Curve Finance Offers $1.85 Million Public Bounty to Find Hacker
A week ago, the decentralized finance (DeFi) platform Curve Finance faced a major exploit with hackers stealing north of $60 million in funds. After a week of failing to meet the deadline to return the funds, Curve Finance has decided to drag the exploiter to court and pursue the case further.
Curve and other protocols impacted by the attack tried to stop the hacker and offered them a reward of 10% of the stolen funds, totaling more than $6 million. The hacker accepted the offer and returned some of the stolen assets to Alchemix and JPEGd.
However, it didn’t complete refunds to other affected pools. Now, since the deadline has passed, Curve Finance is offering a public bounty. Thus, anyone identifying the attacker shall receive rewards with assets worth $1.85 million. In an on-chain message, Curve Finance noted:
“The deadline for the voluntary return of funds in the Curve exploit passed at 0800 UTC. We now extend the bounty to the public, and offer a reward valued at 10% of remaining exploited funds (currently $1.85M USD) to the person who is able to identify the exploited in a way that leads to a conviction in the courts,” adding that “if the exploiter chooses to return the funds in full, we will not pursue this further.”
Curve Finance Stablecoin Restores
After a strong fall last week, it seems that Curve Finance’s native stablecoin crvUSD has restored its dollar peg.
— Curve Finance (@CurveFinance) August 6, 2023
Before returning the stolen funds, the attacker sent a message to the Alchemix and Curve teams, saying that they were doing it not because they were afraid of being caught, but because they didn’t want to harm their projects. “I’m refunding not because you can find me, it’s because I don’t want to ruin your project,” as per the on-chain message by the attacker.
The attack took place on July 30 and resulted in more than $61 million being stolen from Curve’s pools, including large amounts from Alchemix’s, JPEGd’s, and Metronome’s pools. The attacker used a technique called reentrancy attacks on vulnerable versions of the Vyper programming language to target stable pools.
- Trump Tariff Tensions Ease as U.S. and China Hold Positive Trade Talks Ahead of Oct 30 Summit
- Polymarket Hits $20B in Trading Volume, Announces Plans for Massive POLY Token Airdrop
- James Wynn Takes XRP Long Bet After Ripple Prime Announcement
- Nasdaq-Listed Bonk Holdings Makes First Major Purchase of $32M, Nears 3% of Total Supply
- Binance-based Meme Coin GIGGLE Fund Shoots 145% on Exchange Listing News
- PEPE Coin Price Prediction as Weekly Outflows Hit $17M – Is Rebound Ahead?
- HBAR Price Targets 50% Jump as Hedera Unleashes Massive Staking Move
- Chainlink Price Outlook: Analyst Predicts $100 as Reserve Adds 63K LINK
- SUI Price Prediction as TVL and Monthly DEX Volume Hit All-Time Highs- What’s Next?
- PUMP Price Prediction as Whales Accumulate 4.2B Tokens- Is 135% Rally Next?
- Dogecoin Price Crash Looms as Flag, Death Cross, Falling DOGE ETF Inflows Coincide