Background

Verus Bridge Attacker Returns $8.5M in ETH, Keeps Bounty

Yuki Matsuda
Article arrow_drop_down
verus bridge attacker returns 8 5 million eth keeps bounty thumbnail

The attacker behind the Verus bridge exploit has returned $8.5 million in ETH to the protocol, opting to keep a bounty offered by the Verus team in exchange for the funds’ safe return.

How the Verus bridge recovery unfolded

The return of funds was confirmed through on-chain activity tied to the attacker’s Ethereum wallet. The $8.5 million in ETH was sent back to Verus-controlled addresses, resolving the bulk of the exploited funds.

Prior to the return, Verus had offered a 1,350 ETH bounty to the exploiter as incentive to return the stolen assets. The attacker accepted the deal, keeping the bounty as compensation while sending the remainder back to the protocol.

Why the attacker kept a bounty

In DeFi exploit recoveries, protocols sometimes offer “white hat” bounties to attackers. The arrangement treats the exploit as an unauthorized security audit, with the bounty serving as a reward for exposing the vulnerability and returning funds rather than disappearing with them.

In this case, the Verus team’s offer of 1,350 ETH created a financial incentive for the attacker to cooperate. The attacker retained that amount while returning the larger share of exploited funds, a negotiated outcome that allowed Verus to recover the majority of user assets.

This type of resolution has become increasingly common across DeFi. As major crypto platforms expand into new financial products and trading services mature, bridge security remains one of the sector’s most persistent weak points.

What this means for Verus and bridge security

The recovery marks a positive outcome for Verus users, though it raises questions about the protocol’s bridge architecture. Cross-chain bridges remain high-value targets because they custody large pools of locked assets, making any smart contract vulnerability potentially catastrophic.

The fact that the attacker chose to cooperate rather than attempt to launder the funds through mixers suggests that on-chain traceability and the growing difficulty of cashing out large sums of stolen crypto played a role in the decision. Projects like Solmate raising capital for treasury operations underscore how the broader ecosystem continues to build infrastructure around asset security and management.

Verus has not yet published a full post-mortem on the exploit’s root cause. Users and developers should monitor the project’s official channels for details on what vulnerability was exploited and what steps the team is taking to prevent a recurrence.

Disclaimer: This article is for informational purposes only and does not constitute financial or investment advice. Cryptocurrency and digital asset markets carry significant risk. Always do your own research before making decisions.

About the author

About the author

Yuki Matsuda

Yuki Matsuda is a Web3 journalist and Altcoin analyst who focuses on the intersection of cryptocurrency market and blockchain technology. Based in Tokyo, he has spent years researching how cryptocurrency and decentralized technologies are reshaping digital ownership. He holds ETH above Coinlineup's disclosure threshold of $5,000. His work explores emerging trends such as PERP exchange ecosystems, AI-based platforms, and blockchain governance in digital communities. Yuki aims to help readers understand how these innovations impact developers and investors in the rapidly evolving Web3 landscape.

More posts

Related

Index