FixedFloat DEX Hit by Second Hack, Loses $2.8M in Ethereum Heist

The decentralized exchange platform FixedFloat has experienced yet another blow to its reputation and operations as it falls victim to another security breach. In what appears to be a sophisticated cyberattack, the platform has reportedly lost approximately $2.8 million. This sum was siphoned off from its hot wallet, which operated on the Ethereum chain. The hack was executed with precision using a smart contract dubbed eXch, aimed specifically at token swapping. Cryptocurrencies including Ether (ETH), USDC, DAI, USDT, and Wrapped ETH (wETH) were compromised in the breach. FixedFloat, notable for its stance on privacy due to not enforcing Know-Your-Customer (KYC) requirements, has yet to respond formally to the matter. Concurrently, its official website remains inaccessible, citing ‘technical work.’

Details of the Heist

In the murky waters of the cryptocurrency sector, the FixedFloat platform has yet again been targeted by cybercriminals. The theft involved a wide array of cryptocurrencies, implicating the robustness of the platform’s security infrastructure. An eXch smart contract, meticulously designed for the swapping of tokens, served as the fulcrum for this financial heist. It wasn’t long before the community realized that FixedFloat’s hot wallet had been compromised, leading to a substantial drainage of its assets. The platform’s lack of communication has stirred discontent and speculation. As the webpage remains down, anxiety among users looms over the assurance of their investments.

Series of DEX Hacks

The series of hacks targeting decentralized exchange platforms has caused increasing concern within the crypto community. Recently, FixedFloat suffered a significant breach, which saw over $26.1 million stolen. This unsettling pattern has seen other exchanges like KyberSwap and dYdX incur losses of $47 million and $9 million, respectively. These cyberattacks starkly highlight the vulnerabilities in the security frameworks that protect these blockchain environments. There’s a pressing call for enhanced security measures to be implemented as the frequency and scale of these hacks pose critical challenges to the credibility and reliability of decentralized financial systems. The overall safety of these platforms is now under intense scrutiny, emphasizing the need for a comprehensive reassessment and strengthening of their cybersecurity strategies.

Recovery and Resilience

The ongoing menace of cyber threats is countered by a narrative of resilience, as evidenced by successful efforts to recover lost funds. In a report by Chainalysis from March, it was disclosed that over 50% of funds stolen in cyberattacks had been recuperated. A striking example is the Munchable incident, where hackers returned a staggering $97 million without demanding any ransom. Such instances reflect a significant capability for defense within the sector against financial cybercrimes. The industry’s commitment to enhancing security measures and combating cyber threats underscores an unwavering dedication to preserving the sanctity of decentralized financial ecosystems. This combination of recovery triumphs and proactive defenses offers a glimpse of hope and fortitude against digital malfeasance.

Explore more

The Future of CX Is Simplicity and Trust, Not Tech

With decades of experience helping organizations navigate change through technology, HRTech expert Ling-Yi Tsai has a unique perspective on the evolving landscape of customer experience. Her work in HR analytics and technology integration provides a crucial lens for understanding how internal systems impact external customer satisfaction. Today, she joins us to discuss the critical shifts in consumer behavior and technology

Nissan Vendor Breach Exposes 21,000 Customer Records

The intricate web of third-party partnerships that underpins modern corporate operations has once again highlighted a critical vulnerability, this time affecting a regional dealership of the global automaker Nissan Motor Corporation. A security incident originating not from Nissan’s own systems but from a compromised server managed by a contractor, Red Hat, resulted in the exposure of personal information belonging to

New GPT-5.2-Codex Is a Leap in Agentic Coding and Security

The long-held image of a software developer meticulously crafting lines of code in isolation is rapidly being redrawn by the introduction of a new kind of collaborator, one that does not just suggest syntax but can independently manage entire, complex engineering projects from conception to deployment. This evolution marks a significant turn in software development, where artificial intelligence is transitioning

Candidate Rejected After Five Rounds for Asking About Salary

A six-week journey through a company’s labyrinthine interview process concluded not with a job offer, but with a stark rejection notice triggered by a single, fundamental question: “What is the salary range?” This incident, detailed in a now-viral social media post, has become a flashpoint in the ongoing conversation about hiring practices, exposing a deep disconnect between what companies expect

Researchers Debut World’s Smallest Programmable Robots

Today we’re speaking with Dominic Jainy, an IT professional whose work at the intersection of AI, machine learning, and now, micro-robotics, is pushing the boundaries of what we thought was possible. His team’s latest creation, a swarm of programmable robots smaller than a grain of salt, is poised to revolutionize fields from medicine to manufacturing. We’ll be exploring the incredible