The Shiba Inu development team has issued its last bounty bid to the hacker behind the recent Shibarium bridge 0 team now proposes a 25 ETH bounty for the return of stolen 1 is the third and the last effort in bargaining with the 2 standoff has played out entirely on-chain through the Ethereum 3 message between the developers and the attacker remains publicly visible. K9 Finance DAO initially offered 5 ETH as a white hat 4 hacker rejected this proposal and countered with a demand for 50 ETH. A second offer of 20 ETH followed through a deployed smart 5 attacker also declined this 6 development team has now increased the bounty to 25 ETH, but made clear that no further negotiations will 7 message attached to the latest proposal combines urgency with a stern 8 emphasized that the Shiba Inu team itself backs this offer, not just K9 9 stolen tokens remain blacklisted across the 10 renders them effectively worthless to the attacker. ”The blacklisted tokens are currently useless to you, and we could easily move on,” the team stated. ”You've taken real money from hardworking people who trusted the Shib 11 the smart thing and collect what you 12 are ready to walk away.” Recovery Efforts and Security Response Lead developer Shytoshi Kusama confirmed the establishment of a ”war room” following the September attack.
A dedicated team coordinates all recovery efforts for the compromised 13 initiative demonstrates the project's commitment to protecting user 14 reward contract operates on a trustless basis to ensure secure fund 15 hacker must approve the contract to transfer the frozen KNINE tokens before claiming the 16 mechanism prevents any potential payment 17 users continue to wait for updates on their stolen 18 development team has not yet announced a timeline for potential 19 focus remains on recovering the funds through the bounty 20 Network Enhancements The Shibarium team has implemented multiple security upgrades since the 21 measures aim to prevent similar attacks and eliminate single points of 22 network underwent a temporary shutdown to facilitate these 23 disabled the legacy RPC endpoint as part of the security 24 anti-hack protocols were integrated during this 25 endpoint served as a potential vulnerability that required immediate attention.
Story Tags

Latest news and analysis from Coinpaper


