The post Shytoshi Kusama Addresses $2.4 Million Shibarium Bridge Exploit appeared on BitcoinEthereumNews.com. The lead developer of Shiba Inu, Shytoshi Kusama, has publicly addressed the Shibarium bridge exploit that occurred recently, draining $2.4 million from the network. After days of speculation about his involvement in managing the crisis, the project leader broke his silence. Kusama emphasized that a special “war room” has been set up to restore stolen finances and enhance network security. The statement is his first official words since the bridge compromise occurred. “Although I am focusing on AI initiatives to benefit all our tokens, I remain with the developers and leadership in the war room,” Kusama posted on social media platform X. He dismissed claims that he had distanced himself from the project as “utterly preposterous.” The developer said that the reason behind his silence at first was strategic. Before he could make any statements publicly, he must have taken time to evaluate what he termed a complex and deep situation properly. Kusama also vowed to provide further updates in the official Shiba Inu channels as the team comes up with long-term solutions. As highlighted in our previous article, targeted Shibarium’s bridge infrastructure through a sophisticated attack vector. Hackers gained unauthorized access to validator signing keys, compromising the network’s security framework. The hackers executed a flash loan to acquire 4.6 million BONE ShibaSwap tokens. The validator power on the network was majority held by them after this purchase. They were able to transfer assets out of Shibarium with this control. The response of Shibarium developers was timely to limit the breach. They instantly halted all validator functions in order to avoid additional exploitation. The team proceeded to deposit the assets under staking in a multisig hardware wallet that is secure. External security companies were involved in the investigation effort. Hexens, Seal 911, and PeckShield are collaborating with internal developers to… The post Shytoshi Kusama Addresses $2.4 Million Shibarium Bridge Exploit appeared on BitcoinEthereumNews.com. The lead developer of Shiba Inu, Shytoshi Kusama, has publicly addressed the Shibarium bridge exploit that occurred recently, draining $2.4 million from the network. After days of speculation about his involvement in managing the crisis, the project leader broke his silence. Kusama emphasized that a special “war room” has been set up to restore stolen finances and enhance network security. The statement is his first official words since the bridge compromise occurred. “Although I am focusing on AI initiatives to benefit all our tokens, I remain with the developers and leadership in the war room,” Kusama posted on social media platform X. He dismissed claims that he had distanced himself from the project as “utterly preposterous.” The developer said that the reason behind his silence at first was strategic. Before he could make any statements publicly, he must have taken time to evaluate what he termed a complex and deep situation properly. Kusama also vowed to provide further updates in the official Shiba Inu channels as the team comes up with long-term solutions. As highlighted in our previous article, targeted Shibarium’s bridge infrastructure through a sophisticated attack vector. Hackers gained unauthorized access to validator signing keys, compromising the network’s security framework. The hackers executed a flash loan to acquire 4.6 million BONE ShibaSwap tokens. The validator power on the network was majority held by them after this purchase. They were able to transfer assets out of Shibarium with this control. The response of Shibarium developers was timely to limit the breach. They instantly halted all validator functions in order to avoid additional exploitation. The team proceeded to deposit the assets under staking in a multisig hardware wallet that is secure. External security companies were involved in the investigation effort. Hexens, Seal 911, and PeckShield are collaborating with internal developers to…

Shytoshi Kusama Addresses $2.4 Million Shibarium Bridge Exploit

2025/09/18 03:46

The lead developer of Shiba Inu, Shytoshi Kusama, has publicly addressed the Shibarium bridge exploit that occurred recently, draining $2.4 million from the network. After days of speculation about his involvement in managing the crisis, the project leader broke his silence.

Kusama emphasized that a special “war room” has been set up to restore stolen finances and enhance network security. The statement is his first official words since the bridge compromise occurred.

“Although I am focusing on AI initiatives to benefit all our tokens, I remain with the developers and leadership in the war room,” Kusama posted on social media platform X. He dismissed claims that he had distanced himself from the project as “utterly preposterous.”

The developer said that the reason behind his silence at first was strategic. Before he could make any statements publicly, he must have taken time to evaluate what he termed a complex and deep situation properly. Kusama also vowed to provide further updates in the official Shiba Inu channels as the team comes up with long-term solutions.

As highlighted in our previous article, targeted Shibarium’s bridge infrastructure through a sophisticated attack vector. Hackers gained unauthorized access to validator signing keys, compromising the network’s security framework.

The hackers executed a flash loan to acquire 4.6 million BONE ShibaSwap tokens. The validator power on the network was majority held by them after this purchase. They were able to transfer assets out of Shibarium with this control.

The response of Shibarium developers was timely to limit the breach. They instantly halted all validator functions in order to avoid additional exploitation. The team proceeded to deposit the assets under staking in a multisig hardware wallet that is secure.

