The attacker behind the Verus bridge exploit has returned $8.5 million in ETH to the protocol, opting to keep a bounty offered by the Verus team in exchange for the funds’ safe return.
The return of funds was confirmed through on-chain activity tied to the attacker’s Ethereum wallet. The $8.5 million in ETH was sent back to Verus-controlled addresses, resolving the bulk of the exploited funds.
Prior to the return, Verus had offered a 1,350 ETH bounty to the exploiter as incentive to return the stolen assets. The attacker accepted the deal, keeping the bounty as compensation while sending the remainder back to the protocol.
In DeFi exploit recoveries, protocols sometimes offer “white hat” bounties to attackers. The arrangement treats the exploit as an unauthorized security audit, with the bounty serving as a reward for exposing the vulnerability and returning funds rather than disappearing with them.
In this case, the Verus team’s offer of 1,350 ETH created a financial incentive for the attacker to cooperate. The attacker retained that amount while returning the larger share of exploited funds, a negotiated outcome that allowed Verus to recover the majority of user assets.
This type of resolution has become increasingly common across DeFi. As major crypto platforms expand into new financial products and trading services mature, bridge security remains one of the sector’s most persistent weak points.
The recovery marks a positive outcome for Verus users, though it raises questions about the protocol’s bridge architecture. Cross-chain bridges remain high-value targets because they custody large pools of locked assets, making any smart contract vulnerability potentially catastrophic.
The fact that the attacker chose to cooperate rather than attempt to launder the funds through mixers suggests that on-chain traceability and the growing difficulty of cashing out large sums of stolen crypto played a role in the decision. Projects like Solmate raising capital for treasury operations underscore how the broader ecosystem continues to build infrastructure around asset security and management.
Verus has not yet published a full post-mortem on the exploit’s root cause. Users and developers should monitor the project’s official channels for details on what vulnerability was exploited and what steps the team is taking to prevent a recurrence.
Disclaimer: This article is for informational purposes only and does not constitute financial or investment advice. Cryptocurrency and digital asset markets carry significant risk. Always do your own research before making decisions.


