Cryptopolitan
2025-07-11 10:18:24

GMX hacker starts returning the stolen funds

The GMX exchange hacker posted a message that he would return the funds ‘later’ and made good on the promise, starting with FRAX tokens. Previously, the GMX team offered a 10% white hat bounty and no law enforcement actions in exchange for returning the $42M in ETH and stablecoins. The GMX hacker posted an on-chain message, promising he would return the funds “later.” Just minutes after that, the first tokens were returned, sending 5M FRAX back to the GMX deployer contract. #PeckShieldAlert #GMX Exploiter has returned another 5M $FRAX to #GMX : Deployer pic.twitter.com/95xjVqTnad — PeckShieldAlert (@PeckShieldAlert) July 11, 2025 Soon after that, the hacker continued by returning 3K ETH . All of the exploiter’s wallets were flagged, though it would not prevent mixing, if the hacker decided to keep the funds. The GMX hack also raised the question of USDC freezes. Circle is capable of freezing USDC, but usually takes hours after an exploit to do this. In this case, the hacker had plenty of time to swap and distribute the funds, bridging all proceeds from Arbitrum to Ethereum. Previously, the hacker consolidated most funds on the Ethereum network, splitting the DAI stablecoins into multiple wallets in preparation for mixing. The hacker emptied out the initial exploit wallet, and has been moving the funds into addresses. Apparently, the offer of a 10% bounty for returning the funds within 48 hours was considered good enough. The hacker will net around $5M, leaving GMX with most of its vaults refilled. However, the attack still crashed the value of the GMX token by up to 30%, erasing millions of notional value. GMX is still not fully recovered, trading at $13.28. GMX hacker makes a successful ETH trade The hacker chose a fortunate moment to switch some of the funds to ETH. To consolidate the tokens taken from GMX V1 vaults, the hacker swapped them into 11,700 ETH. The trades happened just as ETH coasted around $2,600, before its big rally to over $3,000. Initially, the hacker swapped $32M in various assets, which are now valued at over $35M, netting a small gain. In theory, the hacker could choose to sell the ETH, return stablecoins or other tokens, and retain the difference. The hacker addresses have received multiple messages, finally responding to the original team message from xviv.eth. GMX uncovers flawed order book contract The GMX team narrowed down the exploit issue to an order book contract. The contract itself protected against reentrancy, but the hacker called an external function outside the contract , bypassing the protection. Overall, the exploit cut a small dent in all token pairs, as GMX had multiple versions with safe vaults. During the day of the exploit, the GLP pool generated over $717K in daily fees , reflecting the heightened activity of exploiting the value of the GLP token. GMX saw an outflow of value from its top tokens, both as a direct loss from the hack and from lost volumes. | Source: Dune Analytics . The attacker was then able to manipulate the price of the GLP token, by bringing down the BTC short price to an anomaly of $1,913.70. This allowed the hacker to inflate GLP to an unfair price of $27, then use the unfair value to drain trading pools. GMX still carries $409.27M , down from a recent level above $480M before the exploit. The DeFi vaults suffered additional losses as an after-effect of the hack. Cryptopolitan Academy: Coming Soon - A New Way to Earn Passive Income with DeFi in 2025. Learn More

获取加密通讯
阅读免责声明 : 此处提供的所有内容我们的网站,超链接网站,相关应用程序,论坛,博客,社交媒体帐户和其他平台(“网站”)仅供您提供一般信息,从第三方采购。 我们不对与我们的内容有任何形式的保证,包括但不限于准确性和更新性。 我们提供的内容中没有任何内容构成财务建议,法律建议或任何其他形式的建议,以满足您对任何目的的特定依赖。 任何使用或依赖我们的内容完全由您自行承担风险和自由裁量权。 在依赖它们之前,您应该进行自己的研究,审查,分析和验证我们的内容。 交易是一项高风险的活动,可能导致重大损失,因此请在做出任何决定之前咨询您的财务顾问。 我们网站上的任何内容均不构成招揽或要约