Cryptocurency

Base project RocketSwap shares emergency plan following $865K exploit

Base project RocketSwap Labs has outlined its emergency programme to bounce back from a brute force hack which swiped $865,000 or 471 Ether (ETH) from the protocol on Aug. 14.

The team explained on Aug. 15 that they plan on redeploying a new farm contract and open-source it on-chain, relinquish minting rights — presumably of RCKT — and will soon call on the hackers to return the assets, among other things:

On Aug. 14, a hacker stole approximately 471 ETH and bridged it from Base to Ethereum, according to blockchain security firm PeckShield.

The exploiter then created the 90 trillion “LoveRCKT” tokens and transferred them over to Uniswap along with 400 ETH, it explained.

The news was confirmed by RocketSwap Labs on Aug. 14 at 11:06 UTC, with PeckShield and fellow blockchain security firm CertiK providing additional details about the exploit a few hours later.

Related: Zunami Protocol confirms stablecoin pools attacked, $2.1M loss estimated

RocketSwap Labs said attributed the exploit to a brute force attack on the protocol’s server:

“A brute force hack of the server was detected, and due to the proxy contract used for the farm contract, there were multiple high-risk permissions that led to the transfer of the farm’s assets. We shut down the farm to prevent further damage.”

RocketSwap is a decentralized exchange on Base, with plans to gradually become community-owned through a decentralized autonomous organization.

Magazine: $3.4B of Bitcoin in a popcorn tin — The Silk Road hacker’s story

Products You May Like

Articles You May Like

The Next Stage for Public Good Funding in Crypto
India topped this index! What does this mean for investors? #shorts
🤑 Top 10 Safest Crypto To 10x In Crypto Market By 2024-25 Bull Run |🚀 1000% Pump In These Altcoins 🚨
U.S. Election Betting: CFTC, Kalshi Both Grilled by Judges in Appeals Court
Crypto Broker DeltaPrime Drained of Over $6M Amid Apparent Private Key Leak

Leave a Reply

Your email address will not be published. Required fields are marked *