Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Peg Attack

A deliberate market action, often involving short-selling or exploiting protocol mechanisms, intended to break a stablecoin's peg and trigger a destabilizing feedback loop.
Chainscore © 2026
definition
BLOCKCHAIN SECURITY

What is a Peg Attack?

A targeted exploit against the stability mechanisms of a token designed to maintain a fixed price.

A peg attack is a deliberate, often sophisticated financial exploit that targets the stability mechanism of a pegged asset, such as a stablecoin or wrapped token, with the goal of breaking its fixed exchange rate, or peg. This is achieved by manipulating the underlying collateral, exploiting flaws in the smart contract's arbitrage logic, or creating unsustainable market conditions that cause the asset's price to depeg, either upward or downward, from its intended value. The attacker typically profits by taking large, pre-positioned trades that capitalize on the resulting price dislocation.

These attacks most commonly exploit algorithmic or crypto-collateralized stablecoins, which rely on dynamic mechanisms rather than direct fiat reserves. For example, an attacker might rapidly drain a protocol's liquidity pool for the pegged asset, triggering a bank run scenario where users panic-sell, breaking the peg. Alternatively, they might manipulate the price oracle that informs the system's collateral ratios, allowing them to mint excessive amounts of the stablecoin against insufficient collateral. The infamous collapse of Terra's UST in 2022 is a prime example of a peg attack, where coordinated selling pressure broke its algorithmic link to LUNA.

The consequences of a successful peg attack are severe, leading to catastrophic loss of value for holders, systemic risk within interconnected DeFi protocols, and a collapse in user trust. Defenses against such attacks include over-collateralization, robust and decentralized oracle networks, circuit breakers that halt operations during extreme volatility, and the use of multi-signature treasuries for managed assets. Understanding peg attacks is critical for assessing the inherent risks in different stablecoin designs, from algorithmic models to those backed by off-chain assets.

how-it-works
MECHANICS

How a Peg Attack Works

A peg attack is a coordinated financial assault designed to break the price stability mechanism of a token, such as a stablecoin or wrapped asset, causing it to deviate significantly from its intended value.

A peg attack is a deliberate, often sophisticated market manipulation where an actor or group exploits vulnerabilities in a token's peg maintenance mechanism to force a depeg—a sustained deviation from its target price. This is distinct from normal market volatility and targets the core economic or algorithmic design of the asset. Common targets include algorithmic stablecoins, wrapped assets (like wBTC or stETH), and cross-chain bridges, where the peg relies on complex, often fragile, systems of arbitrage, collateralization, or mint/burn functions.

The attack typically unfolds in two phases: destabilization and profit extraction. First, the attacker creates massive, one-sided selling pressure on the pegged asset or its backing collateral, often using flash loans to amplify their capital. This overwhelms the system's designed arbitrage incentives, breaking the feedback loop that normally restores the peg. For example, an attack on an algorithmic stablecoin might involve shorting its governance token to collapse the value of the backing collateral, making it impossible to mint new stablecoins at the $1 peg.

Finally, the attacker profits from the depeg itself. They may have taken short positions against the pegged asset in derivatives markets beforehand or use the artificially depressed price to acquire large amounts of the asset cheaply, betting on a eventual recovery. Historical examples include the attack on Terra's UST, which exploited the mint/burn mechanism between UST and LUNA, and depegging events on cross-chain bridges, where doubts about 1:1 redeemability can trigger a bank run-like scenario. These events highlight the critical importance of robust, over-collateralized, and transparent mechanisms for maintaining price stability in decentralized finance.

key-features
MECHANICS & CHARACTERISTICS

Key Features of a Peg Attack

A peg attack is a coordinated financial assault on a cryptocurrency's price-stabilization mechanism, designed to break its intended 1:1 parity with an underlying asset, such as the US dollar.

01

Arbitrage Exploitation

Attackers exploit inefficiencies in the arbitrage mechanism designed to maintain the peg. They deliberately create a large price deviation, then profit by draining collateral or manipulating the system's minting and redemption processes. This is often the initial trigger for de-pegging.

