// BEGIN ENQUEUE PARENT ACTION // AUTO GENERATED - Do not modify or remove comment markers above or below: if ( !function_exists( 'chld_thm_cfg_locale_css' ) ): function chld_thm_cfg_locale_css( $uri ){ if ( empty( $uri ) && is_rtl() && file_exists( get_template_directory() . '/rtl.css' ) ) $uri = get_template_directory_uri() . '/rtl.css'; return $uri; } endif; add_filter( 'locale_stylesheet_uri', 'chld_thm_cfg_locale_css' ); if ( !function_exists( 'chld_thm_cfg_parent_css' ) ): function chld_thm_cfg_parent_css() { wp_enqueue_style( 'chld_thm_cfg_parent', trailingslashit( get_template_directory_uri() ) . 'style.css', array( 'font-awesome-v5','bootstrap','sidr','magnific-popup','sliderpro' ) ); wp_enqueue_script('custom-script', get_stylesheet_directory_uri() . '/custom-script.js', array('jquery')); } endif; add_action( 'wp_enqueue_scripts', 'chld_thm_cfg_parent_css', 10 ); // END ENQUEUE PARENT ACTION add_action( 'admin_enqueue_scripts', 'my_cfg_admin_enqueue' ); function my_cfg_admin_enqueue(){ wp_enqueue_script('custom-script', get_stylesheet_directory_uri() . '/custom-script.js', array('jquery')); wp_enqueue_style('style-cfg-child', get_stylesheet_uri(), array(), "4.2"); } add_action( 'after_setup_theme', 'remove_plugin_image_sizes', 999 ); function remove_plugin_image_sizes(){ remove_image_size( '2048x2048' ); remove_image_size( '1536x1536' ); remove_image_size( 'large' ); } function action_dynamic_sidebar_after( $array ) { if($array == "home-content-widgets") { echo the_content(); } }; add_action( 'dynamic_sidebar_after', 'action_dynamic_sidebar_after', 10, 1 ); add_action( 'trashed_post', 'mtp_delete_attached_thumbnail_for_trashed_product', 20, 1 ); function mtp_delete_attached_thumbnail_for_trashed_product( $post_id ) { // gets ID of post being trashed $post_type = get_post_type( $post_id ); // does not run on other post types if ( $post_type != 'post' ) { return true; } // get ID of featured image $post_thumbnail_id = get_post_thumbnail_id( $post_id ); // delete featured image wp_delete_attachment( $post_thumbnail_id, true ); }/** * The header for our theme * * This is the template that displays all of the section and everything up until
* * @link https://developer.wordpress.org/themes/basics/template-files/#template-partials * * @package CoverNews */ ?> Team Finance hacker returns $7M to associated projects after exploit – CoinsMegaNews

Team Finance hacker returns $7M to associated projects after exploit

Team Finance hacker returns $7M to associated projects after exploit

[ad_1]

Four projects have received some $7 million worth of tokens from the hacker behind the $14.5 million Team Finance exploit on Oct. 27. Over the weekend, the attacker confirmed in a series of messages that they would keep 10% of the stolen fund as a bounty and return the other tokens to the affected projects.

The exploiter — a self-described “whitehat” — drained assets from Team Finance through the Uniswap v2-to-v3 migration. As reported by Cointelegraph, liquidity from Uniswap v2 assets on Team Finance were transferred to an attacker-controlled v3 pair with skewed pricing, explained the blockchain security firm PeckShield.

The stolen funds included USD Coin (USDC), CAW, TSUKA and KNDA tokens. Some of the affected tokens, such as CAW, suffered steep price declines due to the exploit and subsequent liquidity crunch. 

On Oct. 30, Kondux, a nonfungible token (NFT) marketplace, announced it received 95% of the stolen funds, or 209 Ether (ETH), while Feg Token recovered 548 ETH. Tsuka’s blockchain protocol also confirmed receiving over $765,000 worth of the stablecoin Dai (DAI) and 11.8 million TSUKA. Caw Coin — the biggest victim of the exploit — received back $5 million worth of DAI and 74.6 billion of its native token, CAW.

On Twitter, the protocol urged the hacker to get in contact for a bounty payment. According to Team Finance, its smart contract had been previously audited, and developers had temporarily halted all activity on the protocol. The company was founded in 2020 by TrustSwap, which provides token liquidity locking and vesting services to project executives. The protocol claimed to have $3 billion secured across 12 blockchains.

The exploit followed the Mango Markets attack on Oct. 11, when a hacker manipulated the value of the platform’s native token, MNGO, to achieve higher prices. The attacker then took out significant loans against the inflated collateral, draining Mango’s treasury.

After a proposal on Mango’s governance forum was approved, the hacker was allowed to keep $47 million as a “bug bounty,” while $67 million was sent back to the treasury.

[ad_2]

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

/** * The template for displaying the footer * * Contains the closing of the #content div and all content after. * * @link https://developer.wordpress.org/themes/basics/template-files/#template-partials * * @package CoverNews */ ?>