• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Blockchain

Analyzing SushiSwap’s next steps as it recovers from the latest exploit

Himalay Patel by Himalay Patel
April 13, 2023
Reading Time: 3 mins read
0
Analyzing SushiSwap’s next steps as it recovers from the latest exploit
  • SushiSwap initiates plans to refund users affected by recent exploits.
  • The protocol approached Lido for assistance as massive amounts of the stolen funds were sent to the protocol.

Over the last few days, popular DEX  SushiSwap [SUSHI], became a victim of an exploit, resulting in the loss of millions of dollars. The vulnerability was due to a bug related to the “approve” function in the SushiSwap Router Processor 2 contracts.


Read SUSHI’s Price Prediction 2023-2024


The vulnerability invalidated the inputs given by the users. It also enabled the attacker to create a malicious router parameter that directed users to an attacker-controlled pool.

However, the SushiSwap team was swift in its response and began to formulate plans to fix the issues pertaining to the problem immediately.

SushiSwap announced on 12 April how it will be transferring funds to victims of the recent exploit.

🚨 RouteProcessor2 Exploit & User Refund Update!

🧵 Read the below thread about: what’s next for affected user funds and what processes we’re setting up to return user funds.

🖥️ Firstly, please know that Sushi’s Swap web app is safe to use now!

🪡👇🏼

— Sushi.com (@SushiSwap) April 12, 2023

White hats and black hats

There will be two sets of users who will be receiving the refunds. The first would be those whose funds were acquired in a white hat exploit. A white hat exploit is a security vulnerability discovered and exploited by an ethical hacker or a security team.

The intention is to identify and report vulnerabilities to the system owner for fixing, rather than causing harm or damage.

Users impacted by the white hat exploit are safe as their funds exist in a contract and will be returned. However, users who have been affected by the black hat attack will have to submit an email to SushiSwap so that the protocol can verify whether the user’s address was impacted.

A friend in need

The SushiSwap protocol also reached out to the Lido protocol to help in collecting user funds so that they can be reimbursed to the users.

SushiSwap approached Lido because some of the malicious transactions that took place were built by independent block builders. And in one case a substantial amount of ETH was transferred as an MEV reward to the block builder that then redirected to Lido Execution Rewards Vault.

The team at SushiSwap also has reason to believe that about 78 ETH was sent to the Lido Treasury, which could be an easy starting point for recovering some of the funds that have been lost.


Realistic or not, here’s SUSHI market cap in BTC’s terms


Even though the actions taken by SushiSwap to safeguard their users were swift, the protocol’s performance got impacted nonetheless. According to data from Token Terminal, the number of daily active users and the revenue collected by the protocol declined.

Source: token terminal

Buy JNews
ADVERTISEMENT
  • SushiSwap initiates plans to refund users affected by recent exploits.
  • The protocol approached Lido for assistance as massive amounts of the stolen funds were sent to the protocol.

Over the last few days, popular DEX  SushiSwap [SUSHI], became a victim of an exploit, resulting in the loss of millions of dollars. The vulnerability was due to a bug related to the “approve” function in the SushiSwap Router Processor 2 contracts.


Read SUSHI’s Price Prediction 2023-2024


The vulnerability invalidated the inputs given by the users. It also enabled the attacker to create a malicious router parameter that directed users to an attacker-controlled pool.

However, the SushiSwap team was swift in its response and began to formulate plans to fix the issues pertaining to the problem immediately.

SushiSwap announced on 12 April how it will be transferring funds to victims of the recent exploit.

🚨 RouteProcessor2 Exploit & User Refund Update!

🧵 Read the below thread about: what’s next for affected user funds and what processes we’re setting up to return user funds.

🖥️ Firstly, please know that Sushi’s Swap web app is safe to use now!

🪡👇🏼

— Sushi.com (@SushiSwap) April 12, 2023

White hats and black hats

There will be two sets of users who will be receiving the refunds. The first would be those whose funds were acquired in a white hat exploit. A white hat exploit is a security vulnerability discovered and exploited by an ethical hacker or a security team.

