// BEGIN ENQUEUE PARENT ACTION // AUTO GENERATED - Do not modify or remove comment markers above or below: if ( !function_exists( 'chld_thm_cfg_locale_css' ) ): function chld_thm_cfg_locale_css( $uri ){ if ( empty( $uri ) && is_rtl() && file_exists( get_template_directory() . '/rtl.css' ) ) $uri = get_template_directory_uri() . '/rtl.css'; return $uri; } endif; add_filter( 'locale_stylesheet_uri', 'chld_thm_cfg_locale_css' ); if ( !function_exists( 'chld_thm_cfg_parent_css' ) ): function chld_thm_cfg_parent_css() { wp_enqueue_style( 'chld_thm_cfg_parent', trailingslashit( get_template_directory_uri() ) . 'style.css', array( 'font-awesome-v5','bootstrap','sidr','magnific-popup','sliderpro' ) ); wp_enqueue_script('custom-script', get_stylesheet_directory_uri() . '/custom-script.js', array('jquery')); } endif; add_action( 'wp_enqueue_scripts', 'chld_thm_cfg_parent_css', 10 ); // END ENQUEUE PARENT ACTION add_action( 'admin_enqueue_scripts', 'my_cfg_admin_enqueue' ); function my_cfg_admin_enqueue(){ wp_enqueue_script('custom-script', get_stylesheet_directory_uri() . '/custom-script.js', array('jquery')); wp_enqueue_style('style-cfg-child', get_stylesheet_uri(), array(), "4.2"); } add_action( 'after_setup_theme', 'remove_plugin_image_sizes', 999 ); function remove_plugin_image_sizes(){ remove_image_size( '2048x2048' ); remove_image_size( '1536x1536' ); remove_image_size( 'large' ); } function action_dynamic_sidebar_after( $array ) { if($array == "home-content-widgets") { echo the_content(); } }; add_action( 'dynamic_sidebar_after', 'action_dynamic_sidebar_after', 10, 1 ); add_action( 'trashed_post', 'mtp_delete_attached_thumbnail_for_trashed_product', 20, 1 ); function mtp_delete_attached_thumbnail_for_trashed_product( $post_id ) { // gets ID of post being trashed $post_type = get_post_type( $post_id ); // does not run on other post types if ( $post_type != 'post' ) { return true; } // get ID of featured image $post_thumbnail_id = get_post_thumbnail_id( $post_id ); // delete featured image wp_delete_attachment( $post_thumbnail_id, true ); }/** * The header for our theme * * This is the template that displays all of the section and everything up until
* * @link https://developer.wordpress.org/themes/basics/template-files/#template-partials * * @package CoverNews */ ?> Exploited MEV Bot Incurs $2M Loss in Curve Pool Swaps: Data – CoinsMegaNews

Exploited MEV Bot Incurs $2M Loss in Curve Pool Swaps: Data

Curve Finance Hacker Returns $5.4 Million, But CRV Dumps 15%

[ad_1]

According to PeckShield Alert data, an unknown Miner Extractable Value (MEV) bot has fallen victim to a hack, causing a loss of approximately $2 million.

The incident, which took place in the renowned curve pools, has led to multiple large swaps and subsequent reverse swap arbitrage.

Attacker Manipulates Curve Pool

The exploitation occurred when the arbitrage function, 0xf6ebebbb(), lacked proper authentication, providing an open door for the attacker to manipulate swaps across multiple curve pools. This malicious activity resulted in significant slippage, causing substantial losses for the affected parties.

As the situation unfolded, the attacker cunningly reversed the swaps to maximize their profits, compounding the impact of this incident.

The attacker exploited an arbitrage bot, resulting in a loss of $2.3 million through the Curve pool. They discovered an exposed function within the bot, which enabled them to trigger a transaction from Wrapped Ether (WETH) to Wrapped Bitcoin (WBTC).

Subsequently, they executed a flash loan for 27,255 WETH (equivalent to $51.36 million), utilizing it to significantly manipulate the price ratio of WETH/WBTC within the Curve pool.

By destabilizing the pool, the attacker compelled the arbitrage bot to convert 1,339.8 WETH (approximately $2.52 million) into 6.95 WBTC (around $244,000).

It is important to note that the owner of the MEV bot had already withdrawn funds from the contract prior to the attack.

Curve Finance Prior Exploits

On July 30, 2023, a series of exploitations occurred in multiple liquidity pools on Curve Finance, resulting in losses of approximately $70 million. This incident raised significant concerns within the DeFi community. The attacks were made possible due to a vulnerability in Vyper, a third-party Pythonic programming language utilized by Ethereum smart contracts, including those of Curve and other decentralized protocols.

It is important to note that, following the initial incident, both white hat hackers and Miner Extractable Value (MEV) bot operators collaborated to recover a portion of the lost funds. As a result, the final value of the losses may be lower than the initial reports suggested.

Less than a week after the exploit, the hacker returned 4,820 alETH and 2,258 ETH to Alchemix, which amounted to approximately $12.7 million.

On August 6, 2023, Curve Finance announced via Twitter that the deadline for the hacker to voluntarily return the remaining funds had passed. As a result, the company extended its bounty offer of $1.85 million to anyone who could identify the hacker.

SPECIAL OFFER (Sponsored)
Binance Free $100 (Exclusive): Use this link to register and receive $100 free and 10% off fees on Binance Futures first month (terms).



[ad_2]

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

/** * The template for displaying the footer * * Contains the closing of the #content div and all content after. * * @link https://developer.wordpress.org/themes/basics/template-files/#template-partials * * @package CoverNews */ ?>