Curve Finance Offers $1.85M Reward for Hacker’s Info
- A week ago, hackers stole almost $60 million from DeFi platform Curve Finance.
- Since that allotted time to return funds have passed, Curve Finance is now going after the hacker.
- Around $6 million in rewards were offered to the hacker as bounty for returning the funds.
A week ago, hackers stole almost $60 million from the decentralized finance (DeFi) platform Curve Finance. The protocol has chosen to take legal action against the exploiter, who has had a week to restore the money.
Around $6 million in rewards were offered to the hacker as bounty for returning the funds. A portion of the stolen assets were returned to Alchemix and JPEGd after the hacker embraced the offer.
The hacker did not, however, finish refunding the other impacted pools. Since that allotted time has passed, Curve Finance is now giving a reward to the general public. Therefore, anyone who provides information leading to the arrest of the assailant will get incentives totaling $1.85 million.
Curve Finance stated in an on-chain message:
“The deadline for the voluntary return of funds in the Curve exploit passed at 0800 UTC. We now extend the bounty to the public, and offer a reward valued at 10% of remaining exploited funds (currently $1.85M USD) to the person who is able to identify the exploited in a way that leads to a conviction in the courts,” adding that “if the exploiter chooses to return the funds in full, we will not pursue this further.”
Curve Finance’s native stablecoin crvUSD saw a sharp decline last week, but it seems to have recovered its dollar peg as of this week. Before returning the stolen monies, the attacker wrote a message to the Alchemix and Curve teams explaining that they were not doing it out of fear of being discovered but rather because they cared about the accomplishment of the projects and didn’t want anything to come between them.
The attacker stated via on-chain message:
“I’m refunding not because you can find me, it’s because I don’t want to ruin your project.”