Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 15, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 15, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 15, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 15, 2025

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025

      NVIDIA’s drivers are causing big problems for DOOM: The Dark Ages, but some fixes are available

      May 15, 2025

      Capcom breaks all-time profit records with 10% income growth after Monster Hunter Wilds sold over 10 million copies in a month

      May 15, 2025

      Microsoft plans to lay off 3% of its workforce, reportedly targeting management cuts as it changes to fit a “dynamic marketplace”

      May 15, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      A cross-platform Markdown note-taking application

      May 15, 2025
      Recent

      A cross-platform Markdown note-taking application

      May 15, 2025

      AI Assistant Demo & Tips for Enterprise Projects

      May 15, 2025

      Celebrating Global Accessibility Awareness Day (GAAD)

      May 15, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025
      Recent

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025

      NVIDIA’s drivers are causing big problems for DOOM: The Dark Ages, but some fixes are available

      May 15, 2025

      Capcom breaks all-time profit records with 10% income growth after Monster Hunter Wilds sold over 10 million copies in a month

      May 15, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Clipper DEX Hit by Cyberattack: Exploit Targets Withdrawal Functionality

    Clipper DEX Hit by Cyberattack: Exploit Targets Withdrawal Functionality

    December 2, 2024

    Clipper cyberattack

    Clipper, a decentralized exchange (DEX), became the target of a cyberattack that led to a loss of approximately $450,000 from its protocol. While initially, rumors circulated that the Clipper cyberattack was caused by a private key leak, Clipper has since clarified that the breach was due to a vulnerability in its withdrawal functionality, not a private key leak.  

    The Clipper cyberattack, which occurred on December 1, 2024, exploited a weakness in Clipper’s withdrawal process on the Optimism and Base pools, accounting for around 6% of the exchange’s total value locked (TVL). The decentralized exchange clarified that the attacker attempted to target other chains, but these efforts were unsuccessful. Importantly, the exploit has now been contained, with the ongoing investigation aiming to track the stolen funds and possibly recover them.  

    Decoding the Clipper Cyberattack  

    Clipper immediately took action to address the data breach, pausing all swaps and deposits across its platform. However, withdrawals remained functional, although with restrictions. To prevent further exploitation of the vulnerability, Clipper disabled the ability to withdraw single assets, requiring users to withdraw a mix of all assets in the pool.  

    The decentralized exchange responded swiftly to the incident, reassuring the community that no other pools or chains were affected. In a statement, Clipper confirmed, “There have been third-party claims suggesting a private key leak; however, we can confirm that this is not the case and is inconsistent with the design and security architecture of Clipper.”  

    Clipper Cyberattack 
    Clipper DEX shares details into the Incident (Source: Clipper DEX on X)

    The statement emphasized that Clipper’s architecture remains secure. The root cause of the cyberattack was a vulnerability in the withdrawal feature, specifically a bundled swap-and-withdraw function. This allowed attackers to exploit the system and withdraw more funds than they had initially deposited.

    The Clipper cyberattack involved the attacker using the API to sign transactions that allowed them to manipulate the system, gaining more tokens than initially put in. One of the transactions can be traced back to a suspicious call on the Clipper Exchange’s pool deposit and withdrawal functions, which ultimately facilitated the exploit.

    Clipper’s Response and Ongoing Investigation  

    Following the cyberattack on Clipper DEX, the platform assured users that it was conducting a thorough investigation to understand the full extent of the exploit. Clipper also began efforts to trace the stolen funds in an attempt to recover them. While the investigation is ongoing, the exchange remains committed to transparency, pledging to provide updates to the community as more information becomes available.  

    The platform’s security measures were further outlined, noting that trading and deposits were halted across all chains to prevent further damage. However, Clipper emphasized that no current funds were at risk, and the vulnerability did not impact funds held by users in pools, as all funds were still secure in the system.  

    Clipper concluded its statement with a call to action: “If you are the exploiter and are willing to speak, please reach out directly.” This statement appears to be a last-ditch effort to communicate with the attacker, hoping for a peaceful resolution. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous Article8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play
    Next Article INTERPOL Arrests 5,500 in Global Cybercrime Crackdown, Seizes Over $400 Million

    Related Posts

    Development

    February 2025 Baseline monthly digest

    May 15, 2025
    Artificial Intelligence

    Markus Buehler receives 2025 Washington Award

    May 15, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    One of the best desktop speakers I’ve tested is not made by Logitech or Pioneer

    Development

    Crafting Responsible Immersive Experiences

    Development

    Cohere AI Introduces INCLUDE: A Comprehensive Multilingual Language Understanding Benchmark

    Development

    50 Best Websites for Web Design Inspiration and Ideas

    Development
    Hostinger

    Highlights

    Development

    Nixtla Releases StatsForecast 1.7.5: Elevating Time Series Forecasting with MFLES and Scikit-Learn Integration

    June 4, 2024

    Nixtla unveiled StatsForecast 1.7.5, a significant update bringing new features and enhancements that further solidify…

    CVE-2025-46687 – QuickJS Heap Buffer Overflow

    April 27, 2025

    CVE-2025-1565 – WordPress Mayosis Core Plugin Arbitrary File Read Vulnerability

    April 25, 2025

    Implementing Knowledge Bases for Amazon Bedrock in support of GDPR (right to be forgotten) requests

    May 31, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.