Advertisement
New Zealand markets close in 3 hours 56 minutes
  • NZX 50

    11,816.36
    -19.68 (-0.17%)
     
  • NZD/USD

    0.5896
    -0.0010 (-0.17%)
     
  • NZD/EUR

    0.5539
    -0.0006 (-0.11%)
     
  • ALL ORDS

    7,824.80
    -74.10 (-0.94%)
     
  • ASX 200

    7,567.30
    -74.80 (-0.98%)
     
  • OIL

    82.60
    -0.13 (-0.16%)
     
  • GOLD

    2,392.60
    -5.40 (-0.23%)
     
  • NASDAQ

    17,394.31
    -99.31 (-0.57%)
     
  • FTSE

    7,877.05
    +29.06 (+0.37%)
     
  • Dow Jones

    37,775.38
    +22.07 (+0.06%)
     
  • DAX

    17,837.40
    +67.38 (+0.38%)
     
  • Hang Seng

    16,385.87
    +134.03 (+0.82%)
     
  • NIKKEI 225

    37,359.30
    -720.40 (-1.89%)
     
  • NZD/JPY

    91.0980
    -0.1560 (-0.17%)
     

Crema Finance Attacker Returns Almost $8M, Keeps $1.7M Bounty

Boonchai Wedmakawand/Getty Images

The attacker behind the exploit of Solana-based liquidity protocol Crema Finance returned more than $8 million worth of tokens, keeping roughly $1.68 million as a "white hat" bounty, Crema developers said Thursday.

The protocol had more than $9 million worth of cryptocurrencies stolen from its platform over the weekend in a flash loan attack. Flash loans allow traders to borrow unsecured loans from lenders by relying on smart contracts instead of third parties.

“The hacker agreed to take 45455 SOL as the white hat bounty,” the developers said in a tweet. “Now we have confirmed the receipt of 6064 ETH + 23967.9 SOL in the four transactions.”

The developers said a compensation plan will be released in 48 hours for users affected by the attacker.

ADVERTISEMENT

The protocol allows liquidity providers to set specific price ranges, add single-sided liquidity and conduct range order trading. This makes for a sophisticated and decentralized trading platform.

The exploit involved the attacker creating a fake tick account on Crema. A tick account is "a dedicated account that stores price tick data in CLMM,” the developers said, referring to Crema's market-making protocol. After that, the attacker exploited a command by writing the data on the fake account and circumventing security measures.

A flash loan was then used to manipulate the prices of assets on liquidity pools. This, along with the false data entries, allowed the attacker to claim “a huge fee amount out from the pool,” as previously reported.