Saturday, November 1, 2025
Email Us
Info Security Watch
No Result
View All Result
Info Security Watch
No Result
View All Result
Home News

Penpie DeFi Hack: $27 Million Stolen, Pushing Crypto Theft Over $1.2 Billion in 2024

Administrator by Administrator
September 7, 2024
in News, Cryptocurrency, Cybersecurity
387 12
0
Penpie DeFi Hack: $27 Million Stolen, Pushing Crypto Theft Over $1.2 Billion in 2024
549
SHARES
2.5k
VIEWS
Share on FacebookShare on Twitter

The decentralized finance (DeFi) ecosystem has been hit by yet another significant security breach. On September 3, 2024, Penpie, a protocol built on the Pendle platform, was hacked, resulting in the theft of approximately $27 million worth of cryptocurrency. This incident has pushed total crypto losses for 2024 beyond $1.2 billion, highlighting the ongoing threat of crypto scams.

Details of the Penpie DeFi Hack

A post-mortem report by Penpie reveals that the hacker exploited a vulnerability in the protocol’s reward distribution mechanism. The attacker deployed a malicious smart contract, referred to as an “evil market,” which inflated the attacker’s staking balance, allowing them to claim a disproportionate amount of rewards. This manipulation led to millions in stolen funds.

In response, Penpie suspended all deposits and withdrawals, halting operations to prevent further losses. The protocol has also filed complaints with the Singapore police and the FBI. Additionally, Penpie reached out to the hacker, offering a negotiated bounty payment in exchange for the return of the stolen funds.

“We acknowledge your exploit of our protocol,” Penpie wrote to the hacker. “Please contact us to discuss terms confidentially. No legal action will be pursued if the funds are returned.”

Hacker Praise from Euler Finance Cybercriminal

Shortly after the hack, the Penpie hacker moved about $7 million through Tornado Cash, a crypto mixer designed to obscure the origin of transactions. This technique is frequently used by cybercriminals to launder stolen funds.

Adding to the drama, the hacker behind the Euler Finance hack (responsible for a $195 million DeFi heist in 2023) praised the Penpie hacker for keeping the stolen funds:

“Good job bro… I’m happy you kept all the money and didn’t let these bastards get back one dollar.”

Surge in Crypto Scams in 2024

Unfortunately, the Penpie hack is part of a broader trend. In 2024, cyberattacks in the crypto space have resulted in $1.21 billion in stolen funds, a 15.5% increase compared to the previous year, according to a report by Immunfi. The year has witnessed 154 separate incidents, with the majority occurring in the DeFi sector.

August 2024 alone saw alarming levels of crypto phishing scams, with over 9,000 victims losing about $63 million, marking a 215% increase in stolen funds from the previous month.

Regulation and the Future of DeFi

As DeFi hacks continue to rise, there are increasing discussions around regulation in the sector. While some argue that regulatory intervention is necessary to protect users, others fear it could stifle innovation in the DeFi space. Striking the right balance between security and innovation will be critical for maintaining trust and stability in the DeFi ecosystem.

Tags: Phishing ScamsCybersecurityCryptocurrencyBlockchainSmart ContractsDeFiTornado CashPenpieCrypto Theft2024 Hacks
Advertisement Banner
No Result
View All Result

Trending

Internet Security, Zero Trust, Multi-Factor Authentication, Real-Time Threat Intelligence, AI in Cybersecurity, Market Report
Zero-Day

Internet Security Strategic Business Report 2023-2030

September 11, 2024
BreachSeek, AI Penetration Testing, Cybersecurity, LangChain, LangGraph, LLMs, Vulnerability Testing, KFUPM
Cybersecurity Tools

BreachSeek: AI-Based Automated Multi-Platform Penetration Testing Tool

September 10, 2024
Endpoint Privilege Management, PAM, CISOs, Cybersecurity, ThreatLocker, Administrative Privileges, Insider Threats
News

