Ronin Network hit by $9.85M exploit but RON token surges 11%
Ronin Community hit by $9.85M exploit but RON token surges 11%
White hat hacker suspected within the Ronin Community breach.
Ronin Community co-founder Aleksander Larsen presented that the Ethereum sidechain has been rapidly paused to evaluate a doubtless Maximal Extractable Be conscious (MEV) exploit.
On Aug. 6, blockchain security firm Cyvers reported that an MEV bot siphoned 4,000 ETH, valued at $9.85 million, from the network.
No topic this incident, the network’s native RON token remains unaffected, rising over 10% within the past 24 hours to $1.39 amid a classic crypto market uptrend, in step with CryptoSlate’s knowledge.
White hat hackers fervent?
Security consultants at Peckshield suggested that a white hat hacker applied the attack.
Larsen corroborated this stare, noting that the personnel was investigating reports from white hat hackers relating to a imaginable MEV exploit of the blockchain network linked to the customary play-to-form game Axie Infinity.
He added:
“We are going to prepare up with more knowledge rapidly. The bridge currently secures over $850 million which is stable.”
White hat hackers customarily exploit software program to salvage and repair security flaws, on the general returning stolen funds both for a reward or voluntarily. If here is the case, the funds might possibly maybe maybe be returned to the platform.
Meanwhile, Cyvers neatly-known that the address of the deployer of the Axie infinity contract has attempted to attain out to the “white hat” hacker by sending a message that reads:
“Howdy, thanks plenty for white hat saving user funds today time. Can we chat over Blockscan chat?”
Lax security?
Market consultants have raised concerns about Ronin’s bridge security in light of the attack.
Blockchain analyst ZachXBT highlighted old significant breaches, including a 2022 exploit consuming 173,600 Ethereum, rate over $615 million, and the recent $9.7 million hack of the platform’s co-founder Jeff Zirlin in February 2024.
He acknowledged:
“[These attacks] excellent video display mismanagement, if anything else. The first and second hack were Lazarus Community non-public key compromises.”
Mentioned listed here
Source credit : cryptoslate.com