  • Example: In an algorithmic stablecoin, attackers might mint new tokens with overcollateralized assets, then sell them on the open market to drive the price down, before redeeming them at the intended 1:1 value.
02

Collateral Liquidation Cascade

The attack targets the collateral backing of the pegged asset. By driving the asset's price below its peg, it triggers mass liquidation events for positions that used it as collateral. This forced selling creates a negative feedback loop, further depressing the price and accelerating the de-peg.

  • Key Mechanism: This is common in overcollateralized stablecoins (like DAI with volatile collateral) or synthetic asset protocols where the pegged token is used as loan collateral.
03

Oracle Manipulation

Attackers manipulate the price oracles that feed external market data to the protocol. By artificially reporting a false price—either through flash loan attacks on the oracle's source or by dominating a specific liquidity pool—they can trick the system into allowing improper minting, redemptions, or avoiding liquidations that should occur.

  • Vulnerability: Protocols relying on a single oracle or a small set of easily manipulated data sources are most at risk.
04

Liquidity Drain (Bank Run)

This feature mimics a traditional bank run. Attackers, often preceded by fear, uncertainty, and doubt (FUD), trigger a mass redemption event. If the protocol's liquidity reserves or collateral cannot cover all redemptions at the 1:1 value, it creates an insolvency crisis, breaking the peg permanently.

  • Real-World Example: The collapse of Terra's UST was precipitated by a coordinated withdrawal from its Anchor Protocol yield reserve, followed by massive redemptions that its algorithm could not sustain.
05

Governance or Smart Contract Exploit

The attack vector is a vulnerability in the smart contract code or governance process. Attackers may exploit a bug to mint unlimited tokens, steal collateral, or pass a malicious governance proposal that changes critical parameters (like collateral ratios or oracle addresses), destabilizing the peg from within the system's own logic.

06

Market Dynamics & Reflexivity

A successful peg attack creates a reflexive feedback loop between price and demand. As the price drops below the peg, confidence erodes, reducing demand and increasing sell pressure, which drives the price down further. This death spiral is self-reinforcing and extremely difficult to stop without a massive, credible external intervention or recapitalization.

common-attack-vectors
PEG ATTACK

Common Attack Vectors

A Peg Attack is a coordinated exploit targeting the price stability mechanism of a pegged asset, such as a stablecoin or wrapped token, to break its intended 1:1 valuation.

01

Definition & Core Mechanism

A Peg Attack is a financial exploit where an actor intentionally manipulates market conditions to de-peg an asset from its target value. The attacker typically shorts the asset on secondary markets while simultaneously draining liquidity from its primary reserve or mint/burn mechanism, creating a self-reinforcing cycle of panic selling and broken arbitrage.

02

Liquidity Drain Attack

This common vector targets the liquidity pool backing the pegged asset. An attacker borrows or acquires a large amount of the asset, then dumps it into the primary DEX pool (e.g., a Curve 3pool for a stablecoin). This exhausts the pool's reserves of the collateral asset (e.g., USDC), breaking the peg and preventing arbitrageurs from efficiently restoring it.

  • Example: The 2022 attack on the UST stablecoin involved massive withdrawals from the Anchor protocol, collapsing the LUNA-UST arbitrage mechanism.
03

Oracle Manipulation

Many pegged assets (like wrapped assets or synthetic tokens) rely on price oracles to maintain their value. An attacker manipulates the oracle's price feed—often via flash loan attacks on the DEX pools it sources from—to create a false price discrepancy. This allows them to mint excessive amounts of the pegged asset against inflated collateral or redeem it for more underlying value than it's worth.

04

Governance & Minting Control

If an attacker gains control of a protocol's governance (e.g., via a token vote exploit), they can alter the minting parameters for a pegged asset. This allows them to mint unlimited, unbacked tokens or change collateral ratios, directly breaking the peg's trust model. This is a systemic risk for decentralized stablecoins with on-chain governance.

