Cointime

Download App
iOS & Android

A Grey Area: Retroactive Bug Bounty Negotiations

Validated Project

Between October 2020 and March 2023 there have been 25 exploits of Web3 projects where the impacted projects were later able to recover some or all of the funds lost. Across these 25 incidents approximately $1.35 billion was stolen, and $992 million (73%) was returned. This year, Euler Finance, Allbridge, and Sentiment Protocol have all conducted successful negotiations with their attackers. But this is an ongoing grey zone. These attackers are not white hats who approach vulnerable protocols with clearly defined bug bounty programs, nor are they black hats who make off with all of the funds stolen. They’re grey hats, and they deserve analysis.

Exploits have plagued the Web3 industry for years, targeting protocols, smart contracts, and software-based applications like self-custody wallets. The outcome of these incidents largely resulted in bad actors stealing assets from their targets and disappearing off the map. However, a number of protocols have been able to successfully negotiate with their attackers to return funds. CertiK identified 25 protocols exploited between October 2020 and March 2023 that had some or all of their funds returned following negotiations with attackers.

  • Approximately $1.35 billion in funds were stolen
  • Approximately $992 million in funds were returned (73%)
  • Approximately $314.5 million was kept by attackers (23.1%)
  • The reamining 3.9% of funds were either lost or frozen during the process

So far in 2023, eight major exploits – totaling approximately $221.5 million in losses – saw around $188 million returned (84.8%).

Some funds that were not returned were kept as white hat bounties for bringing attention to protocol vulnerabilities. Other unreturned funds were surrendered by protocols in order to meet demands from attackers.

Of these 25 protocols, four saw all their funds returned.

Attackers have approached the return of stolen funds differently. Some returned all stolen funds, while others returned partial amounts or none at all. Due to the initial malicious nature of the exploits, and the subsequent change of heart for some attackers after opening negotiations with their victims, we have categorized these incidents as grey-hat scenarios.

After Cashio.App experienced an exploit where the attacker stole $50 million, they eventually returned funds to investors who had less than $100,000 in their accounts with the remaining money allegedly being sent to charity.

Mango Markets serves as another example, where exploiter Avraham Eisenberg returned approximately $67 million out of the $117 million dollars stolen from the project claiming that his actions were legal and that they were a “highly profitable trading strategy.” Despite reaching an agreement with the protocol, Avraham Eisenberg was later prosecuted by the SEC for orchestrating the attack on Mango Markets.

The cryptocurrency industry has been suffering from increasing exploits and hacks over the past few years. With that said, protocols appear to be engaging in more negotiations with their attackers and getting significant funds returned.

Oftentimes, these negotiations take place in public spaces like social media or in on-chain messages between attackers and their victims. Leaving a note in a transaction to an anonymous hacker is often the only way to get in contact with them.

This could indicate a a growing shift in the industry that leads to less risk and greater security for protocols and investors, especially where projects create market incentives that push attackers to negotiate. To further explore this possibility, we wanted to examine how victims are pursuing different negotiation strategies by analyzing these public negotiations and their end results.

We have chosen to look at how four different protocols (Poly Network, Allbridge, Euler Finance, and Sentiment Protocol) have conducted their negotiations. These protocols were picked since they were large attacks, were mostly successful in their funds being returned, and aside from Poly Network, all of these just took place over the past month. Although these four protocols have different strategies, they also all used a bounty as an incentive for the hacker to return the funds.

Poly Network

On 10 August, 2021, a hacker exploited a vulnerability in Poly Network’s code, allowing them to steal funds in more than 12 different cryptocurrencies for a total loss of more than $610 million. That same day, Poly Network reached out directly to the hacker using an on-chain message asking them to get in touch.

Eventually, they offered a bounty if funds were returned. Poly Network also tweeted an open letter to the hacker saying that “law enforcement in any country will regard this as a major economic crime and you will be pursued.” Finally, Poly Network went as far as flattering the hacker, saying that they “hope it will be remembered as the biggest white hat hack in the [sic] history.”

In response, the hacker said that Poly urged investors and others to blame them before they even had a chance to reply and that they had no intentions of laundering the money. The attacker also communicated with Poly Network via transaction notes during this process, stating their intention to start by returning altcoins and asking if their stolen USDT could be unfrozen in return for returning stolen USDC. Poly Network did not respond to the attacker’s question, which seems to have worked in their favor as the hacker started returning funds to three Poly Network addresses the next day.

