Euler Finance Hacker rejects $ 20 million and mixes 1,000 ETH in Tornado-Cash

Am 16. März nahm der 200-Millionen-Dollar-Hack des Euler Finance-Kreditprotokolls eine unerwartete Wendung, als der Täter offenbar das Angebot von 20 Millionen Dollar ablehnte, indem er 1.000 ETH (im Wert von 1,65 Millionen Dollar) durch Tornado Cash mischte. Laut PeckShield führte der Angreifer zehn Transaktionen in Tornado Cash durch. In jedem schickten sie 100 ETH an eine Zwischenadresse. Infolgedessen hat der Hacker nun 1.000 ETH in Tornado Cash verschleiert und hat 1.500 ETH in der Adresse, die zur Durchführung des Angriffs verwendet wurde – was es für Euler Finance (und die Strafverfolgungsbehörden) extrem schwieriger macht, die IRL zu verfolgen. #PeckShieldAlert @eulerfinance …
On March 16, the $ 200 million hack of the Euler Finance credit protocol took an unexpected turn when the perpetrator apparently rejected the offer of $ 20 million by mixing $ 1,000 (worth $ 1.65 million) by Tornado Cash. According to Peckshield, the attacker carried out ten transactions in Tornado Cash. In each they sent 100 ETH to an intermediate address. As a result, the hacker has now veiled 1,000 ETH in Tornado Cash and has 1,500 ETH in the address that was used to carry out the attack - which makes it extremely more difficult for Euler Finance (and the law enforcement authorities) to pursue the IRL. #Peckshieldalert @eulerfinance ... (Symbolbild/KNAT)

Euler Finance Hacker rejects $ 20 million and mixes 1,000 ETH in Tornado-Cash

On March 16, the 200 million dollar hack of the Euler Finance credit protocol took an unexpected turn when the perpetrator apparently rejected the offer of $ 20 million by mixing $ 1.65 million by Tornado Cash.

According to Peckshield, the attacker carried out ten transactions in Tornado Cash. In each they sent 100 ETH to an intermediate address. As a result, the hacker has now veiled 1,000 ETH in Tornado Cash and has 1,500 ETH in the address that was used to carry out the attack - which makes it extremely difficult for Euler Finance (and the law enforcement authorities) to pursue IRL.

#Peckshieldalert ~1,000 16. March 2023

$ 20 million were not enough

On March 15, Euler Finance offered the attacker publicly a act in which you could keep $ 10 % of the stolen $ 200 million if you returned the rest. The refusal to do this would lead to Euler Finance to anyone who provided information that led to their arrest awarded a reward of $ 1 million

But according to the on-chain data, the hacker did not take care of Euler Finance's suggestions and instead the cryptocurrencies only mixed a few hours after the proposal in Tornado Cash.

Transactions of Eulerfinance Hackerto Tornado Cash Image: Etherscan

But it wasn't just bad news; The hacker decided to send 100 ETH to one of the victims after her request. One of the users who had lost his money told the hacker that he was a modest person who could lose all savings of his life if he rewarded the reward offered by the protocol.

wow! @eulerfinance The exploitor returned $ ETH Warenhttps: //t.co/gz9acuzb0h 16. March 2023

Euler Finance lost $ 200 million from flash-loan attack

As recently reported Cryptopotato , Euler Finance lost almost $ 200 million at the beginning of the week after a hidden weak point was exploited for eight months.

according to the Post-Mortem report, which was published by the cyber security company Omniscia, the exam partner of Euler Finance, the attack from a vulnerability in the donation mechanism of the protocol, which enabled the hacker, came up with an excessive position, which, if it was blamed in the same block Liquidated is artificially reduced, with $ 200 million in Dai, USDC, WBTC and ETH.

omniscia came to the conclusion that the attack on a false donation mechanism was attributed to the last protocol actization (EIP-14).

"The Etoken :: Donatetoreserve function, which represents the core of this weak point, was not the subject of an exam carried out by Omiscia. Therefore, the code that causes the weak point was never the subject of an examination carried out by our team."

At this point it is not known whether the hacker intends to return the remaining ether to the protocol so as not to be hunted by white hackers, blockchain tracechaunity and even law enforcement authorities.

.