EUL token down 52% after the $200 million Euler protocol exploit

 EUL token down 52% after the $200 million Euler protocol exploit

  • Hackers stole nearly $200 million from Euler protocol on Monday.
  • USDC accounted for a majority of the stolen tokens.
  • Euler Labs is at the moment working to get well the funds.

Euler protocol is dealing with a distinct risk from the crypto agency collapses, crypto lawsuits, and crypto-related financial institution shutdowns which have plagued the crypto area within the latest previous.

The small-cap Ethereum-based decentralized finance lending protocol was on Monday hacked resulting in the lack of crypto property price practically $200 million.

Euler flash mortgage assault

Blockchain safety agency PeckShield on Monday tweeted notifying Euler to check out some fishy transactions from its platform.

Wanting on the transactions from Euler on etherscan, the hacker(s) took off with quite a lot of cryptocurrencies together with 34.4 million USDC, 8.89 million DAI, 85,690 stETH, and 849 WBTC.

In keeping with a tweet from SlowMist, one other blockchain safety agency:

“The attacker used flashloans to deposit funds after which leveraged them twice to set off the liquidation logic, donating the funds to the reserve tackle and conducting a self-liquidation to gather any remaining property.”

Euler Labs, the startup behind Euler Protocol, has nevertheless mentioned that it efficiently stopped the exploit and it’s at the moment working to get well the stolen funds in collaboration with quite a lot of corporations together with Chainalysis.

Euler’s native token, EUL, down 52%

The native token of Euler, EUL, dived by greater than 52% following the revelation of the exploit.

At press time, the token was buying and selling at $3.08 down from a excessive of $6.4826 on Monday morning. And though the token worth appears to have consolidated above $3, it’s not sure if the token will be capable to maintain that stage seeing that it had dipped from its try to get well after the autumn.

Source link

Related post