The hacker later followed up with a message saying they would provide the final secret key to a multi-sig wallet they would use to return the funds.

Poly Network’s combination of strategies seems to have worked as the hacker eventually returned all the stolen assets that were sent to the multi-sig account. Most of the lost funds were returned to Poly Network except $33 million worth of USDT which were frozen by Tether. In response, Poly Network paid a 160 ETH (approximately $486,000) bug bounty to a separate account created by the hacker. The hacker then returned the bug bounty to Poly Network and asked for that sum to be distributed amongst the impacted investors.

A complete transcript of negotiations between the Poly Network and the hacker can be found here.

Allbridge

On 1 April, 2023, Allbridge suffered an attack targeting their BUSD/USDT pools on BNB Chain. The project originally said that the attack only affected those BNB Chain pools but that the exploit could extend to other pools. To prevent this, the project halted their bridge platform and created a web interface for liquidity pool operators to withdraw their balances.

Just like Poly Network, shortly after the attack, Allbridge announced that the hacker would be offered a white hat bounty and added that they would get immunity from any legal consequences if the stolen funds were returned. On April 3, the team announced that it had received a message from the attacker and 1,500 BNB (approximately $465,000) was returned to the project. This left the hacker with approximately $108,000 worth of assets.

Allbridge also mentioned in the thread that there was another hacker that had used the same technique as the first attacker, but who had not contacted the team yet. Allbridge urged the second hacker to come forward and discuss terms for returning the funds. At the time of writing, there is no indication that the second hacker has reached out to the platform.

Euler Finance

The Euler Finance hack is the largest crypto exploit so far in 2023. On 13 March, 2023, Euler Finance was targeted with a flash loan exploit that drained the protocol of $197 million. Just like in the Poly Network and Allbridge instances, Euler Finance offered the attacker a 10% bounty if they returned the remaining assets. However, the project also took a more aggressive approach with their negotiation strategy and issued a warning that they would give a $1 million reward for information on the attacker if the remaining 90% of the funds were not returned. Despite this warning, the hacker moved approximately $1.78 million to Tornado Cash.

The hacker then messaged Euler Finance via an on-chain message, aiming to set up a secure line of communication.

On March 21, Euler Finance acted on their warning and launched a $1 million bounty against the hacker after the attacker stopped responding. Four days later, the hacker started returning the funds back to Euler along with an apology:

On 3 April, Euler Finance announced on their Twitter account that they recuperated all of their “recoverable funds" after negotiating with the hacker.

They added that since the hacker “did the right thing” they would no longer be accepting new information that would lead to their arrest, meaning the $1 million reward would no longer be available.

Sentiment Protocol

On 4 April, 2023, Sentiment Protocol was hacked for close to $1 million. The hacker used a read-only reentrancy bug to exploit an integration between Sentiment and the decentralized exchange Balancer. On 5 April, Sentiment Protocol announced the exploit on their Twitter account and paused the main contract to only enable withdrawals in order to mitigate the loss of further funds.

Sentiment Protocol offered to negotiate with the hacker, giving them a bounty and also threatening that if funds were not returned before 6 April, the bounty’s money would be given to anyone who could provide information on the hacker. Like Allbridge, the protocol also promised they wouldn’t be pursuing legal actions against the attacker. They sent an on-chain message stating:

The next day they offered the hacker a $95,000 bounty if the funds were returned by 8:00 UTC on 6 April. On 6 April, the team announced that the hacker had returned 90% of all funds.

Summary of Grey Hat Negotiation Strategies

As we have seen in all four cases, all of the protocols issued an ex post facto bounty in return for the stolen assets. Euler Finance and Sentiment Protocol both threatened to hand the bounty to anyone who would come forward with information on the hacker. Both Allbridge and Sentiment also announced that they would not be pursuing legal action against the hacker if funds were returned, while Poly Network made it clear that law enforcement would be contacted. Out of these four protocols, two saw their “recoverable” funds fully returned, while Allbridge is still in the process of negotiations with the second hacker. Sentiment Protocol successfully recuperated 90% of their funds after only two days of negotiations. It appears that the appeal of a bounty is essential in negotiations, though Euler Finance and Poly Network both demonstrated that threatening their attackers with law enforcement or giving bounties to community members for information on the hacker can also be effective strategies.

