Loading market data...

Map Protocol’s MAPO Token Plunges 96% After Quadrillion-Token Mint Via Cross-Chain Bridge Exploit

Map Protocol’s MAPO Token Plunges 96% After Quadrillion-Token Mint Via Cross-Chain Bridge Exploit

Map Protocol’s native token MAPO collapsed 96% in value after an attacker exploited the project’s cross-chain bridge to mint roughly one quadrillion tokens. The incident, which flooded the market with an astronomical number of new coins, highlights the persistent security flaws in cross-chain bridge design.

How the attack worked

The attacker targeted Map Protocol’s cross-chain bridge, a piece of infrastructure that lets users move assets between different blockchains. By manipulating the bridge’s validation logic, the attacker was able to mint MAPO tokens far beyond the protocol’s intended supply. The minted tokens were then dumped on exchanges, triggering a steep price crash.

The scale of the mint

The exact number of tokens created — roughly one quadrillion — is so large it dwarfs the normal circulating supply. The resulting selling pressure pushed MAPO’s price down by 96% within hours. Holders saw the value of their positions nearly wiped out as the market absorbed the flood of new tokens.

Systemic risks in cross-chain bridges

Cross-chain bridges have become a frequent target for attackers. The exploit at Map Protocol fits a pattern: bridges often hold large amounts of locked value and rely on complex code to validate transactions. A single vulnerability can allow an attacker to mint tokens or drain funds. The incident exposes systemic risks that extend beyond one project, as the entire DeFi ecosystem depends on bridges to connect disparate blockchains.

The attack also raises questions about how protocols can prevent such large-scale mints. Without robust safeguards on token supply and bridge validators, similar exploits are likely to recur.

The Map Protocol team has not yet released a detailed post-mortem. Users and investors are left waiting for a clear explanation of how the bridge was compromised and what steps will be taken to recover lost value.