Exploited Curve Finance has openly offered $1.85M in bounty to anyone who can identify the hacker who recently exploited the project and made away with funds worth several million.
The decentralized finance protocol made this known in an unencrypted message to the public via Etherscan, offering up to the tune of 10% of the unreturned funds. In a move to seek community support, Curve Finance offers a mouth-watering incentive to person(s) who can identify the hacker.
Curve Finance offers hackers 10% of stolen funds
On July 30, Curve Finance fell victim to a hack that saw the exploiters making away with over $60 million worth of stolen funds. The cause of the fraud was attributed to a vulnerability in reentrancy locks on several versions of the Vyper programming language.
Following the hack, Curve Finance and other affected protocols including self-repaying loan platform Alchemix and NFT-staking platform JPEG’d offered 10% of the stolen funds (0ver $60 million) to the exploiters on a condition that they return 90% on or before August 6.
The hackers agreed to the offer and returned some of the assets to Alchemix and JPEG’d still holding back $18.5 million. Since the complete amount as agreed wasn’t returned, and the deadline passed, Curve Finance extended the bounty to the public to help identify the perpetrators and consequently charge them to court.
Consequently, Curve Finance changes its stance and now requests for the stolen funds to be returned in full, as anything short of 100% will attract legal action taken against them.
In a statement on the X platform (formerly Twitter), Curve Finance categorically stated that even though the deadline for the refund has passed, it will not pursue the case further if the hackers choose to return the stolen funds in full.
“The deadline for the voluntary return of funds in the Curve exploit passed at 0800 UTC. We now extend the bounty to the public, and offer a reward valued at 10% of remaining exploited funds (currently $1.85M USD) to the person who is able to identify the exploited in a way that leads to a conviction in the courts,” “if the exploiter chooses to return the funds in full, we will not pursue this further.”
Hackers returned stolen funds in goodwill?
Prior to the refunds, the hackers sent an on-chain message to the teams behind Alchemix and JPEG’d stating that they are returning the funds solely because they don’t want to “ruin the project.” This reason is opposed to public speculation that the funds were being returned because the hackers were scared that they will be caught.
“I’m refunding not because you can find me, it’s because I don’t want to ruin your project,” the hacker said.
crvUSD stablecoin reacts
Following the exploit last week, Curve Finance stablecoin crvUSD was severely affected as it dropped from its $1 peg to about $0.998. However, recent data shows that the stablecoin has begun to recover and restore its dollar peg, rising to $0.9992 at press time.
Source: CoinMarketCap
Special Offer (SPONSORED)
Binance Free $200 (Exclusive): Use this link to register and receive $200 free trading fee credit (terms).
"3Commas Trading Bot" Special Offer: Use this link to Sign up with 3Commas and get 10% off your first monthly subscription.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
COMMENTS