- The Curve CRV-ETH exploiter is yet to return $19.7 million worth of cryptocurrency stolen during the reentrancy attacks on July 30.
- DeFi projects Alchemix Finance, JPEGd, and Metronome recovered a combined $48.1 million through asset returns from exploiters and white hat efforts.
- Curve Finance is offering a $1.8 million bounty to anyone with information on the exploiter that could aid a court conviction.
DeFi protocols affected in the $73.5 million reentrancy attack on decentralized exchange Curve Finance have recovered a substantial portion of the stolen funds, PeckShield.
The Alchemix Finance exploiter returned 7,258 Ether (ETH) and 4,821 Alchemix Ether (alETH) worth $22 million. White hat hackers also rescued $13 million in crypto bringing Alchemix’s total to $35 million, the single largest recovery from Curve’s exploit.
JPEGd received $11.5 million in 5,495.4 wrapped Ether (WETH), accounting for 90% of the funds drained from its pETH/ETH pool. The frontrunner hacker claimed 10% as a bounty.
Furthermore, the Metronome Curve pool exploiter returned 886.55 ETH worth $1.6 million.
Curve Finance Offers Bounty For Info On Exploiter
The Curve Finance CRV-ETH exploiter is yet to return $19.7 million worth of cryptocurrency stolen during the reentrancy attacks on July 30, although c0ffeebabe.eth rescued $5.3 million from the CRV pool.
Curve initially offered the CRV/ETH exploiter 10% of stolen funds if they returned 90%. The bounty is now open to the public as the funds were not returned.
Currently, the bounty stands at $1.85 million for any information that could help secure a conviction in court.
The deadline for the voluntary return of funds in the Curve exploit passed at 0800 UTC. We now extend the bounty to the public and offer a reward valued at 10% of the remaining exploited funds (currently $1.85M USD) to the person who is able to identify the exploiter in a way that leads to a conviction in the courts.
“If the exploiter chooses to return the funds in full, we will not pursue this further” added the Curve team.