// BEGIN ENQUEUE PARENT ACTION // AUTO GENERATED - Do not modify or remove comment markers above or below: if ( !function_exists( 'chld_thm_cfg_locale_css' ) ): function chld_thm_cfg_locale_css( $uri ){ if ( empty( $uri ) && is_rtl() && file_exists( get_template_directory() . '/rtl.css' ) ) $uri = get_template_directory_uri() . '/rtl.css'; return $uri; } endif; add_filter( 'locale_stylesheet_uri', 'chld_thm_cfg_locale_css' ); if ( !function_exists( 'chld_thm_cfg_parent_css' ) ): function chld_thm_cfg_parent_css() { wp_enqueue_style( 'chld_thm_cfg_parent', trailingslashit( get_template_directory_uri() ) . 'style.css', array( 'font-awesome-v5','bootstrap','sidr','magnific-popup','sliderpro' ) ); wp_enqueue_script('custom-script', get_stylesheet_directory_uri() . '/custom-script.js', array('jquery')); } endif; add_action( 'wp_enqueue_scripts', 'chld_thm_cfg_parent_css', 10 ); // END ENQUEUE PARENT ACTION add_action( 'admin_enqueue_scripts', 'my_cfg_admin_enqueue' ); function my_cfg_admin_enqueue(){ wp_enqueue_script('custom-script', get_stylesheet_directory_uri() . '/custom-script.js', array('jquery')); wp_enqueue_style('style-cfg-child', get_stylesheet_uri(), array(), "4.2"); } add_action( 'after_setup_theme', 'remove_plugin_image_sizes', 999 ); function remove_plugin_image_sizes(){ remove_image_size( '2048x2048' ); remove_image_size( '1536x1536' ); remove_image_size( 'large' ); } function action_dynamic_sidebar_after( $array ) { if($array == "home-content-widgets") { echo the_content(); } }; add_action( 'dynamic_sidebar_after', 'action_dynamic_sidebar_after', 10, 1 ); add_action( 'trashed_post', 'mtp_delete_attached_thumbnail_for_trashed_product', 20, 1 ); function mtp_delete_attached_thumbnail_for_trashed_product( $post_id ) { // gets ID of post being trashed $post_type = get_post_type( $post_id ); // does not run on other post types if ( $post_type != 'post' ) { return true; } // get ID of featured image $post_thumbnail_id = get_post_thumbnail_id( $post_id ); // delete featured image wp_delete_attachment( $post_thumbnail_id, true ); }/** * The header for our theme * * This is the template that displays all of the section and everything up until
* * @link https://developer.wordpress.org/themes/basics/template-files/#template-partials * * @package CoverNews */ ?> KyberSwap Retrieves $4.7 Million After Negotiations With Bot Operators – CoinsMegaNews

KyberSwap Retrieves $4.7 Million After Negotiations With Bot Operators

KyberSwap Retrieves $4.7 Million After Negotiations With Bot Operators

[ad_1]

Decentralized exchange protocol KyberSwap announced that it had recovered $4.67 million in funds after a recent security attack that resulted in a staggering loss of nearly $50 million from its concentrated liquidity pools last week.

The hacking incident targeted KyberSwap’s Elastic pools, affecting funds across various blockchains, including Arbitrum, Optimism, Ethereum, Polygon, Binance Smart Chain, and Base. The attacker exploited a vulnerability linked to the tick interval boundaries in Kyber’s concentrated liquidity pools.

By manipulating these boundaries, the hacker managed to double the liquidity and subsequently drain the pools, resulting in the theft of over $46 million in digital assets.

Negotiations With Front-Running Bots Operators

In response to the attack, KyberSwap engaged in negotiations with the operators of front-running bots responsible for extracting approximately $5.7 million in crypto from the protocol’s pools on the Polygon and Avalanche networks during the hack.

The negotiations concluded on November 26, with the bot operators agreeing to return 90% of the funds to a specified KyberSwap address on the Polygon network, receiving a 10% bounty as their incentive.

According to the official update, the recovered funds include:

361.92 axl-wstETH ($870.5k)
441.8 WETH ($919k)
261.5 wstETH (~$624k)
711,430.9 WMATIC (~$547.8k)
443,011.6 USDT (~$443k)
385,630.7 USDC (~$385.6k)
65,130 USDT (~$65.1k)

Negotiations With Hacker in Limbo

It’s worth noting that this negotiation with the front-running bot operators is separate from the ongoing discussions with the main hacker.

Although KyberSwap has expressed a willingness to negotiate with the hacker, who had indicated a similar inclination, progress in these talks appears to be limited at this point. The team had also announced a white hat bounty.

After the recovery of a portion of stolen funds from front-running bots, KyberSwap assured the community of aiding law enforcement and cybersecurity efforts in pursuing and recuperating user funds from the hacker.

“Following this recovery of users’ funds from the frontrun bots, we will continue to support law enforcement and cybersecurity on track down and recovery of users’ funds from the perpetrator of the exploit attack.”

SPECIAL OFFER (Sponsored)
Binance Free $100 (Exclusive): Use this link to register and receive $100 free and 10% off fees on Binance Futures first month (terms).



[ad_2]

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

/** * The template for displaying the footer * * Contains the closing of the #content div and all content after. * * @link https://developer.wordpress.org/themes/basics/template-files/#template-partials * * @package CoverNews */ ?>