1inch suffers $ 5M hack due to the weakness of the intelligent contract

The Decentralized Exchange Aggregator 1inch lost $ 5 million in cryptocurrency when a hacker took advantage of a contract weakness, confirmed the platform.
On March 5, 1inch recognized a weakness affecting resolvers – creatures that fill orders – using outdated Fusion V1 implementation, which was made public a day later.
Source: 1inch network
Traces $ 5 million 1inch hack
On March 7, blockchain security firm Slowmist was found through an onchain investigation that 1inch hacker missed 2.4 million USDC (USDC) and 1,276 Wrapped ether (weth) Tokens.
Source: Slowmist
According to 1inch, Hack only stole funds from resolvers using Fusion V1 in their own contracts, and end-user funds are safe:
“We are actively working on affected resolver to secure their systems. We encourage all resolver to audit and update their contracts immediately.”
The platform announced Bug Bounty programs to secure any other weaknesses in the system and recover stolen funds.
Related: $ 1.5b crypto hack losses expose bug flaws
1inch attempt to recover stolen funds is thin unless the hacker has come back to return them. Previously, compromised crypto protocols were managed to recover funds after attacking attacks to maintain 10% of funds as white hat funds, As seen in the case of crypto lender Shezmu.
However, North Korea hackers behind the $ 1.5 billion bybit hack-called the crypto’s largest heist successful in siping the full amount Despite the coordinated efforts of the crypto community to regain losses.
Hackers steal different amounts of liquid-staked ether (steth), mantle staked eth (meth) and other ERC-20 tokens from Bybit.
Bybit on the slow road to recovery
Despite the sudden loss of funds, Bybit manages to allow its users without sewing to remove their funds by rapidly taking loans from other crypto companies, which has been paid someday.
It was taken 10 days for BYBIT hackers Launder $ 1.4 billion worth stolen cryptocurrencies. Some of the laundered funds may still be monitored despite swaping the asset, according to Deddy Lavid, co-founder and CEO of Blockchain Security Firm Cyvers:
“While launching through mixers and crosschain swaps is complicated recovery, cybersecurity companies that use onchain intelligence, AI-driven models, and cooperation with exchanges and regulators still have little opportunities to monitor and potentially freeze assets.”
The thorchain, a crosschain swap protocol, which has been reported widely used by hackers to siphon funds, experienced a Surge on Post-Bybit Hack Activity.
Magazine: Mystery Celeb Memecoin Scam Factory, HK Firm Dumps Bitcoin: Asia Express