• Home
  • Crypto
  • Recovering Half of Stolen Funds: Illuminating the DeFi Exploit on GMBL Platform
Recovering Half of Stolen Funds: Illuminating the DeFi Exploit on GMBL Platform

Recovering Half of Stolen Funds: Illuminating the DeFi Exploit on GMBL Platform

Decentralized Finance (DeFi) Protocol GMBL Computer Exploited by Hacker

A recently launched DeFi gambling yield protocol called GMBL Computer fell victim to an exploitation by a hacker. However, there is some positive news as the identity of the hacker has been discovered, the protocol team has requested the return of the funds, and there have been partial successes in recovering them.

The Latest DeFi Exploit

On September 6, GMBL Computer, which is based on Arbitrum, revealed that the attacker successfully spoofed a call and obtained a signature from the server. This signature was then used to withdraw nearly 500 ETH worth of GMBL from the contract, equivalent to approximately $800,000 at current prices.

The protocol team clarified that the vulnerability was not within the contract itself, but rather off-chain.

The protocol team also mentioned that the hacker’s identity has been fully revealed and they are now taking steps to recover the funds. In an effort to avoid legal action, they have even offered a bug bounty if the funds are returned.

Fund Recovery in Progress

Shortly after, GMBL Computer reached out to the hacker, urging them to act as a white hat and return 90% of the stolen funds to the Arbitrum wallet, with the remaining 10% being offered as a bounty. They warned that if the funds are not returned by a specific deadline, legal action will be pursued.

This development sparked various reactions, with some questioning the need for a message requesting the return of funds if the hacker’s identity was already known. Additionally, there were suspicions of an inside job and concerns about the legality of the platform taking legal action.

Later on, GMBL Computer announced that they had managed to recover half of the stolen funds to their multisig wallet. However, accusations of a rug pull, a deceptive tactic in the crypto world, continued to circulate.

Hot Take: Lessons Learned from GMBL Computer’s Exploitation

The incident involving GMBL Computer serves as a reminder of the risks associated with new DeFi protocols. It highlights the importance of thorough security measures, both on-chain and off-chain, to prevent unauthorized access and mitigate potential exploits. Additionally, it emphasizes the significance of community support in identifying and apprehending malicious actors in the crypto space.

Read Disclaimer
This content is aimed at sharing knowledge, it's not a direct proposal to transact, nor a prompt to engage in offers. Lolacoin.org doesn't provide expert advice regarding finance, tax, or legal matters. Caveat emptor applies when you utilize any products, services, or materials described in this post. In every interpretation of the law, either directly or by virtue of any negligence, neither our team nor the poster bears responsibility for any detriment or loss resulting. Dive into the details on Critical Disclaimers and Risk Disclosures.

Share it

Recovering Half of Stolen Funds: Illuminating the DeFi Exploit on GMBL Platform