SushiSwap to return stolen funds following weekend hack

Quick Take

  • After a high-profile hack, SushiSwap has outlined plans for returning funds.
  • Some funds residing in a whitehat contract will be returned via a Merkle contract.
  • Funds stolen by blackhat hackers will require a case-by-case claims process.

SushiSwap has provided an update on the weekend's exploit and a plan to refund affected users.

The decentralized exchange explained funds were either swept by whitehat security teams or lost to blackhat hackers. 

Funds residing in the whitehat contract will be claimable via a Merkle Claim contract that the SushiSwap team is currently building. "We've completed most of this work and it will go live soon," the DEX noted on Twitter.

Recovering funds stolen by bad actors will be more complicated. Users whose funds reside with the blackhat exploiter must send an email to [email protected] that includes transaction IDs and blockchain data. (Alternatively, they may open a ticket in SushiSwap's official Discord.)

The Sushi team is establishing an opt-in claims process and will manage claims on a case-by-case basis, it explains." Our goal is to return all user funds to legitimate claimants," Sushi wrote, adding: "We appreciate everyone's patience and understand your frustration as we work through returning funds to affected users."

THE SCOOP

Keep up with the latest news, trends, charts and views on crypto and DeFi with a new biweekly newsletter from The Block's Frank Chaparro

By signing-up you agree to our Terms of Service and Privacy Policy
By signing-up you agree to our Terms of Service and Privacy Policy

On April 9, SushiSwap fell victim to an exploit that involved an approve-related bug on its RouterProcessor2 contract. Essentially, users who approved the problematic smart contract on the decentralized exchange opened themselves up to having their funds "yoinked" from their wallets.

After on-chain sleuths noticed the problem, the DEX's proverbial "Head Chef," Jared Grey, recommended revoking the contract's permissions on all associated blockchains.

Users can check if they were affected or not, but Sushi notes that "you likely have no exposure if you haven't interacted with Sushi in the past ten days, as the exploited contract is less than ten days old."

Meanwhile, SushiSwap has other problems to contend with. The U.S. Securities and Exchange Commission recently served the decentralized exchange and Grey with a subpoena, provoking the latter into asking Sushi DAO to fund a $3 million USDT legal defense.


© 2023 The Block. All Rights Reserved. This article is provided for informational purposes only. It is not offered or intended to be used as legal, tax, investment, financial, or other advice.

About Author

Adam is the managing editor for Europe, the Middle East and Africa. He is based in central Europe and was a managing editor and podcast host at the crypto exchange OKX's former research arm, OKX Insights. Before that, he co-founded BeInCrypto.com, which he elevated into one of the leading crypto media brands at its peak as the editor-in-chief. Earlier, he served as the editor-in-chief at Bitcoinist.com. Before joining the blockchain and crypto industry, he worked for Looper.com, Grunge.com and SVG.com. He tweets via @XBT002 and can be emailed at [email protected].