{"id":94793,"date":"2026-05-22T18:34:43","date_gmt":"2026-05-22T18:34:43","guid":{"rendered":"https:\/\/dogewisperer.com\/?p=94793"},"modified":"2026-05-22T18:34:43","modified_gmt":"2026-05-22T18:34:43","slug":"verus-bridge-exploiter-returns-8-5m-keeps-2-8m-as-bounty-reward","status":"publish","type":"post","link":"https:\/\/dogewisperer.com\/?p=94793","title":{"rendered":"Verus Bridge Exploiter Returns $8.5M, Keeps $2.8M as Bounty Reward"},"content":{"rendered":"<div>\n<p>The exploiter who drained the Verus-Ethereum bridge of over $11 million has returned $8.5 million to the project\u2019s team, while keeping $2.8 million as a white-hat bounty.<\/p>\n<p>This comes barely a day after the Verus community and its developers offered the reward in exchange for the hacker meeting a set of terms.<\/p>\n<h2>Hacker Accepts $2.8 Million Bounty<\/h2>\n<p>The incident took place\u00a0on May 17, with the hacker <a href=\"https:\/\/cryptopotato.com\/hacker-steals-over-11m-from-verus-ethereum-bridge\/\">taking<\/a> advantage of\u00a0a missing validation step on one of its cross-chain bridge contracts, which allowed them to drain approximately 103.6 tBTC, 1,625 ETH, and 147,000 USDC. Following the hack, the project\u2019s team decided to stop its block-producing nodes to prevent further transfers and issued an emergency patch.<\/p>\n<p>Verus later <a href=\"https:\/\/x.com\/VerusCoin\/status\/2057465214975492358?s=20\">said<\/a> on social media that it was offering the Ethereum bridge exploiter a 1,350 ETH bounty in exchange for returning 4,052 ETH within 24 hours, adding that it would stop any investigations and not pursue charges if the conditions were met.<\/p>\n<blockquote>\n<p>\u201cIf you return a total of 4052.4 ETH to the address 0xF9AB\u2026C1A74 within 24 hours specified above, we will understand that as your agreement to these terms, and we will uphold our stated agreement to cease further investigation of you,\u201d wrote the team.<\/p>\n<\/blockquote>\n<p>Blockchain security firm PeckShieldAlerts has since <a href=\"https:\/\/x.com\/PeckShieldAlert\/status\/2057638728890536262?s=20\">reported<\/a> that the hacker transferred 4,052 ETH back to the team\u2019s address, recovering 75% of the stolen funds while retaining a 25% bounty of 1.350 ETH. However, Verus has yet to issue a formal acknowledgment of the recovery on their platforms as stipulated in their initial statement.<\/p>\n<h2>Developer Flags Possible AI Use in Hack<\/h2>\n<p>The update comes as the crypto sector is dealing with a rise in the number of bridge exploits, with the Verus incident being the eighth of this kind this year. According to PeckShield, attackers have made off with a total of $328.6 million from several cross-chain protocols like THORchain, ZetaChain, KelpDAO, HyperBridge, CrossCurve, Squid Router, and IoTeX.io as of Mid-May.<\/p>\n<p>But the Verus case is notable because the complexity of the exploit suggests hackers are using AI to help execute it.\u00a0The protocol\u2019s lead developer, Mike Toutonghi, <a href=\"https:\/\/x.com\/VerusCoin\/status\/2056829444124213652?s=20\">explained<\/a> in an article how the technology might have helped them understand the system\u2019s rules closely enough to design transactions that bypassed checks and tricked the Ethereum contract into accepting the malicious cross-chain transfer.<\/p>\n<p>Elsewhere, Vitalik Buterin <a href=\"https:\/\/cryptopotato.com\/vitalik-buterin-says-ai-could-strengthen-crypto-security\/\">shared<\/a> insights on how AI can still be used to strengthen security instead of breaking it. Responding to community concerns about the technology creating non-stop exploitation opportunities, the Ethereum co-founder countered by saying that AI-assisted formal verification could be used as a strong defense against security failures in the crypto industry.<\/p>\n<p>The post <a href=\"https:\/\/cryptopotato.com\/verus-bridge-exploiter-returns-8-5m-keeps-2-8m-as-bounty-reward\/\">Verus Bridge Exploiter Returns $8.5M, Keeps $2.8M as Bounty Reward<\/a> appeared first on <a href=\"https:\/\/cryptopotato.com\/\" rel=\"nofollow\">CryptoPotato<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The exploiter who drained the Verus-Ethereum bridge of over $11 million has returned $8.5 million to the project\u2019s team, while keeping $2.8 million as a white-hat bounty. This comes barely a day after the Verus community and its developers offered the reward in exchange for the hacker meeting a set of terms. Hacker Accepts $2.8 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":0,"footnotes":""},"categories":[2],"tags":[3,4,5],"class_list":["post-94793","post","type-post","status-publish","format-standard","hentry","category-news","tag-crypto","tag-doge","tag-news"],"_links":{"self":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/94793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=94793"}],"version-history":[{"count":0,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/94793\/revisions"}],"wp:attachment":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=94793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=94793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=94793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}