The intention is to identify and report vulnerabilities to the system owner for fixing, rather than causing harm or damage.

Users impacted by the white hat exploit are safe as their funds exist in a contract and will be returned. However, users who have been affected by the black hat attack will have to submit an email to SushiSwap so that the protocol can verify whether the user’s address was impacted.

A friend in need

The SushiSwap protocol also reached out to the Lido protocol to help in collecting user funds so that they can be reimbursed to the users.

SushiSwap approached Lido because some of the malicious transactions that took place were built by independent block builders. And in one case a substantial amount of ETH was transferred as an MEV reward to the block builder that then redirected to Lido Execution Rewards Vault.

The team at SushiSwap also has reason to believe that about 78 ETH was sent to the Lido Treasury, which could be an easy starting point for recovering some of the funds that have been lost.


Realistic or not, here’s SUSHI market cap in BTC’s terms


Even though the actions taken by SushiSwap to safeguard their users were swift, the protocol’s performance got impacted nonetheless. According to data from Token Terminal, the number of daily active users and the revenue collected by the protocol declined.

Source: token terminal

RELATED POSTS

Why Bitcoin will not retest $20,000 anytime soon

TRON bulls could push for another 5% hike given…

Cardano at a crucial juncture: What it means for ADA

  • SushiSwap initiates plans to refund users affected by recent exploits.
  • The protocol approached Lido for assistance as massive amounts of the stolen funds were sent to the protocol.

Over the last few days, popular DEX  SushiSwap [SUSHI], became a victim of an exploit, resulting in the loss of millions of dollars. The vulnerability was due to a bug related to the “approve” function in the SushiSwap Router Processor 2 contracts.


Read SUSHI’s Price Prediction 2023-2024


The vulnerability invalidated the inputs given by the users. It also enabled the attacker to create a malicious router parameter that directed users to an attacker-controlled pool.

However, the SushiSwap team was swift in its response and began to formulate plans to fix the issues pertaining to the problem immediately.

SushiSwap announced on 12 April how it will be transferring funds to victims of the recent exploit.

🚨 RouteProcessor2 Exploit & User Refund Update!

🧵 Read the below thread about: what’s next for affected user funds and what processes we’re setting up to return user funds.

🖥️ Firstly, please know that Sushi’s Swap web app is safe to use now!

🪡👇🏼

— Sushi.com (@SushiSwap) April 12, 2023

White hats and black hats

There will be two sets of users who will be receiving the refunds. The first would be those whose funds were acquired in a white hat exploit. A white hat exploit is a security vulnerability discovered and exploited by an ethical hacker or a security team.

The intention is to identify and report vulnerabilities to the system owner for fixing, rather than causing harm or damage.

Users impacted by the white hat exploit are safe as their funds exist in a contract and will be returned. However, users who have been affected by the black hat attack will have to submit an email to SushiSwap so that the protocol can verify whether the user’s address was impacted.

A friend in need

The SushiSwap protocol also reached out to the Lido protocol to help in collecting user funds so that they can be reimbursed to the users.

SushiSwap approached Lido because some of the malicious transactions that took place were built by independent block builders. And in one case a substantial amount of ETH was transferred as an MEV reward to the block builder that then redirected to Lido Execution Rewards Vault.

The team at SushiSwap also has reason to believe that about 78 ETH was sent to the Lido Treasury, which could be an easy starting point for recovering some of the funds that have been lost.


Realistic or not, here’s SUSHI market cap in BTC’s terms


Even though the actions taken by SushiSwap to safeguard their users were swift, the protocol’s performance got impacted nonetheless. According to data from Token Terminal, the number of daily active users and the revenue collected by the protocol declined.

Source: token terminal

Buy JNews
ADVERTISEMENT
  • SushiSwap initiates plans to refund users affected by recent exploits.
  • The protocol approached Lido for assistance as massive amounts of the stolen funds were sent to the protocol.

