Lido's Ethereum Staking Protocol Thwarts Major Hack Attempt, Loses Only 1.4 ETH

·

Lido Finance, Ethereum's largest liquid staking protocol, narrowly avoided a major security incident after one of its nine oracle keys was compromised. The breach, linked to validator operator Chorus One, resulted in minimal losses—just 1.46 ETH (~$4,200) stolen as gas fees. No user funds were affected, and no wider exploits were detected, according to joint statements from Lido and Chorus One.

Key Details of the Incident

👉 Learn how Lido secures 25%+ of staked ETH

How Lido's Oracle Safeguards Work

Lido’s oracle system employs a 5-of-9 quorum mechanism to deliver Ethereum consensus data to its smart contracts. This design ensures resilience even if multiple keys are compromised:

  1. Multi-Signature Security: Requires consensus from 5+ oracle operators.
  2. Fail-Safe Protocols: Isolates breaches without disrupting operations.

Immediate Response and Mitigation

Lido’s team acted swiftly to contain the threat:

Context: Unrelated Node Issues During Attack

Coinciding with the hack, several oracle operators faced unrelated technical challenges:

👉 Explore Ethereum's staking security landscape

Post-Attack Updates

FAQs

Q: Was user ETH staked via Lido at risk during the hack?

A: No. The breach only affected gas fees from a hot wallet; staked ETH remained fully secure.

Q: How does Lido’s oracle system prevent single points of failure?

A: The 5-of-9 quorum ensures attacks require compromising multiple keys simultaneously—making large-scale exploits highly unlikely.

Q: What changes is Lido making to prevent future incidents?

A: Beyond key rotation, the team now enforces uniform security standards for all keys, including legacy ones.

Q: Could this delay Ethereum’s Pectra upgrades?

A: Unlikely. The Prysm bug was minor and resolved quickly, with no impact on upgrade timelines.