Protect yourself and your assets by following @CertiK, @CertiKCommunity, and @CertiKAlert on Twitter to stay up to date on all the latest Web3 security news.

Read more: https://www.certik.com/resources/blog/4wD02hUnaJlHPfAi0TPHdK-a-grey-area-retroactive-bug-bounty-negotiations

Comments

All Comments

Recommended for you

  • BTC Surpasses $70,000

    Market data shows that BTC has broken through $70,000, currently trading at $70,011.9. The 24-hour decline has narrowed to 1.11%. The market is experiencing significant volatility, so please implement risk control measures.

  • BTC Drops Below $69,500

    Market data shows that BTC has fallen below $69,500, currently trading at $69,492.81. It has experienced a 2.2% decline in the past 24 hours. The market is experiencing significant volatility, so please implement risk control measures.

  • CLARITY Act Draft: Ban on Stablecoin Yields for Holding Only

    On March 24, according to CoinDesk, cryptocurrency industry practitioners on Monday saw the latest provisions regarding stablecoin yields in the revised version of the Senate's "Digital Asset Market Clarity Act" for the first time during a closed-door review meeting on Capitol Hill in Washington. The initial impression was that the relevant language was too narrow and lacked clarity. This new provision was released last Friday by Senators Angela Alsobrooks and Thom Tillis. According to a person familiar with the current draft, the new provision will prohibit earning yields solely from holding stablecoins, while restricting any practices that equate such programs with bank deposits, and imposing further limitations on other potentially permissible activities. The specific mechanism for determining activity-based stablecoin rewards remains unclear. This compromise stems from the lobbying battle between the crypto and banking industries. The banking industry insists that stablecoin rewards should not resemble interest-bearing bank deposits, arguing that such competing products could harm the banking sector and stifle lending. The final compromise allows for reward programs based on user stablecoin activities but prohibits balance-based rewards. This closed-door review aims to push the Senate Banking Committee to schedule a hearing, a significant step for the bill towards a full Senate vote. Similar versions of the "Clarity Act" have passed the House of Representatives in previous years, and another version has also passed the Senate Agriculture Committee's markup process. The bill's progress still faces other obstacles: all parties still need to reach an agreement on the DeFi regulatory framework, and Democrats are simultaneously insisting on including provisions that prohibit senior government officials from seeking personal gain from the cryptocurrency industry, a clause clearly targeting President Trump. (Dongxin News Agency)

  • Iran's IRGC: All Vessels Must Coordinate Passage Through Strait

    According to Al Jazeera: The Iranian Revolutionary Guard Corps (IRGC) Navy stated that the container ship 'Celine' was forced to leave the area because it did not possess a permit to pass through the Strait of Hormuz. The IRGC Navy further stated that any vessel transiting the Strait of Hormuz must coordinate fully with Iranian maritime authorities. (Jins10)

  • Circle Shares Plunge Over 16%, Hitting Largest Single-Day Drop Since June 2025

    Circle (CRCL) shares fell by more than 16% intraday, marking the largest single-day decline since June 2025. The stock is currently trading at $106.1.

  • BTC Drops Below $70,000

    Market data shows that BTC has fallen below $70,000, currently trading at $69,995.57. The cryptocurrency has seen a 1.86% decrease in the last 24 hours, indicating significant price volatility. Investors are advised to manage their risk accordingly.

  • Nasdaq Extends Losses to 1%

    The Nasdaq extended its losses to 1%.

  • Iran Denies Peace Talks Rumors; US Stocks Open Lower

    March 24th news: US stocks opened lower, with the Dow Jones Industrial Average down 0.24%, the S&P 500 index down 0.62%, and the Nasdaq Composite down 0.63%. Li Auto (LI.O) rose 2.8% after announcing a $1 billion share buyback plan. Amazon (AMZN.O) fell 1% following a "service disruption" at its Amazon Web Services (AWS) region in Bahrain. (Jinshi)

  • Tether Hires Big Four Firm for First Full Audit

    On March 24, Tether announced it has engaged one of the Big Four accounting firms to complete its first full audit.

  • Web3 data and AI company Validation Cloud completes $10 million in new round of financing

     Web3 data and AI company Validation Cloud announced a $10 million financing round from True Global Ventures. The company plans to use the funds to expand its AI products and achieve seamless access to Web3 data.