• Dapps:16.23K
  • Blockchains:78
  • Active users:66.47M
  • 30d volume:$303.26B
  • 30d transactions:$879.24M
DeFI project Velodrome was hacked and stopped working

DeFI project Velodrome was hacked and stopped working

user avatar

by Alexandra Smirnova

2 years ago


The Velodrome protocol has released a warning to its users about a potential vulnerability and a breach in their software interface. The company has strongly advised its clients to refrain from any actions with Velodrome until further notice.

At this moment, our user interface is compromised. We ask you to refrain from interacting with Velodrome at this time. The team is conducting an investigation and will provide additional information here as soon as it becomes available,Velodrome (@VelodromeFi) on November 29, 2023.

The details of the incident have not been disclosed by the Velodrome DeFi project team. Nonetheless, according to independent crypto analyst ZachXBT, it is suspected that the attack is related to an attempt to steal the protocol's assets, which are believed to be redirected to addresses beginning with 0x02BA1 and 0xf64fC.

Analytical company L2beat has noted that second-layer solutions like Optimism for the Ethereum blockchain are becoming more popular compared to the main network. In particular, there has been a constant increase in the total volume of transactions in the sidechain since September of the previous year.

0

Rewards

chest
chest
chest
chest

More rewards

Discover enhanced rewards on our social media.

chest

Other articles

Fetch.ai Overview — Combining Artificial Intelligence and Blockchain

chest

A detailed overview of Fetch.ai: AI-powered blockchain, autonomous agents, FET token, key features, advantages, and future potential in Web3.

user avatarElena Ryabokon

Iron Fish Overview — How the Privacy Blockchain and IRON Token Work

chest

A detailed overview of Iron Fish: privacy-focused blockchain, zk-SNARK technology, IRON token, advantages, limitations, and real-world use cases.

user avatarElena Ryabokon

What Is Threshold Network — How Threshold Cryptography Works and the T Token

chest

An overview of Threshold Network: decentralized cryptography, data privacy, T token utility, and use cases in Web3, DeFi, and confidential computing.

user avatarElena Ryabokon

What Is Lit Protocol — How Decentralized Access Control Works and the LIT Token

chest

An overview of Lit Protocol: decentralized access control, cryptography, LIT token utility, and use cases in Web3, AI, and NFTs.

user avatarElena Ryabokon

What Is Secret Network — How Private Smart Contracts Work and the Role of SCRT Token

chest

A detailed overview of Secret Network: private smart contracts, confidential computing technology, SCRT token utility, and real-world Web3 use cases.

user avatarElena Ryabokon

What Is Phala Network — TEE Technology, PHA Token Utility, and Project Outlook

chest

A detailed overview of Phala Network: TEE technology, confidential computing, PHA token utility, AI use cases, and the project’s future potential.

user avatarElena Ryabokon

Important disclaimer: The information presented on the Dapp.Expert portal is intended solely for informational purposes and does not constitute an investment recommendation or a guide to action in the field of cryptocurrencies. The Dapp.Expert team is not responsible for any potential losses or missed profits associated with the use of materials published on the site. Before making investment decisions in cryptocurrencies, we recommend consulting a qualified financial advisor.