Decentralized finance (DeFi) protocol, Curve Finance reportedly recovers about $5.4M of stolen funds through an ethical hacker. The white hat hacker managed to retrieve 2,879 ETH and returned it to the decentralized exchange after its recent attack. The latest update was reported on Twitter by Peckshield Alert.
On July 30, Curve Finance experienced exploits on several stablepools which were caused by a vulnerability in reentrancy locks on several versions of the Vyper programming language.
At the time, Curve Finance’s losses are estimated to be over $47 million. According to Vyper, some of its versions including 0.2.15, 0.2.16, and 0.3.0 are vulnerable to malfunctioning reentrancy locks.
PSA: Vyper versions 0.2.15, 0.2.16 and 0.3.0 are vulnerable to malfunctioning reentrancy locks. The investigation is ongoing but any project relying on these versions should immediately reach out to us.
Vyper vulnerability further exposed the DeFi ecosystem to a stress test as other decentralized finance protocols using the vulnerable versions were also exploited. Some of the stolen assets were retrieved that day by the ethical hacker, who then gave them back to Curve Finance.
To secure over 3,000 ETH, an MEV bot operator with the identity “c0ffeebabe.eth” utilized a front-running bot against a hostile hacker. The funds were subsequently sent back to the Curve deployer address, which appears to be the correct custodian.
Meanwhile, fake Twitter accounts impersonating Curve Finance are promoting a fake refund campaign which appears to be a form of a phishing scam. The scam targets victims of the recent hack.
When properly observed, the impersonating account has an “L” before “Curve Finance” on its Twitter username which might not be very visible to users if not properly checked.
According to the scam promo, there is an “emergency CRV distribution” to all users who have interacted with Curve Finance and its affiliates.
Fake curve finance account. Source: Twitter
In the meantime, the Vyper vulnerability has also led to copycat attacks against BNB Smart Chain. Data from BlockSec – a Blockchain security company, shows that through three vulnerabilities, almost $73,000 was lost.
Also, the Securities and Exchange Commission has set out new rules regarding cyber attacks involving public companies in the United States. Per the new rule, companies affected are to disclose the attack four days after it has been considered as “material.”
Special Offer (SPONSORED)
Binance Free $200 (Exclusive): Use this link to register and receive $200 free trading fee credit (terms).
"3Commas Trading Bot" Special Offer: Use this link to Sign up with 3Commas and get 10% off your first monthly subscription.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
COMMENTS