{"id":42789,"date":"2022-12-26T15:03:51","date_gmt":"2022-12-26T19:03:51","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=42789"},"modified":"2022-12-26T15:03:54","modified_gmt":"2022-12-26T19:03:54","slug":"defrost-finance-hacker-reportedly-returns-funds","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/defrost-finance-hacker-reportedly-returns-funds\/","title":{"rendered":"Defrost Finance hacker reportedly returns funds"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\" id=\"h-trading-platform-defrost-finance-which-recently-had-a-network-vulnerability-has-said-that-the-hacker-of-the-v1-platform-has-reportedly-returned-the-funds\">Trading platform Defrost Finance which recently had a <a href=\"https:\/\/coinscreed.com\/staging\/secret-network-resolves-network-vulnerability.html\" target=\"_blank\" rel=\"noreferrer noopener\">network vulnerability<\/a> has said that the hacker of the V1 platform has reportedly returned the funds.<\/h5>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/image-81.png\" alt=\"Defrost Finance hacker reportedly returns funds \" class=\"wp-image-42801\" width=\"751\" height=\"436\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/image-81.png 560w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/image-81-300x174.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/image-81-150x87.png 150w\" sizes=\"(max-width: 751px) 100vw, 751px\" \/><figcaption class=\"wp-element-caption\">Defrost Finance hacker reportedly returns funds <\/figcaption><\/figure>\n\n\n\n<p>An announcement by Defrost claiming &#8220;the hacker engaged in the V1 attack [but not the v2 hack] has refunded the funds&#8221; was made just before the action was taken. According to a warning given by blockchain security company CertiK on December 26, <a href=\"https:\/\/www.google.com\/search?q=Defrost+Finance+hacker+reportedly+returns+funds&rlz=1C1SQJL_enNG889NG889&oq=Defrost+Finance+hacker+reportedly+returns+funds&aqs=chrome..69i57j0i546j69i60.477j0j9&sourceid=chrome&ie=UTF-8\" target=\"_blank\" rel=\"noreferrer noopener\">the vulnerability is allegedly an &#8220;exit scam,&#8221;. <span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a><\/p>\n\n\n\n<p>\u201cOn 24 December we have seen an #exitscam on @Defrost_Finance. We have attempted to contact multiple members of the team but have had no response. The team is not KYC\u2019d but we are using all the information that we do have to assist with authorities.\u201d<\/p>\n\n\n\n<p>On December 23, Defrost Finance was the victim of a flash loan assault that stripped users of its v1 and v2 protocols $12 million in assets. The exploit was also followed by a warning from blockchain analytics company PeckShield, which called the action a &#8220;rug pull&#8221;:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cWe received community intel warning the rugpull of @Defrost_Finance.Our analysis shows a fake collateral token is added and a malicious price oracle is used to liquidate current users. The loss is estimated to be >$12M.\u201d<\/p>\n<\/blockquote>\n\n\n\n<p>The project's creators said in a short post-mortem investigation that hackers also succeeded in stealing the owner key for a far more extensive assault on its v1 protocol than the flash loan vulnerability. In return for the majority of the assets, Defrost has offered to discuss &#8220;sharing 20% (negotiable) of the money and is asking the hackers to contact us asap.&#8221;<\/p>\n\n\n\n<p>At the time of publishing, close to $3 million worth of digital assets had been moved to an <a href=\"https:\/\/coinscreed.com\/staging\/latest-defi-hack-drains-8m-from-bitkeep-wallets.html\" target=\"_blank\" rel=\"noreferrer noopener\">Ethereum wallet address <\/a>that had been posted on the company's social media page. Hours later, Defrost detailed the v1 hacker's return of the stolen money to a project developers-controlled address in a Medium post.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cWe will soon start scanning the data on-chain to find out who owned what prior to the hack in order to return them to the rightful owners. As different users had variable proportions of assets and debt, this process might take a little. However, it will be concluded fairly swiftly.\u201d<\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"505\" height=\"507\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/image-80.png\" alt=\"\" class=\"wp-image-42796\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/image-80.png 505w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/image-80-300x300.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/image-80-150x151.png 150w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/image-80-96x96.png 96w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/image-80-75x75.png 75w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/image-80-350x350.png 350w\" sizes=\"(max-width: 505px) 100vw, 505px\" \/><figcaption class=\"wp-element-caption\">CertiK's Skynet alert for Defrost.\u00a0Source: CertiK<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Trading platform Defrost Finance which recently had a network vulnerability has said that the hacker of the V1 platform has reportedly returned the funds. An announcement by Defrost claiming &#8220;the hacker engaged in the V1 attack [but not the v2 hack] has refunded the funds&#8221; was made just before the action was taken. According to [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":42801,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11476],"tags":[10415,12825,2156,2118],"class_list":["post-42789","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacks-and-scams","tag-certik-2","tag-defrost-finance","tag-exploit","tag-hacker"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/image-81.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/42789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=42789"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/42789\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/42801"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=42789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=42789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=42789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}