JPEG’d confirms return of 5,495 ETH from Curve hacker

Nonfungible token (NFT) and decentralized finance (DeFi) protocol JPEG’d has confirmed that 5,495 Ether (ETH), worth roughly $10 million at current prices, has been returned by the Curve Finance hacker.

In exchange for returning the funds that were stolen on July 30, the hacker received a 610.6 ETH ($1.1 million) bounty.

JPEG’d exploit update:

Seems 5495 ETH was returned just now for a 10% whitehat bounty.


Michael Razum is not the exploiter but was linked on-chain bc a few of his contracts were drained by this person.

— ZachXBT (@zachxbt) August 4, 2023

JPEG’d is a DeFi lending protocol that enables users to borrow funds against their collateralized NFTs. The protocol lost $11.6 million of crypto in the Curve hack.

In an Aug. 4, X (formerly Twitter) thread, the team stated that the funds had been returned to the JPEG’d decentralized autonomous organization multisig wallet address.

“Any further investigations or legal matters against the entity will end. We view this occurrence as a white-hat rescue,” the JPEG’d team stated.

The JPEG’d DAO confirms receipt of 5,494.4 WETH back to the JPEG’d Multisig for a total of 5,495.4 WETH. A 10% white-hat bounty of 610.6 WETH was awarded to the owner of the address that recovered funds from the pETH exploit.

— JPEG’d (@JPEGd_69) August 4, 2023

The DeFi ecosystem received a significant hit in late July after several liquidity pools on Curve Finance were drained.

The hacker managed to exploit a security vulnerability in the Vyper smart contract programming language used in the pools, with total losses estimated to be around $70 million worth of crypto.

The exploit impacted projects such as decentralized exchange Ellipsis, lending platform Alchemix, JPEG’d, and synthetic protocol Metronome, which all saw millions of dollars worth of assets stolen from liquidity pools. Curve Finance also lost around $22 million of Curve DAO (CRV) tokens….


Read More

Recommended For You

Leave a Reply

Your email address will not be published. Required fields are marked *