Jared Grey, the chef of SushiSwap, has once more pleaded on social media for RouteProcessor 2 to revoke its acceptance of the contract error as quickly as possible.

Grey added that the #SushiSwap security team can be contacted, that recovery attempts are ongoing, and that the majority of the affected money has been secured using white hat security techniques.

Nearly 300 #ETH of Sifu's stolen funds have been confirmed to have been recovered through CoffeeBabe by SushiSwap, and the Lido team is being contacted about the remaining 700 ETH.



Additionally, SushiSwap CTO Matthew Lilley made it clear on social media that the protocol and user interface are risk-free, that all RouterProcessor2 contract issues have been resolved on the front end, that all LPing and current exchange activities can be completed safely, and that SushiSwap will continue to keep track of when funds are available and rescue funds using the white hat rescue address.

It has been confirmed by P2P Validator that its #LidoFinance validator just won a 689 ETH MEV prize. The most recent Sushi exploit is connected to these MEV payouts.

Like every other Lido validator, P2P did not receive or handle the awards because they were sent to the Lido rewards vault, according to P2P Validator. The team is currently in discussions with the Lido and Sushi teams to investigate the issue and look for potential solutions.

According to Coin Aquarium, SushiSwap was the victim of an exploit that cost at least one user more than $3.3 million. An approval of contracts bug in RouterProcessor2 is exploited. Those who switched during the previous four days can be impacted. DefiLlama’s founder also created a webpage to verify addresses impacted by the SushiSwap attack.

This news is republished from https://coinaquarium.io/