Hacker Reimburses Funds From $40M GMX Hack

A hacker exploited GMX for $40 million but returned half after accepting a white hat bounty.

Rose Nnamdi By Rose Nnamdi Hamza Tariq Editor Hamza Tariq Updated 2 mins read
Hacker Reimburses Funds From $40M GMX Hack

Key Notes

  • Hacker exploited GMX's v1 liquidity pool, stealing $40 million.
  • GMX offered a $5 million white hat bounty for fund return.
  • Attacker has returned $20 million in crypto so far.

GMX GMX $11.68 24h volatility: 4.2% Market cap: $119.26 M Vol. 24h: $77.12 M , a decentralized exchange on Arbitrum ARB $0.40 24h volatility: 11.5% Market cap: $1.97 B Vol. 24h: $405.11 M , was hit with a $40 million exploit on July 9 after an attacker drained its v1 liquidity pool by manipulating GLP token values.

Soon after the exploit, the attacker left an on-chain message saying, “Ok, funds will be returned later,” which was flagged by blockchain security firm PeckShield.

Less than an hour later, the attacker began sending stolen crypto back to GMX, signaling they had accepted the white hat bounty offered by the team.

The attacker, known as “GMX Exploiter 2,” began returning the stolen crypto and has since sent back over $9 million in Ether ETH $2 949 24h volatility: 6.5% Market cap: $356.59 B Vol. 24h: $39.25 B . PeckShield disclosed that the GMX team also received over $5.5 million in FRAX tokens from the attacker.

In another transaction, the attacker sent FRAX FRAX $1.00 24h volatility: 0.0% Market cap: $314.25 M Vol. 24h: $2.65 M tokens with $5 million to the GMX address. The attacker has sent about $20 million worth of cryptocurrencies.

What Happened After the Attack?

Shortly after the July 9 attack on GMX, the exchange announced on X that it was offering a $5 million bounty, which is roughly 12.5 percent of the stolen amount, if the attacker returned the funds.

GMX also said the incident would be treated as a white hat hack and the attacker could keep the bounty without facing any legal consequences.

The team also mentioned they were prepared to provide proof of source of funds if the attacker needed it to use the bounty. They gave the attacker a 48-hour window to return the funds before initiating legal proceedings.

The crypto exchange announced that the attacker could retain 10% of the stolen funds as a white hat bounty reward, provided that 90% of the crypto was returned to the designated addresses.

This type of exploit is common among platforms in the crypto space. Hackers often manipulate oracles or internal data to artificially deflate a token’s value, allowing them to drain assets by swapping at distorted prices.

A few weeks ago, Resupply.Fi was a victim to this, losing $9.6 million to the exploitation. The attacker distorted the value of crvUSD, collapsing its exchange rate against reUSD to zero. This manipulation made it possible to borrow assets nearly free of charge.

Disclaimer: Coinspeaker is committed to providing unbiased and transparent reporting. This article aims to deliver accurate and timely information but should not be taken as financial or investment advice. Since market conditions can change rapidly, we encourage you to verify information on your own and consult with a professional before making any decisions based on this content.

Cryptocurrency News, News
Rose Nnamdi

Rose is a crypto content writer with a strong background in finance and tech. She simplifies complex blockchain and cryptocurrency topics, offering insightful articles and market analysis to help readers navigate the evolving crypto landscape.

Rose Nnamdi on LinkedIn