05

Related Concepts

  • Stablecoin: The most common target of peg attacks (e.g., algorithmic, collateralized).
  • Arbitrage: The market force that normally maintains a peg, which attackers deliberately disrupt.
  • Slippage: Extreme slippage during an attack accelerates the de-peg.
  • Flash Loan: A frequent tool used to finance the initial capital outlay for an attack.
  • Death Spiral: The catastrophic feedback loop that can result from a successful peg attack.
06

Defensive Measures

Protocols implement several guards against peg attacks:

  • Over-collateralization: Requiring more collateral value than minted asset value.
  • Circuit Breakers: Pausing mint/redemptions during extreme volatility.
  • Decentralized & Robust Oracles: Using multiple, time-weighted price feeds.
  • Liquidity Incentives: Encouraging deep, diversified liquidity pools to absorb sell pressure.
  • Gradual Parameter Changes: Time-locks and multi-sig controls on critical governance updates.
real-world-examples
HISTORICAL ATTACKS

Real-World Examples

Peg attacks are not theoretical; they are a persistent threat to the stability of algorithmic and collateralized stablecoins. These examples illustrate the mechanisms and consequences of major historical de-pegging events.

defensive-mechanisms
DEFENSIVE MECHANISMS & PROTOCOL DESIGN

Peg Attack

An attack vector targeting the stability mechanisms of assets designed to maintain a fixed value, such as algorithmic stablecoins or cross-chain bridges.

A peg attack is a deliberate market manipulation or exploit aimed at breaking the price peg of a token, causing it to deviate significantly from its intended value, such as $1 for a stablecoin. Attackers typically employ strategies like short-selling, creating massive sell pressure, or exploiting vulnerabilities in the protocol's minting/burning mechanisms or collateral ratios to trigger a death spiral or bank run. The primary goal is to profit from the ensuing volatility or to collapse the system entirely.

These attacks are most commonly associated with algorithmic stablecoins that lack direct fiat or over-collateralized backing, relying instead on complex, code-enforced supply adjustments. For example, an attacker might rapidly dump a large quantity of the stablecoin on a decentralized exchange, driving its price below peg. If the protocol's arbitrage mechanism is too slow, insufficient, or exploitable, it fails to correct the imbalance, allowing the depeg to persist and eroding user confidence.

Beyond stablecoins, peg attacks also target bridged assets (e.g., wBTC, multichain USDC) where the token on a secondary chain is supposed to be 1:1 redeemable for the canonical asset. Exploits of the bridge's custody or minting logic can create unbacked synthetic tokens, breaking the peg when users attempt redemption. Defensive designs against peg attacks include circuit breakers, dynamic fees, over-collateralization, decentralized oracle networks for accurate pricing, and time-locked mint/redeem functions to prevent flash loan exploits.

CAUSALITY COMPARISON

Peg Attack vs. Natural Depeg

A comparison of the root causes, mechanisms, and characteristics distinguishing a deliberate peg attack from a market-driven depeg event.

FeaturePeg Attack (Deliberate)Natural Depeg (Market-Driven)

Primary Cause

Deliberate exploitation of protocol mechanics or liquidity

Organic market forces (supply/demand, loss of confidence)

Triggering Actor

Malicious actor or coordinated group

Aggregate market participants

Speed of Onset

Rapid (minutes to hours)

Gradual (hours to days)

Typical Target

Specific vulnerability (e.g., oracle, liquidity pool)

Generalized market sentiment or macroeconomic factors

Arbitrage Response

Often ineffective or exploited by attacker

Typically functions to restore peg over time

Required Capital

High, but often leveraged via flash loans

N/A (driven by aggregate trading volume)

Preventative Focus

Protocol security and economic design

Monetary policy and reserve management

Example Scenario

Oracle manipulation to drain a stablecoin vault

Mass redemptions due to a bank run on reserves

PEG ATTACK

Frequently Asked Questions (FAQ)

A peg attack is a market event where the price of a stablecoin or other pegged asset deviates significantly from its intended value, often due to a loss of confidence or an exploit in its underlying mechanism.

A peg attack is a deliberate or emergent market action that causes a stablecoin or other pegged asset to lose its intended price parity with its target asset, such as the US dollar. This occurs when market participants lose confidence in the asset's ability to maintain its peg, leading to a rapid sell-off, or when an attacker exploits a vulnerability in the protocol's design to break the peg. The attack's goal is often to profit from the resulting price dislocation through arbitrage or short-selling.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team