{"id":27850,"date":"2023-08-07T12:52:56","date_gmt":"2023-08-07T16:52:56","guid":{"rendered":"https:\/\/cryptocornercafe.com\/cafe\/?p=27850"},"modified":"2023-08-07T12:52:56","modified_gmt":"2023-08-07T16:52:56","slug":"curve-finance-announces-1-85-million-bounty-for-stable-pool-exploiter","status":"publish","type":"post","link":"http:\/\/cryptocornercafe.com\/cafe\/2023\/08\/07\/curve-finance-announces-1-85-million-bounty-for-stable-pool-exploiter\/","title":{"rendered":"Curve Finance Announces $1.85 Million Bounty For Stable Pool Exploiter"},"content":{"rendered":"<p>Curve Finance, a popular decentralized (DeFi) protocol, has recently announced that it was rewarding persons capable of identifying the exploiters behind the draining of over $61 million from the platform\u2019s stable pools on July 30.\u00a0<\/p>\n<p>The huge bounty offer is open to every person who can pinpoint the individual behind the incident in such a way that would lead to definitive legal repercussions.\u00a0<\/p>\n<h2>Curve Finance Extends Bounty Offer to the Public<\/h2>\n<p>Curve Finance <a href=\"https:\/\/etherscan.io\/tx\/0xa28be0f8ebcf0e334bd19b1ef7bfac5e169ea40952ff5862d80254bba8e58e16\">announced<\/a> the public offer using an Ethereum transaction\u2019s input data, noting that the allowed time for the voluntary return of the funds connected to the Curve exploit was 08:00 UTC, and that time is now elapsed.\u00a0<\/p>\n<p>Curve and other protocols that were affected by the attack had previously <a href=\"https:\/\/www.newsbtc.com\/news\/curve-finance-fights-back-with-warning-and-unrefusable-offer-to-hacker\/\">offered<\/a> a 10% bug bounty to the hacker on August 3. Upon agreeing to the offer, the hacker <a href=\"https:\/\/www.newsbtc.com\/news\/curve-finance-exploiter-returns-61000-eth-after-protocols-stern-warning\/\">returned<\/a> part of the stolen assets to JPEGd and Alchemix but did not refund other affected pools.\u00a0<\/p>\n<p>Since the time allowed has elapsed, Curve announced that any person capable of identifying the hacker would receive assets worth $1.85 million. This recent announcement was extended in scope to include members of the general public.\u00a0<\/p>\n<p>According to Curve, while the deadline for the voluntary return of stolen funds had passed, should the hacker elect to return the stolen funds, the platform \u201c\u2026will not pursue this further.\u201d\u00a0<\/p>\n<p>While returning the parts of the funds earlier, the hacker left a message that was seemingly targeted at Curve and Alchemix teams, noting their intention to return the funds. However, the hacker stated that the decision to return such funds was not based on fear of being recognized but rather out of a desire not to \u201cruin\u201d the projects associated with the exploit.<\/p>\n\n<h2>The $61 Million Reentrancy Attack<\/h2>\n<p>Members of the Curve Finance community were left shocked after a hacker utilized vulnerable versions of the Vyper programming language to implement <a href=\"https:\/\/bitcoinist.com\/curve-dao-tokens-suffer-millions-in-hack\/\">reentrancy attacks<\/a> on stable pools within Curve Finance on the 31st of July.\u00a0<\/p>\n<p>The attack drained Curve Finance of over $61 million, including $13.6 million from Alchemix\u2019s aIETH-ETH, $11.4 million from JPEGd\u2019s pETH-ETH, and $1.6 million from Metronome\u2019s sETH-ETH. The event raised concerns about the likely fallout in the cryptocurrency ecosystem, especially with respect to the risks posed to every pool using Wrapped Ether (WETH).<\/p>\n<p>The DeFi community rallied around to provide support to Curve Finance and on the 31st of July, a white hat hacker was able to successfully recover from the exploiter about 2,879 Ether worth about $5.4 million, which was later returned to Curve Finance. Another ethical hacker also recovered about 3,000 ETH and refunded it to Curve Finance\u2019s deployer address.\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p><!-- wp:html --><\/p>\n<p>Curve Finance, a popular decentralized (DeFi) protocol, has recently announced that it was rewarding persons capable of identifying the exploiters behind the draining of over $61 million from the platform\u2019s stable pools on July 30.