Hacker returns cryptocurrency stolen from GMX exchange after $5 million bounty payment

Avatar

The person behind a $42 million theft from decentralized exchange GMX has returned the stolen cryptocurrency in exchange for a $5 million bounty. 

After the theft came to light on Wednesday, GMX promised the hacker not to pursue litigation if the funds were returned.

“You’ve successfully executed the exploit; your abilities in doing so are evident to anyone looking into the exploit transactions,” the company said in a subsequent note on Thursday. 

“It’s likely already clear to you that the decision between accepting this bounty and keeping the exploited funds is the difference between being able to spend the funds freely versus taking additional risks to access them.” 

GMX claimed in that message that their users would be made whole through bug bounty funds in their treasury. 

In a message on the blockchain, the unidentified hacker wrote: “ok, funds will be returned later,” and on Friday GMX confirmed that the company had exchanged the bounty for the stolen funds. 

The person behind the theft began transferring the funds in $5 million chunks, according to several blockchain security companies, eventually transferring about $40.5 million worth of cryptocurrency to GMX accounts. The funds were split into 10,000 ETH, worth about $30 million, and $10.5 million worth of the FRAX coin.

GMX released an in-depth post-mortem explaining the vulnerability that was used to steal the money, noting that the bug has been resolved in recent updates to the platform.

The platform allows users to purchase and speculate on many different cryptocurrencies. It was launched in 2021 and now claims to have 714,000 users and a total trading volume of $305 billion. 

Despite the bounty agreement, the hacker behind the incident could still face legal liability if identified. Last year, a man behind a $110 million theft from defunct crypto platform Mango Markets was convicted in federal court despite having negotiated with the platform to return the funds. 

The hacker, Avraham Eisenberg, eventually refunded $67 million in exchange for an agreement that Mango Markets would not go to the police. Nonetheless, Eisenberg was still pursued by federal law enforcement and was eventually convicted of commodities fraud, commodities market manipulation, and wire fraud.

A judge is still mulling a potential retrial on the charges related to Mango Markets but Eisenberg was sentenced in May to 52 months in prison for a separate charge of possession of child sexual abuse material.

NewsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

CISA orders agencies to immediately patch Citrix Bleed 2, saying bug poses ‘unacceptable risk’

Next Post

Airline executive agrees to dismiss litigation around alleged hack-for-hire scheme

Related Posts

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto

The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting two different organizations by approaching their employees via LinkedIn and Telegram. "Under the guise of freelance opportunities for software development work, UNC4899 leveraged social engineering techniques to successfully convince the targeted employees to execute malicious Docker containers in their
Avatar
Read More

Malware Injected into 5 npm Packages After Maintainer Tokens Stolen in Phishing Attack

Cybersecurity researchers have alerted to a supply chain attack that has targeted popular npm packages via a phishing campaign designed to steal the project maintainers' npm tokens. The captured tokens were then used to publish malicious versions of the packages directly to the registry without any source code commits or pull requests on their respective GitHub repositories. The list of affected
Avatar
Read More