On January 21, the multi-chain DeFi execution engine Makina released the latest update on the recent hacker attack. The attack only affected users providing liquidity to the Curve DUSD/USDC pool; users holding DUSD, Pendle, and Gearbox positions are unaffected. Makina has now obtained clues about the hacker’s identity and is actively reaching out. Prior to the attack, Makina took a snapshot of the Curve DUSD/USDC pool. If you are still a liquidity provider in the Curve DUSD/USDC pool, please withdraw unilaterally to DUSD until further notice. The official team is taking further measures, disabling the recovery mode and re-enabling the redemption function. Yesterday, Makina was attacked on the Ethereum network, resulting in a loss of 5,107,871 USDC. The vulnerability allowed the attacker to manipulate the pool’s price, artificially inflating the value of liquidity provider assets, and executing arbitrage attacks.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Makina: The hacker attack only affected DUSD/USDC pool users, a pre-incident snapshot has been taken.
On January 21, the multi-chain DeFi execution engine Makina released the latest update on the recent hacker attack. The attack only affected users providing liquidity to the Curve DUSD/USDC pool; users holding DUSD, Pendle, and Gearbox positions are unaffected. Makina has now obtained clues about the hacker’s identity and is actively reaching out. Prior to the attack, Makina took a snapshot of the Curve DUSD/USDC pool. If you are still a liquidity provider in the Curve DUSD/USDC pool, please withdraw unilaterally to DUSD until further notice. The official team is taking further measures, disabling the recovery mode and re-enabling the redemption function. Yesterday, Makina was attacked on the Ethereum network, resulting in a loss of 5,107,871 USDC. The vulnerability allowed the attacker to manipulate the pool’s price, artificially inflating the value of liquidity provider assets, and executing arbitrage attacks.