3 Problem

This is the detail that matters. A 1-of-3 multisig means any single one of three authorized parties can act alone. The threshold is so low that compromising one key is equivalent to compromising the entire system. There is no redundancy. There is no check. One bad actor, one phishing email, one leaked private key, and full minting authority transfers instantly.

For a protocol issuing regulated stablecoins under MiCA, with an EMI license from Malta’s financial regulator and a Tether strategic investment on the balance sheet, choosing a 1-of-3 multisig is a governance decision that a first-year developer would flag in a code review.

The regulatory credibility of the project and the security of its key management structure were not aligned. That gap is what the attacker walked through.

This Is Not a New Pattern

We covered the MAPO bridge exploit last week where a spoofed cross-chain message allowed unauthorized minting that crashed the token 95%. The mechanism was different but the underlying failure was the same, inadequate validation of who has authority to mint.

A similar Resolv stablecoin breach earlier in 2026 used near-identical mechanics. A single insufficiently protected key enabled minting at scale. The pattern is consistent: projects launch with sophisticated smart contract architecture and then secure the keys controlling that architecture with governance structures that would not pass a basic security audit.

DeFi infrastructure risk is the persistent unsolved problem underlying all of this. The SEC’s Innovation Exemption is designed to bring tokenized assets onto regulated blockchain infrastructure. The GENIUS Act stablecoin bill just failed a Senate floor vote. Both of those regulatory developments assume that the infrastructure layer is secure enough to carry regulated financial products. The StablR exploit is a live demonstration of how far that assumption is from reality.

The Tether and MiCA Question

StablR’s regulatory and financial ties create obligations that a purely DeFi project would not face. Tether’s strategic investment and MiCA licensing mean there are counterparties and regulators with formal relationships to this project. How those ties factor into any recovery or compensation response has not yet been disclosed.

What is clear is that regulatory credentials did not prevent the exploit. A MiCA license and an EMI authorization are not security audits. They certify compliance with financial regulation. They do not certify that the keys controlling your minting contract are adequately protected.

The regulated stablecoin sector is learning a painful lesson that DeFi learned years earlier: compliance and security are two different things. Having one does not give you the other.

What to Watch

StablR has not yet issued a formal statement on recovery steps, compensation, or whether the compromised key has been revoked and the contract paused. Until an official update arrives, avoid interacting with EURR and USDR on any platform.

The broader question is whether Malta’s MFSA and the EU’s MiCA enforcement framework have the tools to respond to an exploit of a licensed issuer. The answer to that question will shape how seriously the next generation of regulated stablecoin issuers takes key management security.

About Author

The DailyCoinPost Editorial Team produces original Bitcoin and cryptocurrency reporting, on-chain analysis, and geopolitical market coverage.Our work has been featured in Phemex, Mexc, Bitget, Cryptonews.com, Cryptonews.net, Kitco, Ground.news, TechFlowPost, reaching readers across seven language markets. DailyCoinPost is an approved Google News publisher.We verify all on-chain data against primary sources including Bloomberg, AP and official blockchain explorers.Follow our coverage on Reddit: Reddit

Disclaimer: DailyCoinPost publishes news, analysis, and commentary on Bitcoin and cryptocurrency markets. Nothing on this site is financial advice. Bitcoin is volatile. Markets move fast. What you read here reflects our research and perspective at the time of writing — not a recommendation to buy, sell, or hold anything. Do your own research. Consult a professional if you need one. Full details in our Terms of Use and Privacy Policy.