Tuesday, January, 21, 2025

Resolv Hacker Offered $2.5M Bounty to Return $25M in 72 Hours

Resolv offers attacker $2.5M to return $25M after exploit, setting a strict 72-hour deadline.
Resolv
Picture of Fridah Kangai

Fridah Kangai

Fridah Kangai is a dedicated crypto journalist with a sharp eye for market trends, blockchain innovation, and digital asset movements. She specializes in breaking down complex topics into clear, engaging stories for both seasoned investors and curious newcomers. With a passion for decentralization and a pulse on the ever-evolving crypto space, Fridah delivers timely, accurate, and insightful coverage. Her work bridges the gap between technology and everyday understanding in the world of cryptocurrency.
  • Resolv offers hacker bounty to recover millions within strict deadline
  • Exploit reveals critical minting flaw as attacker converts funds rapidly
  • Deadline pressure builds as Resolv threatens action against noncompliance

Resolv Labs has offered a $2.5 million bounty to the attacker behind a $25 million exploit. The proposal enables the exploiter to keep 10% of the stolen money provided that he or she returns the rest. As a result, the company has estimated a 72 hour time frame within which it will be able to reclaim about $22.5 million ether. This strategy also brings urgency and it establishes a financial incentive towards cooperation.

An onchain message stated that Resolv gave a recovery address upon which money could be transferred. Moreover, the attacker will be obliged to give back the rest of USR tokens which they have. This is an organized plan to curb the disruption in the market and build confidence.

Besides, the company had another white hat disclosure alternative to the attacker. It encouraged the person to tell his or her side and present the exploit as a security study. This route is an expression of a balanced reaction between enforcement and possible cooperation. Nevertheless, Resolv did not fail to specify severe repercussions in case the deadline is exceeded. The company said it will liaise with centralized exchanges, bridges as well as infrastructure providers. In addition to that, it intends to freeze assets and publicly release wallet addresses associated with the exploit.

Also Read: Aave Moves Toward V4 Launch After DAO Backs Ethereum Mainnet Plans

Exploit exposed critical minting flaw and weak safeguards

The exploit started with the attacker placing approximately $200,000 in USDC into a USR-related contract. Later on, the protocol minted 50 million USR tokens in exchange. An additional 30 million tokens were created in a second transaction and this made the breach very large. The hacker then traded the mined tokens with the stablecoins in the decentralized exchanges. The proceeds were converted subsequently to 11,409 ETH through onchain tracking data. This sequence allowed quick derivation of value out of the system.

The cause of the problem was defined by analysts as an opportunity to mint at will, held in a single account. Furthermore, the system did not have maximum mint restrictions and oracle validation. Furthermore, there was no multi-signature authorization which made it vulnerable.

Resolv admitted that the exploit had a protocol vulnerability basis. Nonetheless, it also stressed that the attacker did it with a certain purpose, producing tokens that were not supported. Therefore, this practice posed threat on liquidity and stability of the secondary markets. In addition, the company attested that it has been in contact with affected users after the incident. It has facilitated redemption among users that had USR in possession prior to the exploit. Other users are able to get updated as the recovery process goes on.

Also Read: XRP Rebounds With $2.91M Inflows as Ethereum Sees Sudden Capital Exit

How would you rate your experience?

Related Posts

Share on Social Media
Scroll to Top