Over the last few days, popular DEX  SushiSwap [SUSHI], became a victim of an exploit, resulting in the loss of millions of dollars. The vulnerability was due to a bug related to the “approve” function in the SushiSwap Router Processor 2 contracts.


Read SUSHI’s Price Prediction 2023-2024


The vulnerability invalidated the inputs given by the users. It also enabled the attacker to create a malicious router parameter that directed users to an attacker-controlled pool.

However, the SushiSwap team was swift in its response and began to formulate plans to fix the issues pertaining to the problem immediately.

SushiSwap announced on 12 April how it will be transferring funds to victims of the recent exploit.

🚨 RouteProcessor2 Exploit & User Refund Update!

🧵 Read the below thread about: what’s next for affected user funds and what processes we’re setting up to return user funds.

🖥️ Firstly, please know that Sushi’s Swap web app is safe to use now!

🪡👇🏼

— Sushi.com (@SushiSwap) April 12, 2023

White hats and black hats

There will be two sets of users who will be receiving the refunds. The first would be those whose funds were acquired in a white hat exploit. A white hat exploit is a security vulnerability discovered and exploited by an ethical hacker or a security team.

The intention is to identify and report vulnerabilities to the system owner for fixing, rather than causing harm or damage.

Users impacted by the white hat exploit are safe as their funds exist in a contract and will be returned. However, users who have been affected by the black hat attack will have to submit an email to SushiSwap so that the protocol can verify whether the user’s address was impacted.

A friend in need

The SushiSwap protocol also reached out to the Lido protocol to help in collecting user funds so that they can be reimbursed to the users.

SushiSwap approached Lido because some of the malicious transactions that took place were built by independent block builders. And in one case a substantial amount of ETH was transferred as an MEV reward to the block builder that then redirected to Lido Execution Rewards Vault.

The team at SushiSwap also has reason to believe that about 78 ETH was sent to the Lido Treasury, which could be an easy starting point for recovering some of the funds that have been lost.


Realistic or not, here’s SUSHI market cap in BTC’s terms


Even though the actions taken by SushiSwap to safeguard their users were swift, the protocol’s performance got impacted nonetheless. According to data from Token Terminal, the number of daily active users and the revenue collected by the protocol declined.

Source: token terminal

Share54Tweet34Pin12
Himalay Patel

Himalay Patel

Related Posts

Why Bitcoin will not retest $20,000 anytime soon
Blockchain

Why Bitcoin will not retest $20,000 anytime soon

June 3, 2023
TRON bulls could push for another 5% hike given…
Blockchain

TRON bulls could push for another 5% hike given…

June 3, 2023
Cardano at a crucial juncture: What it means for ADA
Blockchain

Cardano at a crucial juncture: What it means for ADA

June 3, 2023
Crypto ATMs record increase after 4-month lull
Blockchain

Crypto ATMs record increase after 4-month lull

June 3, 2023
These Bitcoin metrics signal potential bull run as…
Blockchain

These Bitcoin metrics signal potential bull run as…

June 3, 2023
Shiba Inu in liquidity squeeze – end of the road for SHIB?
Blockchain

Shiba Inu in liquidity squeeze – end of the road for SHIB?

June 3, 2023

Recommended Stories

‘Long’ing for BTC? Here’s how recent trader behavior will help you

‘Long’ing for BTC? Here’s how recent trader behavior will help you

April 8, 2023
Microsoft fixes ODBC connections broken by November updates

Microsoft fixes bug behind apps not installing during provisioning

March 1, 2023
Healthcare giant CHS reports first data breach in GoAnywhere hacks

Healthcare giant CHS reports first data breach in GoAnywhere hacks

February 14, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Why Bitcoin will not retest $20,000 anytime soon
  • TRON bulls could push for another 5% hike given…
  • Online sellers targeted by new information-stealing malware campaign

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?