Navigating Endpoint Privilege Management

September 11, 2024
Hussein Syed, RWJBarnabas Health, CISO, Cybersecurity, Healthcare Security, Becker’s Hospital Review Healthcare Cybersecurity, Industry Recognition, Leadership
News

Hussein Syed, RWJ Barnabas Health CISO, Honored as One of 54 CISOs To Know Nationwide

September 10, 2024
Cybersecurity, Government Cybersecurity, AI, Zero Trust, Cyber Hygiene, Global Cybercrime, Cybersecurity Strategy Categories: Cybersecurity News, Government Cybersecurity, Global Threats
Zero-Day

Governments Urged to Get Back to Basics to Stay Ahead of Cybersecurity Threats

September 10, 2024
Terrorist Organizations Exploit Financial Systems for Funding
Money Laundering

Terrorist Organizations Exploit Financial Systems for Funding

September 8, 2024
Info Security Watch

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Follow Us

Recent News

Cyware Achieves FedRAMP Ready Status to Enhance Cybersecurity

Cyware Achieves FedRAMP Ready Status to Enhance Cybersecurity

November 14, 2024
Computer Security Market Advancements Highlighted by Key Drivers and Innovations: Strategic Insights and Forecasts to 2031

Computer Security Market Key Drivers, Innovations, and Forecasts to 2031

September 18, 2024
New York, United States of America
Saturday, November 1, 2025
Partly cloudy
14 ° c
14 c 8 c
Sun
16 c 9 c
Mon
  • About
  • Terms of Service
  • Affiliate Disclosure
  • Disclaimer
  • Contact Us

© 2024 Info Security Watch. All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Information Security
  • Cybersecurity
    • Intrusion Detection & Prevention Systems (IDPS)
    • Data Loss Prevention (DLP)
    • Threat Hunting
    • Secure Remote Access
    • Data Centre Security
    • Cybersecurity Architecture Design
    • Behavioral Analytics
    • Mobile Security
    • Wireless Network Security
    • Privileged Access Management (PAM)
  • OSINT (Open Source Intelligence)
    • OSINT Techniques
    • Sentiment Analysis
    • Image & Video Analysis
    • OSINT for Financial Crime
    • Automated Threat Intelligence Platforms
    • Human Intelligence (HUMINT) Integration
    • Cybercrime Investigation
    • Geolocation Intelligence
    • Metadata Analysis
    • OSINT in Crisis Response
    • Counterterrorism OSINT
  • Digital Forensics
    • Database Forensics
    • Malware Forensics
    • Video Forensics
    • Audio Forensics
    • Anti-Forensics Techniques
    • Forensic Report Writing
    • Cross-Border Digital Investigations
    • Cryptocurrency Forensics
    • Digital Evidence Preservation
    • Legal and Regulatory Forensics
  • Cybersecurity Compliance & Risk Management
    • Compliance
    • Cyber Risk Quantification
  • Financial Analysis
    • Financial Crimes
    • Financial Systems
    • Financial Security
    • Offshore Accounts
    • Shell Companies
    • Terrorist Financing
    • Money Laundering
    • Fraud Detection
  • Business
  • Blockchain
    • Cryptocurrency
  • Investigations
    • Corporate Investigation
    • Investigation Tools
    • Investigative Journalism
  • Data Privacy
    • Data Protection,
  • Intelligence Gathering
    • Data Gathering
  • Dark Web
  • Global Security
    • Cyber Defense
  • Threat Intelligence
    • Cyber Risk Quantification
    • Social Media
    • Report
    • Supply Chain Security
    • Threat Detection
  • Defense
    • Offshore
  • Privacy Policy
  • Framework
    • Government
    • Illicit Funds
    • IoT Security
  • Networking
  • Public Records
  • Ransomware
    • Ransomware Attacks
  • Vulnerabilities
  • Tools
  • Enterprise
  • Artificial Intelligence
  • Quantum Computing
  • Zero-Day
  • Disclaimer
  • Affiliate Disclosure
  • Terms of Service
  • Contact Us

© 2024 Info Security Watch. All Rights Reserved