Deprecated: Implicit conversion from float 79.9 to int loses precision in /home/cxvps542/visegrad24.info/wp-includes/class-wp-hook.php on line 85

Deprecated: Implicit conversion from float 79.9 to int loses precision in /home/cxvps542/visegrad24.info/wp-includes/class-wp-hook.php on line 87

Deprecated: Constant FILTER_SANITIZE_STRING is deprecated in /home/cxvps542/visegrad24.info/wp-content/plugins/wpseo-news/classes/meta-box.php on line 59

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/cxvps542/visegrad24.info/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/cxvps542/visegrad24.info/wp-includes/class-wp-hook.php:85) in /home/cxvps542/visegrad24.info/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/cxvps542/visegrad24.info/wp-includes/class-wp-hook.php:85) in /home/cxvps542/visegrad24.info/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/cxvps542/visegrad24.info/wp-includes/class-wp-hook.php:85) in /home/cxvps542/visegrad24.info/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/cxvps542/visegrad24.info/wp-includes/class-wp-hook.php:85) in /home/cxvps542/visegrad24.info/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/cxvps542/visegrad24.info/wp-includes/class-wp-hook.php:85) in /home/cxvps542/visegrad24.info/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/cxvps542/visegrad24.info/wp-includes/class-wp-hook.php:85) in /home/cxvps542/visegrad24.info/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/cxvps542/visegrad24.info/wp-includes/class-wp-hook.php:85) in /home/cxvps542/visegrad24.info/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/cxvps542/visegrad24.info/wp-includes/class-wp-hook.php:85) in /home/cxvps542/visegrad24.info/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":6861,"date":"2023-03-17T06:40:24","date_gmt":"2023-03-17T01:40:24","guid":{"rendered":"https:\/\/visegrad24.info\/michael-bentley-of-euler-labs-reaches-out-to-community-about-hack\/"},"modified":"2023-03-17T06:40:24","modified_gmt":"2023-03-17T01:40:24","slug":"michael-bentley-of-euler-labs-reaches-out-to-community-about-hack","status":"publish","type":"post","link":"https:\/\/visegrad24.info\/michael-bentley-of-euler-labs-reaches-out-to-community-about-hack\/","title":{"rendered":"Michael Bentley of Euler Labs Reaches Out to Community about Hack"},"content":{"rendered":"
\n

Michael Bentley’s tweet revealing concerns about the $6 million hack at Euler Labs sparked an investigation into the incident and its implications for the DeFi community.<\/p>\n

Decentralized finance (DeFi) platform Euler Labs recently made headlines when it fell victim to a devastating hack, resulting in a loss of $6 million. Tweet by Michael Bentley<\/a> He highlighted the issue, which has raised concerns among the DeFi community about the integrity and security of the platform.<\/p>\n

The hacker was able to exploit a vulnerability in the Euler Labs smart contract code, which led to the theft.<\/p>\n

Euler took a big hit<\/h2>\n

The attacker used Tornado Cash, a non-security Ethereum mixer, to launder 1,666.66 ETH (worth roughly $1.6 million) from the stolen funds. Tornado Cash enables users to maintain their privacy by obfuscating the transaction path, making it difficult for authorities to track and recover stolen assets.<\/p>\n

\n
\n
\n

A few words about recent events.<\/p>\n

These were the hardest days of my life and I am so devastated for everyone who has been affected.<\/p>\n

– Michael Bentley (@euler_mab) March 16, 2023<\/a><\/p><\/blockquote>\n