External security companies were involved in the investigation effort. Hexens, Seal 911, and PeckShield are collaborating with internal developers to examine the attack and discover vulnerabilities.

The project’s key concerns are network stability and the protection of user funds, as underlined by the lead developer, Dhairya. The team is working around the clock to restore normal operations.

In an effort to recover the funds, Shiba Inu has offered a bounty worth 5 Ether ($23,000) to the hackers. The bounty offer includes a 30-day deadline with decreasing rewards after seven days.

Market Impact and Recovery Incentives

The exploit caused serious volatility in the marketplace of Shiba Inu ecosystem tokens. SHIB dropped about 6% after the news of the attack. However, The token has bounced back and is currently trading at around $0.00001298 at the time of writing.

SHIB Price Source CoinMarketCap

Source: https://coinpaper.com/11075/shiba-inu-leader-breaks-silence-on-2-4-m-shibarium-exploit-confirms-active-recovery

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Jury left sleepless, crying and confused as mistrial declared in ‘MEV bros’ case

Jury left sleepless, crying and confused as mistrial declared in ‘MEV bros’ case

A high-stakes crypto fraud trial ended in collapse on Friday when a weary and divided jury forced a judge to declare a mistrial in the case of two brothers accused of stealing $25 million from traders on Ethereum.The case against Anton and James Peraire-Bueno is the first criminal prosecution to centre on maximal extractable value, or MEV — the process by which traders profit from how transactions are ordered on Ethereum. But unlike ordinary MEV strategies that profit from public transaction ordering, prosecutors say the brothers went deeper and exploited Ethereum’s validator layer itself. The Department of Justice described the brothers’ strategy as “the very first exploit of its kind” that targeted “the very integrity of the Ethereum blockchain.”They “allegedly used their specialized skills and education to tamper with and manipulate the protocols relied upon by millions of Ethereum users,” said the indictment. The brothers are charged with wire fraud and money-laundering.But the trial’s technical complexity and uncertainty over how existing fraud laws apply to blockchains left the jury in a deadlock.According to a courtroom thread from Inner City Press, the jury, after three days of deliberation, sent a note to Judge Clarke saying they were “not making any progress.”“We have another note. We have debated with each member being open. We held another vote. We are no closer to a unanimous decision. We are under stress. Yesterday some cried. Many have not slept. This is hardship,” Judge Clarke was quoted as reading by Inner City Press.Prosecutors suggested resuming deliberations on Monday or replacing a departing juror, but Judge Clarke rejected both options. “There is nothing in this note indicating they could progress,” he said. “This is their 11th note, no progress. I am going to declare a mistrial.”A mistrial means the jury couldn’t reach a verdict, so the case ended without a decision — prosecutors must now choose whether to retry the brothers, negotiate a plea, or drop the charges.During the trial, tensions appear to have spiked when prosecutors suggested instructing the jury that the defendants could be found guilty “even if they did not know” their actions were illegal. The defence called the proposal “outrageous” and insisted the law required proof that the brothers acted “knowingly, willfully, and with intent” — called “mens rea” in law.“Mens rea is required - finding other mens rea is not enough. The jury has to find all of the elements: knowingly, willfully and with intent,” the defence was quoted as saying.Judge Clarke sided partly with the prosecution, telling jurors that “wrongful means a bad purpose” and that “there is no requirement that the defendant knew that their actions were illegal.”In an op-ed for DL News last week, Carl E. Volz, a self-described ‘crypto-skeptic’ lawyer and a partner at law firm gunnercooke in New York, called the case “a hangover from the Biden-era hyper-skepticism about crypto.”“Looking back, I believe this case was born of a combination of ignorance and fear,” Volz said.What is the MEV brothers trial about?In typical MEV, automated bots compete to profit from public transactions waiting to be confirmed in the mempool, Ethereum’s queue of pending trades. These bots often use “sandwich” tactics, buying just before a large trade and selling immediately after to capture small price movements.But prosecutors say the alleged exploit went far beyond these regular MEV strategies.Prosecutors allege that the brothers operated multiple Ethereum validators — responsible for ordering and confirming transactions — and used that privileged position to manipulate how a block was built. According to the indictment, when one of their validators was chosen to propose a block, the brothers gained access to pending private transactions, then tampered with the block to alter certain trades and divert about $25 million in cryptocurrency into their own accounts.The defence, backed by Washington-based crypto think-tank Coin Center, argues the brothers acted within Ethereum’s internal logic.Jailing someone for winning in the MEV game “wildly recalibrates the incentives for non-standard block validation,” according to Coin Center.“The genius of open blockchain systems lies in their ability to translate honesty into mathematics and sanction into code. When external authorities substitute that precision with ex-post expectations about fairness or intent, they do not reinforce the system—they destabilise it,” the think tank said.
Share
Coinstats2025/11/09 08:14