Home > web3.0 > Ronin Bridge Hackers Return $10M in Stolen Ethereum (ETH), Receive $500K Bounty

Ronin Bridge Hackers Return $10M in Stolen Ethereum (ETH), Receive $500K Bounty

WBOY
Release: 2024-08-08 00:11:22
Original
798 people have browsed it

The Ronin Bridge, an Ethereum sidechain crucial for the popular play-to-earn game Axie Infinity, reported that the hackers returned the stolen ETH.

Ronin Bridge Hackers Return M in Stolen Ethereum (ETH), Receive 0K Bounty

Hackers behind the Ronin Bridge exploit have returned a portion of the stolen Ethereum (ETH), valued at approximately $10 million, according to an update from the Ronin Network. These whitehat hackers will be rewarded with a $500,000 bounty under the network’s Bug Bounty Program.

The Ronin Bridge, an Ethereum sidechain crucial for the popular play-to-earn game Axie Infinity, earlier reported that the attackers had returned the stolen ETH. However, around $2 million in USDC stablecoin remains unrecovered.

In a gesture of appreciation for the hackers’ action, the network has rewarded them with a substantial bounty. The whitehat hackers identified a critical vulnerability, which prompted the network to conduct a thorough audit before reopening the bridge for public use.

Ronin Bridge’s structure is also set to change as validators work on implementing a more secure solution.

“We have received the ETH (~$10M) and expect the USDC to be returned soon. The Bug Bounty Program will reward the whitehats with a $500K bounty. The bridge will undergo an audit before it is reopened. We are working with the Ronin validators to implement a new solution and will provide updates on our progress,” the network’s update reads.

Currently, the Ronin Bridge secures over $850 million in assets, which remained safe despite the recent attack. The exploiters managed to siphon $12 million due to robust safeguard measures, including a bridge limit that prevents large withdrawals, which curbed further losses during the exploit.

The Ronin network attributed the attack to a flaw introduced by a recent bridge upgrade, which misinterpreted the required threshold of bridge operators’ votes needed to withdraw funds, leading to the vulnerability.

A detailed post-mortem of the incident is expected next week, which will outline the strategies to prevent such occurrences in the future. Bailey.ron, a key member of the project, highlighted that Ronin Bridge’s prominence and commitment to real consumer adoption make it a frequent target for attacks.

“Ronin is one of the few crypto projects achieving real consumer adoption. This attracts constant phishing attempts and unwanted attention. Despite this, Ronin is committed to rectifying mistakes and protecting its community and users. I am proud to contribute to this project and remain confident in the team’s ability to impact the gaming and overall crypto industry,” Bailey.ron commented.

This isn’t the first time that the Ronin Network has faced such challenges. In 2022, the network suffered a massive exploit where $615 million was stolen after the attackers used private keys to forge fake withdrawals. This incident was one of the largest attacks in decentralized finance (DeFi) history.

The recent developments come amid ongoing concerns about security in DeFi. The Ronin (RON) token has seen a 2% decline in the past 24 hours, while the Axie Infinity (AXS) token has dropped by 1%.

The Ronin Network’s quick response to the latest attack and the engagement of whitehat hackers reflect a proactive approach to security. The network’s willingness to reward ethical hackers highlights the importance of collaboration in strengthening blockchain security.

As the network undergoes an audit and transitions to a new operational structure, the community awaits further updates on the matter.

The above is the detailed content of Ronin Bridge Hackers Return $10M in Stolen Ethereum (ETH), Receive $500K Bounty. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template