Connect with us

News

Kyberswap loses $265,000 to attack, offers a 15% bug bounty

Published

on

Kyberswap announced an attack on its platform that involved $265,000 stolen from two addresses.

https://twitter.com/KyberNetwork/status/1565421305410686976?t=Mlvv_N1i6D8XlGClA8x6bQ&s=19

Kyberswap is a decentralized exchange (DEX) aggregator and liquidity protocol where users can easily trade tokens. It’s built on the Kyber network.

The Kyberswap team discovered a fraudulent act from its frontend which resulted in stolen funds. After investigations, “a malicious code in our Google Tag Manager (GTM)” was found, and deactivated.

Read also:

Hodlnaut lose over $190 million, files for creditors protection

Bitcoin: Mt. Gox updates repayment plans

Inverse Finance Suffers Another Flash Loan Exploit

Users will be compensated

The team shared in a tweet that the owners of the two wallets that were attacked will be compensated for the loss, and other users were assured that the platform is still fully functional.

“KyberSwap functions including swap aggregator,” said the team, “adding liquidity, and farming,” are all available and can be accessed without difficulties. However, they advise that users, as well as teams of other DeFi projects, be alert.

Furthermore, the team gave directions to users whose accounts have been linked with the “malicious script”, on how to deactivate such links.

In addition to the recovery steps, the team offered 15% of the stolen funds as a bug bounty to the attacker for a refund of the stolen assets. “We know your addresses and interactions,” asserted the team to the attacker, as all major Centralized exchanges have been told about the act.

0 0 votes
Article Rating
Continue Reading
Advertisement Earnathon.com
1 Comment
0 0 votes
Article Rating
Subscribe
Notify of
guest

1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Crypto News Update

Latest Episode on Inside Blockchain

Crypto Street

Advertisement



Trending

ALL Sections

Recent Posts

1
0
Would love your thoughts, please comment.x
()
x