<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=Inverse_Finance_First_Price_Oracle_Exploit</id>
	<title>Inverse Finance First Price Oracle Exploit - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=Inverse_Finance_First_Price_Oracle_Exploit"/>
	<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Inverse_Finance_First_Price_Oracle_Exploit&amp;action=history"/>
	<updated>2026-04-21T13:15:04Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.39.1</generator>
	<entry>
		<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Inverse_Finance_First_Price_Oracle_Exploit&amp;diff=4962&amp;oldid=prev</id>
		<title>Azoundria: Another 30 minutes complete. All sources merged in. Prevention added. Information relocated around.</title>
		<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Inverse_Finance_First_Price_Oracle_Exploit&amp;diff=4962&amp;oldid=prev"/>
		<updated>2023-09-01T18:50:01Z</updated>

		<summary type="html">&lt;p&gt;Another 30 minutes complete. All sources merged in. Prevention added. Information relocated around.&lt;/p&gt;
&lt;a href=&quot;https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Inverse_Finance_First_Price_Oracle_Exploit&amp;amp;diff=4962&amp;amp;oldid=4956&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>Azoundria</name></author>
	</entry>
	<entry>
		<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Inverse_Finance_First_Price_Oracle_Exploit&amp;diff=4956&amp;oldid=prev</id>
		<title>Azoundria: Created page with &quot;{{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/inversefinancefirstpriceoracleexploit.php}} {{Unattributed Sources}}  Inverse Finance Inverse Finance, a decentralized organization, experienced a hack through price manipulation of its INV/ETH price oracle on Sushiswap. The attacker manipulated the oracle, leading to a rise in the price of INV tokens, allowing them to borrow $15.6 million worth of DOLA, ETH, WBTC,...&quot;</title>
		<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Inverse_Finance_First_Price_Oracle_Exploit&amp;diff=4956&amp;oldid=prev"/>
		<updated>2023-09-01T16:04:03Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/inversefinancefirstpriceoracleexploit.php}} {{Unattributed Sources}}  &lt;a href=&quot;/cryptocurrencyhackscamfraudwiki/index.php?title=File:Inversefinance.jpg&quot; title=&quot;File:Inversefinance.jpg&quot;&gt;thumb|Inverse Finance&lt;/a&gt; Inverse Finance, a decentralized organization, experienced a hack through price manipulation of its INV/ETH price oracle on Sushiswap. The attacker manipulated the oracle, leading to a rise in the price of INV tokens, allowing them to borrow $15.6 million worth of DOLA, ETH, WBTC,...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/inversefinancefirstpriceoracleexploit.php}}&lt;br /&gt;
{{Unattributed Sources}}&lt;br /&gt;
&lt;br /&gt;
[[File:Inversefinance.jpg|thumb|Inverse Finance]]&lt;br /&gt;
Inverse Finance, a decentralized organization, experienced a hack through price manipulation of its INV/ETH price oracle on Sushiswap. The attacker manipulated the oracle, leading to a rise in the price of INV tokens, allowing them to borrow $15.6 million worth of DOLA, ETH, WBTC, and YFI. Inverse Finance paused future borrows on its money market, Anchor. This incident follows a similar exploit in April that resulted in a $15.6 million loss for the protocol. The organization plans to propose a repayment plan to its governance and is encouraging the attacker to return the funds in exchange for a bounty.&lt;br /&gt;
&lt;br /&gt;
This is a global/international case not involving a specific country.&amp;lt;ref name=&amp;quot;vauld-11609&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;inversefinancetwitter-11615&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;inversefinance-11613&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;inversefinancedocs-11614&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About Inverse Finance ==&lt;br /&gt;
&amp;quot;DOLA Borrowing Rights replace interest rates with a fixed fee that can earn you more.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Inverse Finance is a decentralized autonomous organization that develops and manages the FiRM fixed rate lending protocol and DOLA, a debt-backed decentralized stablecoin. Originally founded by Nour Haridy in late 2020, the protocol is now governed by Inverse Finance DAO, a collective of crypto enthusiasts. Our code base is open source and maintained by the community.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;This was not the first time Inverse Finance suffered a multi-million dollar exploit this year. Earlier this April, the protocol fell prey to its first price manipulation hack and lost $15.6 million in DOLA, ETH, WBTC, and YFI.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;the lending protocol took to Twitter, explaining the attack and noted that the attacker used “capital-intensive manipulation of the INV/ETH price oracle on Sushiswap.” This further resulted in “a sharp rise in the price of INV, which subsequently enabled the attacker to borrow $15.6 million”. However, unlike the latest tweet from the protocol, last time they had offered “a generous bounty in exchange for returning the borrowed funds”.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;This morning Inverse Finance's money market, Anchor, was subject to a capital-intensive manipulation of the INV/ETH price oracle on Sushiswap, resulting in a sharp rise in the price of INV which subsequently enabled the attacker to borrow $15.6 million in DOLA, ETH, WBTC, &amp;amp; YFI&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The manipulation was not a flash loan attack and was un-related to Inverse's smart contract or front end code. All future borrows on Anchor are temporarily paused.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The plan to be proposed to governance is to ensure all wallets impacted by the price manipulation are repaid 100%. We have multiple avenues for accomplishing this and will provide updates as the DAO discusses our options.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The person or persons behind the price manipulation are encouraged to reach out via Twitter DM or Discord and discuss a generous bounty in exchange for returning the borrowed funds.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This is a global/international case not involving a specific country.&lt;br /&gt;
