Recently, SushiSwap confirmed that almost 300 ETH of Sifu's stolen assets were secures via the white hat security procedure and were recovered by CoffeeBabe. Additionally, communication is still underway with the Lido team regarding the remaining 700 ETH. In order to assure users that the SushiSwap protocol and user interface are not at risk, CTO Matthew Lilley declared that RouterProcessor2 contract issue have been removed from the front end and that LPing/current exchanges can be done safely.

P2P Validator further stated that its LidoFinance validator received a 689 ETH MEV award. However, MEV payouts were directed to the Lido rewards vault. To address the current Sushi exploit, P2P Validator and the Lido and Sushi teams are studying the issue and looking for suitable remedies.

This exploit, first discovered by DefiLlama's Founder, results in the loss of over $3.3 million to at least one user and is rooted in the RouterProcessor2 contract approval flaw. Users who have engaged in swapping within the last four days may also be affected. As such, a webpage has been created to verify the impacted addresses.

In conclusion, SushiSwap is making every attempt to minimize financial damages due to the recent exploit. In order to do so, the protocol is undergoing various recovery efforts.



Other News from Today