\u00a0<\/p>\n<p>The huge bounty offer is open to every person who can pinpoint the individual behind the incident in such a way that would lead to definitive legal repercussions.\u00a0<\/p>\n<h2>Curve Finance Extends Bounty Offer to the Public<\/h2>\n<p>Curve Finance <a href=\"https:\/\/etherscan.io\/tx\/0xa28be0f8ebcf0e334bd19b1ef7bfac5e169ea40952ff5862d80254bba8e58e16\">announced<\/a> the public offer using an Ethereum transaction\u2019s input data, noting that the allowed time for the voluntary return of the funds connected to the Curve exploit was 08:00 UTC, and that time is now elapsed.\u00a0<\/p>\n<p>Curve and other protocols that were affected by the attack had previously <a href=\"https:\/\/www.newsbtc.com\/news\/curve-finance-fights-back-with-warning-and-unrefusable-offer-to-hacker\/\">offered<\/a> a 10% bug bounty to the hacker on August 3. Upon agreeing to the offer, the hacker <a href=\"https:\/\/www.newsbtc.com\/news\/curve-finance-exploiter-returns-61000-eth-after-protocols-stern-warning\/\">returned<\/a> part of the stolen assets to JPEGd and Alchemix but did not refund other affected pools.\u00a0<\/p>\n<p>Since the time allowed has elapsed, Curve announced that any person capable of identifying the hacker would receive assets worth $1.85 million. This recent announcement was extended in scope to include members of the general public.\u00a0<\/p>\n<p>According to Curve, while the deadline for the voluntary return of stolen funds had passed, should the hacker elect to return the stolen funds, the platform \u201c\u2026will not pursue this further.\u201d\u00a0<\/p>\n<p>While returning the parts of the funds earlier, the hacker left a message that was seemingly targeted at Curve and Alchemix teams, noting their intention to return the funds. However, the hacker stated that the decision to return such funds was not based on fear of being recognized but rather out of a desire not to \u201cruin\u201d the projects associated with the exploit.<\/p>\n<h2>The $61 Million Reentrancy Attack<\/h2>\n<p>Members of the Curve Finance community were left shocked after a hacker utilized vulnerable versions of the Vyper programming language to implement <a href=\"https:\/\/bitcoinist.com\/curve-dao-tokens-suffer-millions-in-hack\/\">reentrancy attacks<\/a> on stable pools within Curve Finance on the 31st of July.\u00a0<\/p>\n<p>The attack drained Curve Finance of over $61 million, including $13.6 million from Alchemix\u2019s aIETH-ETH, $11.4 million from JPEGd\u2019s pETH-ETH, and $1.6 million from Metronome\u2019s sETH-ETH. The event raised concerns about the likely fallout in the cryptocurrency ecosystem, especially with respect to the risks posed to every pool using Wrapped Ether (WETH).<\/p>\n<p>The DeFi community rallied around to provide support to Curve Finance and on the 31st of July, a white hat hacker was able to successfully recover from the exploiter about 2,879 Ether worth about $5.4 million, which was later returned to Curve Finance. Another ethical hacker also recovered about 3,000 ETH and refunded it to Curve Finance\u2019s deployer address.\u00a0<\/p>\n<p><!-- \/wp:html --><\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[82],"tags":[],"class_list":["post-27850","post","type-post","status-publish","format-standard","hentry","category-blockchain"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"http:\/\/cryptocornercafe.com\/cafe\/wp-json\/wp\/v2\/posts\/27850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/cryptocornercafe.com\/cafe\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cryptocornercafe.com\/cafe\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/cryptocornercafe.com\/cafe\/wp-json\/wp\/v2\/comments?post=27850"}],"version-history":[{"count":0,"href":"http:\/\/cryptocornercafe.com\/cafe\/wp-json\/wp\/v2\/posts\/27850\/revisions"}],"wp:attachment":[{"href":"http:\/\/cryptocornercafe.com\/cafe\/wp-json\/wp\/v2\/media?parent=27850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cryptocornercafe.com\/cafe\/wp-json\/wp\/v2\/categories?post=27850"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cryptocornercafe.com\/cafe\/wp-json\/wp\/v2\/tags?post=27850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}