Stolen assets worth $ 140 million

Stolen assets worth $ 140 million
The Wormhole Bridge, based in Solana, was chopped for $ 325 million after the attacker had managed to take advantage of a security gap, which made it one of the greatest exploits in crypto history.
A year later, a group of White started a “Counter Exploit” against the malicious units together with two crypto companies and brought back part of the stolen assets that were connected to the exploit.
"Counter-Exploit"
The Counter-Exploit was carried out jointly by the decentralized finance platform OASIS and the Web3 infrastructure company Jump Crypto. The latter was the parent company of Wormhole and had previously replaced all lost funds. The weak point was also patched.
Wormhole offered the attackers a $ 10 million bug bounty and a white-hat agreement in return for returning the funds, which never happened. This initiated an investigation with the help of state and private resources. Fast lead on February 21: Oasis received an arrangement of the High Court of England and Wales to take all the necessary steps to call up assets that are connected to the wallet address connected to the exploit.
According to a report, assets worth $ 140 million were successfully restored after a counter Exploit. The call was launched over the Oasis, and the funds were returned to a third party authorized. The Counter-Exploit was only possible with the consent of the Oasis.community reaction
Despite the access, the municipality remained divided on weekends unfolded. A user pointed out that the entire event is a poor precedent in the decentralized financial ecosystem. His
"With this Oasis/Wurmhole Counter Exploit, I really would not have thought that we would see the Smart Contract manipulations arranged for at least a few years. Poor precedent and conviction of updated proxies." oasis emphasized that the only intention to grant the access was to protect the users' assets in the event of a potential attack. The platform continued to claim that this step made it possible for the team to quickly remedy any weak point. It should be noted that at no time, neither in the past nor in the present, there was a risk that unauthorized persons access the assets of the users. .