Prisma Finance hacker defends exploit, demands public apology

Quick Take

  • One of the wallets connected to the recent $11 million hack of Prisma Finance has demanded that the protocol’s team publicly identify themselves and apologize before the hacker will consider returning some of the funds. 
  • Prisma Finance, a liquid staking protocol, was drained of $11 million following a flash loan attack on Mar. 28.

One of the wallets tied to the hack of Prisma Finance, a liquid staking protocol that was exploited for $11 million by multiple attackers on Mar. 28, has claimed to be a "white-hat" hacker interested in returning funds to the protocol, rather than a "black-hat" hacker who would keep the funds for themself. 

Before considering returning the funds, the hacker has demanded that the Prisma Finance team hold an online press conference, identify themselves publicly, and apologize to users, investors, and praise the hacker for working with them to solve the issue.

In an on-chain message to Prisma Finance, the hacker criticizes the Prisma team for not catching the mistake, and claims that the press conference would help send a message to the entire decentralized finance space. "I hope this would help ppl be more careful participating in defi, the teams would be more responsible, and everyone would change their minds about things like this," the hacker wrote in an on-chain message to Prisma Finance.

"After it happens, the amount I would keep, and the amount that I can send to you would be discussed (stay assured, most of it would be returned)," the hacker concluded. 

Occasionally, hacked protocols are able to recover funds by negotiating with attackers. However, the hacker's unusual demands, coupled with their transfers of over $2.5 million in ether to blockchain mixing service Tornado Cash, have left many Prisma Finance users skeptical of the hacker's true motives. 

THE SCOOP

Keep up with the latest news, trends, charts and views on crypto and DeFi with a new biweekly newsletter from The Block's Frank Chaparro

By signing-up you agree to our Terms of Service and Privacy Policy
By signing-up you agree to our Terms of Service and Privacy Policy

"This guy seems like he's playing around and deciding whether to play white hat with these public communications," one user on Prisma Finance's Discord server wrote. "He's doing a 'trust me bro' with millions of dollars in [Tornado Cash]."

Prisma Finance has paused the protocol and published a post-mortem on the attack, describing the vulnerability as a lack of input validation on a certain smart contract function. "While retrieving all users funds is our main focus right now, unpausing the protocol will be part of the next steps once we are sure that all positions are safe," the team wrote. 

Prisma Finance has yet to respond to the hacker and did not immediately respond to a request for comment from The Block. 


Disclaimer: The Block is an independent media outlet that delivers news, research, and data. As of November 2023, Foresight Ventures is a majority investor of The Block. Foresight Ventures invests in other companies in the crypto space. Crypto exchange Bitget is an anchor LP for Foresight Ventures. The Block continues to operate independently to deliver objective, impactful, and timely information about the crypto industry. Here are our current financial disclosures.

© 2023 The Block. All Rights Reserved. This article is provided for informational purposes only. It is not offered or intended to be used as legal, tax, investment, financial, or other advice.

About Author

Zack Abrams is a writer and editor based in Brooklyn, New York. Before coming to The Block, he was the Head Writer at Coinage, a Web3 media outlet covering the biggest stories in Web3. The story he co-reported on Do Kwon won a 2022 Best in Business Journalism award from SABEW. Other projects included a deep dive into SBF's defense based on exclusive documents and unveiling the identity of the hacker behind one of 2023's biggest crypto hacks — so far. He can be reached via X @zackdabrams or email, [email protected].