Transit Swap ‘hacker’ returns 70% of $23M in stolen funds

A fast response from numerous blockchain security companies has helped facilitate the return close to 70% from the $23 million exploit of decentralized exchange (DEX) aggregator Transit Swap.

The DEX aggregator lost the funds following a hacker exploited an internal bug on the swap contract on March. 1, resulting in a fast response in the Transit Finance team along with security companies Peckshield, SlowMist, Bitrace and TokenPocket, who could rapidly exercise the hacker’s IP, current email address and connected-on chain addresses.

It seems these efforts have previously borne fruit, as under 24 hrs following the hack, Transit Finance noted that “with joint efforts of parties,” the hacker has came back 70% from the stolen assets to 2 addresses, equating to roughly $16.two million.

These funds came by means of 3,180 Ether (ETH) at $4.two million, 1,500 Binance-Peg ETH at $two million and 50,000 BNB at $14.two million, based on BscScan and EtherScan.

In the newest update, Transit Finance mentioned that “the project team is hurrying to gather the particular data from the stolen users and formulate a particular return plan” but additionally remains centered on retrieving the ultimate 30% of stolen funds.

At the moment, the safety companies and project groups of both sides continue to be ongoing to trace the hacking incident and talk to the hacker through email as well as on-chain methods. They will work difficult to recover more assets,” it stated. 

Related: $160M stolen from crypto market maker Wintermute

Cybersecurity firm SlowMist in an analysis from the incident noted the hacker used a vulnerability on the road Swap’s smart contract code, which came from the transferFrom() function, which basically permitted users’ tokens to become transferred straight to the exploiter’s address:

“The real cause of the attack would be that the Transit Swap protocol doesn’t strictly look into the data passed in through the user during token swap, which results in the problem of arbitrary exterior calls. The attacker exploited this arbitrary exterior call issue to steal the tokens authorized by the user for Transit Swap.”

Latest stories

You might also like...