When hackers exploited wise contract vulnerabilities, the platform confirmed that the decentralization exchange Agrigator one inch lost $ 5 million in cryptocurrency.
On March 5, the 1 -inch confirmed the vulnerability that affects resolvers using the old Fusion V1 implementation.
source: 1 inch network
Trace $ 5 million in one inch hack
On March 7, the blockchain security company SLOWMIST was found through an onChain survey that one -inch hackers were made of 2.4 million USDCs (USDC) and 1276 packaging ether tokens.
source: Slow Mist
According to one inch, hacking stole funds from Resolvers using Fusion V1 in its own contract, and the end user funds were safe.
“We are actively working with Resolvers, which are affected to protect the system. We urge all resolvers to be thankful and updated immediately. ”
The platform has announced the BUG BOUNTY program to secure other basic system vulnerabilities and recover the stolen funds.
relevant: $ 1.5B encryption hacking loss exposes bug bounty defects.
An attempt to recover the stolen funds is slim unless the hacker agrees to return. Previously, compromised encryption protocols were able to recover their funds after agreement with attackers to maintain 10%of the fund with white hat bounty, as shown in the encryption loan agency SHEZMU.
Nevertheless, the $ 1.5 billion North Korean hackers, called Crypto’s largest attack, succeeded in searning the entire amount despite the adjusted efforts to recover the loss of the Krypto community.
The hacker stole BYBIT’s various liquid steak ethers, Mantle Staked ETH (Meth) and other ERC-20 tokens.
BYBIT on a slow road to recovery
Despite the sudden loss of funds, BYBIT was able to quickly withdraw money from other encryption companies to quickly withdraw funds.
It took 10 days for the BYBIT hackers to wash $ 1.4 billion worth of stolen cryptocurrency. According to DEDDY LAVID, co -founder and CEO of blockchain security firm CYVERS, some of the laundry funds can still be tracked despite asset swaps.
“Washing through a mixer and cross chain swap is recovering, while cyber security companies use the onchain Intelligence, AI drive model, and exchange and regulatory cooperation still have a small opportunity to track assets and potentially freeze.”
Thorchain, a Crosschain Swap protocol, is known to have been widely used by hackers in Siphon Funds, which has surged after bicon nucleus.
magazine: Mystery Eleb Memecoin Scam Factory, HK Company Dump Bitcoin: Asia Express