&lt;br /&gt;
The background of the exchange platform, service, or individuals involved, as it would have been seen or understood at the time of the events.&lt;br /&gt;
&lt;br /&gt;
Include:&lt;br /&gt;
&lt;br /&gt;
* Known history of when and how the service was started.&lt;br /&gt;
* What problems does the company or service claim to solve?&lt;br /&gt;
* What marketing materials were used by the firm or business?&lt;br /&gt;
* Audits performed, and excerpts that may have been included.&lt;br /&gt;
* Business registration documents shown (fake or legitimate).&lt;br /&gt;
* How were people recruited to participate?&lt;br /&gt;
* Public warnings and announcements prior to the event.&lt;br /&gt;
&lt;br /&gt;
Don't Include:&lt;br /&gt;
* Any wording which directly states or implies that the business is/was illegitimate, or that a vulnerability existed.&lt;br /&gt;
* Anything that wasn't reasonably knowable at the time of the event.&lt;br /&gt;
There could be more than one section here. If the same platform is involved with multiple incidents, then it can be linked to a main article page.&lt;br /&gt;
&lt;br /&gt;
== The Reality ==&lt;br /&gt;
This sections is included if a case involved deception or information that was unknown at the time. Examples include:&lt;br /&gt;
&lt;br /&gt;
* When the service was actually started (if different than the &amp;quot;official story&amp;quot;).&lt;br /&gt;
* Who actually ran a service and their own personal history.&lt;br /&gt;
* How the service was structured behind the scenes. (For example, there was no &amp;quot;trading bot&amp;quot;.)&lt;br /&gt;
* Details of what audits reported and how vulnerabilities were missed during auditing.&lt;br /&gt;
&lt;br /&gt;
== What Happened ==&lt;br /&gt;
The specific events of the loss and how it came about. What actually happened to cause the loss and some of the events leading up to it.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+Key Event Timeline - Inverse Finance First Price Oracle Exploit&lt;br /&gt;
!Date&lt;br /&gt;
!Event&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|April 2nd, 2022 9:44:00 AM MDT&lt;br /&gt;
|Inverse Finance Tweet&lt;br /&gt;
|Inverse Finance posts about the incident on Twitter.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
This section includes specific detailed technical analysis of any security breaches which happened. What specific software vulnerabilities contributed to the problem and how were they exploited?&lt;br /&gt;
&lt;br /&gt;
== Total Amount Lost ==&lt;br /&gt;
The total amount lost has been estimated at $15,500,000 USD.&lt;br /&gt;
&lt;br /&gt;
How much was lost and how was it calculated? If there are conflicting reports, which are accurate and where does the discrepancy lie?&lt;br /&gt;
&lt;br /&gt;
== Immediate Reactions ==&lt;br /&gt;
How did the various parties involved (firm, platform, management, and/or affected individual(s)) deal with the events? Were services shut down? Were announcements made? Were groups formed?&lt;br /&gt;
&lt;br /&gt;
== Ultimate Outcome ==&lt;br /&gt;
What was the end result? Was any investigation done? Were any individuals prosecuted? Was there a lawsuit? Was any tracing done?&lt;br /&gt;
&lt;br /&gt;
== Total Amount Recovered ==&lt;br /&gt;
The total amount recovered is unknown.&lt;br /&gt;
&lt;br /&gt;
What funds were recovered? What funds were reimbursed for those affected users?&lt;br /&gt;
&lt;br /&gt;
== Ongoing Developments ==&lt;br /&gt;
What parts of this case are still remaining to be concluded?&lt;br /&gt;
== Individual Prevention Policies ==&lt;br /&gt;
{{Prevention:Individuals:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Individuals:End}}&lt;br /&gt;
&lt;br /&gt;
== Platform Prevention Policies ==&lt;br /&gt;
{{Prevention:Platforms:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Platforms:End}}&lt;br /&gt;
&lt;br /&gt;
== Regulatory Prevention Policies ==&lt;br /&gt;
{{Prevention:Regulators:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Regulators:End}}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references&amp;gt;&amp;lt;ref name=&amp;quot;vauld-11609&amp;quot;&amp;gt;[https://www.vauld.com/insights/defi-hack-inverse-finance-exploited-for-the-second-time-this-year/ DeFi Hack: Inverse Finance Exploited For The Second Time This Year   - Vauld Insights] (Aug 25, 2023)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;inversefinancetwitter-11615&amp;quot;&amp;gt;[https://twitter.com/InverseFinance/status/1510282040809299972 @InverseFinance Twitter] (Aug 25, 2023)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;inversefinance-11613&amp;quot;&amp;gt;[https://www.inverse.finance/ Inverse Finance] (Aug 25, 2023)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;inversefinancedocs-11614&amp;quot;&amp;gt;[https://docs.inverse.finance/inverse-finance/inverse-finance/introduction Introduction - Inverse Finance] (Aug 25, 2023)&amp;lt;/ref&amp;gt;&amp;lt;/references&amp;gt;&lt;/div&gt;</summary>
		<author><name>Azoundria</name></author>
	</entry>
</feed>