IoTeX bridge exploit raises debate over losses and recovery prospects as CEO offers 10% bounty
IoTeX, a blockchain project specializing in Internet-of-Things devices, recently faced a security breach on its cross-chain bridge ioTube. The breach resulted in the unauthorized control over the bridge contracts, allowing hackers to siphon millions of dollars. In response to this incident, IoTeX offered a 10% white-hat bounty to the hacker or hackers responsible for the exploit, in exchange for the voluntary return of the stolen funds within 48 hours.
The co-founder and CEO of IoTeX, Raullen Chai, confirmed the offer of a $440,000 reward in exchange for the return of approximately $4.4 million that was stolen. This move follows a trend in the crypto industry where projects offer bounties to hackers who return stolen funds voluntarily.
To ensure the safe return of the remaining funds, IoTeX sent an onchain message stating that they would not pursue legal action or share identifying information with law enforcement. The team also announced the rollout of a new chain version, Mainnet v2.3.4, which includes a default blacklist of malicious externally owned account (EOA) addresses to enhance security measures.
Despite the breach on the ioTube bridge, IoTeX reassured users that its Layer 1 blockchain was not affected, and the incident was isolated to the Ethereum-side infrastructure of the bridge. However, the breach did lead to a 22% drop in the value of the IOTX token, although it has partially rebounded since then.
Cross-chain bridges have been a vulnerable point in the crypto space, with several high-profile exploits in recent years. Reports indicate that over $3.2 billion has been lost due to cross-chain bridge hacks, making them a prime target for advanced threat actors.
The security breach on IoTeX’s bridge was attributed to a compromised validator owner private key on the Ethereum side, highlighting the importance of operational security in the crypto industry. Despite the breach, IoTeX emphasized that their Layer 1 network remained secure, and user funds were specifically entrusted to the bridge infrastructure.
On-chain analysis by security firm PeckShield estimated that over $8 million worth of assets were affected in the breach, with the attacker swapping funds into ether (ETH) and bridging them to bitcoin via THORChain. Recovery of these assets was deemed extremely difficult once they were routed through THORChain.
IoTeX identified four bitcoin addresses holding 66.78 BTC worth roughly $4.3 million and is monitoring these addresses in cooperation with exchanges. However, the prospects of recovering these assets remain uncertain, as the assets were swapped and bridged, making recovery challenging.
In response to the breach, IoTeX announced a compensation plan and offered a 10% bounty for the return of remaining funds. This incident underscores the importance of maintaining strong security measures and operational practices in the crypto space to mitigate the risk of security breaches and asset loss. The world of technology is constantly evolving, and with each passing day, new innovations are being introduced that have the potential to change the way we live and work. From artificial intelligence to virtual reality, the possibilities are endless. One of the most exciting developments in recent years is the rise of 5G technology.
5G is the fifth generation of wireless technology, and it promises to revolutionize the way we use our devices. With faster speeds, lower latency, and increased capacity, 5G has the potential to transform industries such as healthcare, transportation, and entertainment.
One of the key benefits of 5G is its lightning-fast speeds. With download speeds up to 100 times faster than 4G, users will be able to stream high-definition video, download large files, and browse the internet at incredible speeds. This will not only improve the overall user experience but also enable new technologies such as augmented reality and virtual reality to become more mainstream.
Another advantage of 5G is its lower latency. Latency refers to the time it takes for data to travel from one point to another, and with 5G, this time is significantly reduced. This means that tasks that require real-time data processing, such as autonomous vehicles and remote surgery, can be done more efficiently and effectively.
In addition to speed and latency improvements, 5G also offers increased capacity. This means that more devices can connect to the network at the same time without experiencing a slowdown in performance. This will be crucial as the number of internet-connected devices continues to grow, from smartphones and tablets to smart home devices and autonomous drones.
The impact of 5G technology will be felt across a wide range of industries. In healthcare, for example, 5G could enable remote patient monitoring, telemedicine, and even robotic surgeries. In transportation, 5G could pave the way for autonomous vehicles that communicate with each other and the infrastructure in real-time. And in entertainment, 5G could enable new experiences such as live virtual reality concerts and interactive gaming.
Overall, the potential of 5G technology is immense. As the rollout of 5G networks continues around the world, we can expect to see a wave of new innovations and possibilities that will shape the future of technology for years to come. It’s an exciting time to be a part of the tech industry, and the possibilities are truly endless.


