Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Crypto

$6 million Rewarded by Aurora Labs to Hacker who saved 70,000 ETH

Paul Anderson by Paul Anderson
June 14, 2022
in Crypto
0
Aurora Labs awards $6 Million dollar bug bounty
77
SHARES
1.3k
VIEWS
Share on FacebookShare on Twitter

According to a recent report, Aurora Labs has paid a total of 6 million USD to Pwning.eth. Pwning.eth, an ethical hacker, discovered a serious vulnerability in Aurora’s network not long ago. Interestingly, this vulnerability could have cost the company roughly 70,000 in Ethereum (ETH).

You might also like

WatchDog’s new multi-stage cryptojacking attack unsurfaced

BitCloak Bitcoin mixer – truly anonymize your Bitcoins!

PayPal to Start Accepting Bitcoin as payment

More details on the discovered network vulnerability

Today, we live in a digital world where the word “cyberattack” has become the norm. A recent study revealed an average of about 30,000 websites get hacked daily, and further studies reveal that a company falls victim to cybercrime every 39 seconds.

Although cybercrime is common today, top organizations are putting effective security measures in place to prevent various attacks from hackers. One of these measures requires the company to keep its software and systems fully updated. Another option is to consider employing the service of an expert ethical hacker.

Built on the NEAR protocol, Aurora Labs is an Ethereum Virtual Machine environment. It’s a Layer 1 open blockchain that offers solutions to the scalability issues that other blockchains, such as Ethereum, often encounter. EVM was designed to deliver a turn-key solution that enables developers to operate their apps on any Ethereum-compatible platform at low transaction costs.

According to this tweet, Aurora launched its bug bounty program on Immunefi in April. The program requires ethical hackers to look at the company’s code base and discover any available vulnerabilities. Pwning.eth was one of the few hackers that discovered a vulnerability in Aurora’s network. The white-hat hacker submitted the vulnerability via Immunefi.

According to reports, the discovered vulnerability included an infinite spend bug. This bug could have resulted in a total loss of 70 thousand ETH. Pwning.eth’s vulnerability discovery prevented hackers from attacking Aurora’s blockchain and acquiring user funds.

Pwning.eth receives 6 million USD for discovering the vulnerability

Frank Braun, the head of security at Aurora Labs, stated that the bug bounty program helped the company to understand how to reinforce its defense pipeline better. Here’s a brief of what Braun said:

“Our bug bounty program with Immunefi proved very valuable in incentivizing white hats to look at our code base and disclose bugs in a responsible manner. Such a vulnerability should have been discovered at an earlier stage of the defense pipeline and we have already started improving our methods to achieve that in the future. However, this event ultimately proves that our security mechanisms work.”

To reward Pwning.eth for their role in preventing a potential cyberattack on its EVM machine, Aurora has rewarded the white-hat hacker with a total of 6 million US dollars. This is not the first time Immunefi has helped ethical hackers earn various rewards via bug bounties. The platform noted that white hat hackers and security researchers on its platform have received a total of $40 million in bug bounties thus far.

Source: Immunefi Immunefi
Tags: BlockchainETHEthereumNEAR Protocol
Share32Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

WatchDog’s new multi-stage cryptojacking attack unsurfaced

by Christi Rogalski
June 11, 2022
0
WatchDog Targets Docker Containers

Cado Security’s honeypot has recently captured a rather interesting cryptojacker from what they believe to be the WatchDog hacking group. They note that although the attack’s life cycle...

Read more

BitCloak Bitcoin mixer – truly anonymize your Bitcoins!

by Paul Anderson
May 29, 2016
0
BitCloak Bitcoin mixer – truly anonymize your Bitcoins!

BitCloak is a Bitcoin anonymizer online located in the darknet, accessed via Tor. The onion URL: bitcloak43blmhmn.onion The only way to access it, is to obviously be on TOR...

Read more

PayPal to Start Accepting Bitcoin as payment

by Paul Anderson
September 10, 2014
0
PayPal to Start Accepting Bitcoin as payment

Ebay PayPal will begin taking bitcoins, opening up the world’s second-biggest Internet payment network to virtual currency deals. “We're announcing PayPal’s first foray into bitcoin,” Bill Ready, the chief of...

Read more

Bitcoin Apps Soon To Run On Tor Anonymity Network

by Paul Anderson
March 8, 2014
0
Bitcoin Apps Soon To Run On Tor Anonymity Network

Bitcoin and Tor have grown to be possibly the two most favored programs for maintaining privacy on the net.  Developers are not looking to mend the two together...

Read more

Harvard supercomputer taken over to mine Dogecoin

by Paul Anderson
February 21, 2014 - Updated on May 17, 2022
0
Harvard supercomputer taken over to mine Dogecoin

The Harvard Crimson reports that an unnamed individual was discovered utilizing Harvard's Odyssey supercomputing cluster mine dogecoins. Dogecoin is one of the thousands of cryptocurrencies that have been popping up...

Read more
Next Post
BlackCat Ransomware aka “ALPHV” infections on the rise

BlackCat Ransomware aka "ALPHV" infections on the rise

Related News

BlueSky Ransomware backdoors KMSAuto activator

BlueSky Ransomware Infects KMSAuto Activator users

July 20, 2022 - Updated on July 22, 2022
BlackCat Ransomware aka “ALPHV” infections on the rise

BlackCat Ransomware aka “ALPHV” infections on the rise

June 16, 2022 - Updated on July 20, 2022
GIFs in messaging apps are tracking you

GIFs in messaging apps are tracking you

July 19, 2022
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.