create account

Yup! Another Day, Another Hack! by kevinnag58

View this thread on: hive.blogpeakd.comecency.com
· @kevinnag58 ·
$14.12
Yup! Another Day, Another Hack!
![](https://imagesofcmsprod.s3.ap-southeast-1.amazonaws.com/post/1656844726207.jpg)
[Photo Source](https://imagesofcmsprod.s3.ap-southeast-1.amazonaws.com/post/1656844726207.jpg)

> Crema Finance, a concentrated liquidity protocol over the Solana blockchain, announced the temporary suspension of its services owing to a successful exploit that has drained a substantial but undisclosed amount of funds. Soon after realizing the hack on its protocol, Crema Finance suspended the liquidity services to refrain the hacker from draining out its liquidity reserves — which include the funds of the service provider and investors.

[Sarkar, A. [Crema Finance shuts liquidity protocol on Solana amid hack investigation](https://cointelegraph.com/news/crema-finance-shuts-liquidity-protocol-on-solana-amid-hack-investigation). (Accessed July 3, 2022)].

![20220703 2.png](https://images.hive.blog/DQmXhwiRpg2y6ECKiS7RG7ZV3oVMxb3T5Vfn3AuJDqzdY9R/2022-07-03%20(2).png)
[Photo Source](https://twitter.com/Crema_Finance/status/1543416225622941696)

"Several hours later, Crema tweeted that it was working with OtterSec, a blockchain audits firm, and other experienced organizations on the investigation. In the same thread, OtterSec said that Crema 'was recently hacked for over $6M. Unlike previous attacks, this hacker used Solend flashloans to drain the pool' [Millard, M. [Crema Finance suspends liquidity protocol on Solana amid probe of hack ](https://www.theblock.co/post/155645/crema-finance-suspends-liquidity-protocol-on-solana-amid-probe-of-hack). (Accessed July 3, 2022)]. These tweets appear on Twitter as follows:

![20220703 4.png](https://images.hive.blog/DQmQaUzdy4hBtejFU4eo4G4fFEjNMbV1eQsFxFQH72XNDLw/2022-07-03%20(4).png)
[Photo Source](https://twitter.com/Crema_Finance/status/1543471901552431105)

and

![20220703 6.png](https://images.hive.blog/DQmPzQp8xadrFt46tP6jdw6rSugEfXLtSipVQaRW4nF9kNG/2022-07-03%20(6).png)
[Photo Source](https://twitter.com/osec_io/status/1543469811287465984)

Not waiting for Crema Finance, its crypto community led by @HarveyMackinto2 took it upon themselves to look into this situation. "Based on a personal investigation, crypto community member @HarveyMackinto2 allegedly spotted the hacker’s wallet address. The address in question holds 69,422.89 Solana (SOL) tokens — roughly over $2.3 million, procured through a series of transactions over several hours" [Sarkar, supra].

> However, some members of the cryptocurrency industry believe the hacker stole 90% of the total liquidity from some of Crema Finance’s pools. Co-founder of Crema Finance Henry Du acknowledged that all protocol functions have been put on indefinite hold and urged investors to check back for an update for further details.

[CoinCu News. [Crema Finance Suspends Its Liquidity Procedure For Solana Amid A Hacking Probe](https://news.coincu.com/105121-crema-finance-amid-a-hacking-probe/). (Accessed July 3, 2022)].

An important note: "Crema Finance is not related to Cream Finance, a decentralized finance DeFi lending protocol, that also lost $19 million in a flash loan hack last year" [Sarkar, supra].

AND - in related news concerning the Harmony Horizon Bridge hack [see, e.g. Nagoda, K. [BREAKING NEWS: Harmony Blockchain's 'Horizon Bridge' Hacked for $100 Million](https://leofinance.io/@kevinnag58/breaking-news-harmony-blockchain-s-horizon-bridge-hacked-for-usd100-million). (Accessed July 3, 2022):

"The Lazarus Group, a North Korean hacker group, is now the main suspect in a recent attack that stole $100 million from the Harmony protocol. According to Elliptic’s blockchain analysis, North Korea was involved based on the ways the stolen money was laundered: 'There are strong indications that North Korea’s Lazarus Group may be responsible for this theft, based on the nature of the hack and the subsequent laundering of the stolen funds" [CoinCu News, supra].



Posted Using [LeoFinance <sup>Beta</sup>](https://leofinance.io/@kevinnag58/yup-another-day-another-hack)
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 67 others
👎  
properties (23)
authorkevinnag58
permlinkyup-another-day-another-hack
categoryhive-167922
json_metadata{"app":"leofinance/0.2","format":"markdown","tags":["cremafinance","hack","pob","vyb","ctp","cent","broadhive","neoxian","leofinance"],"canonical_url":"https://leofinance.io/@kevinnag58/yup-another-day-another-hack","links":["https://imagesofcmsprod.s3.ap-southeast-1.amazonaws.com/post/1656844726207.jpg","https://cointelegraph.com/news/crema-finance-shuts-liquidity-protocol-on-solana-amid-hack-investigation","https://twitter.com/Crema_Finance/status/1543416225622941696","https://www.theblock.co/post/155645/crema-finance-suspends-liquidity-protocol-on-solana-amid-probe-of-hack","https://twitter.com/Crema_Finance/status/1543471901552431105","https://twitter.com/osec_io/status/1543469811287465984","https://news.coincu.com/105121-crema-finance-amid-a-hacking-probe/","https://leofinance.io/@kevinnag58/breaking-news-harmony-blockchain-s-horizon-bridge-hacked-for-usd100-million"],"image":["https://imagesofcmsprod.s3.ap-southeast-1.amazonaws.com/post/1656844726207.jpg","https://images.hive.blog/DQmXhwiRpg2y6ECKiS7RG7ZV3oVMxb3T5Vfn3AuJDqzdY9R/2022-07-03%20(2).png","https://images.hive.blog/DQmQaUzdy4hBtejFU4eo4G4fFEjNMbV1eQsFxFQH72XNDLw/2022-07-03%20(4).png","https://images.hive.blog/DQmPzQp8xadrFt46tP6jdw6rSugEfXLtSipVQaRW4nF9kNG/2022-07-03%20(6).png"]}
created2022-07-03 17:32:45
last_update2022-07-03 17:32:45
depth0
children0
last_payout2022-07-10 17:32:45
cashout_time1969-12-31 23:59:59
total_payout_value7.076 HBD
curator_payout_value7.046 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length4,005
author_reputation84,079,667,403,710
root_title"Yup! Another Day, Another Hack!"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id114,537,206
net_rshares22,259,656,600,260
author_curate_reward""
vote details (132)