Share this article

GMX Exploiter Return $40M Days After Hack, Token Zooms Higher

Attackers earlier this week exploited a re-entrancy flaw in the OrderBook contract, allowing the attacker to manipulate short positions on BTC, inflate GLP’s valuation, and redeem it for outsized profits.

Updated Jul 11, 2025, 4:46 p.m. Published Jul 11, 2025, 10:41 a.m.
Hacker working on two laptops (Azamat E/Unsplash)

What to know:

  • The attacker who stole over $40 million from GMX's V1 contracts has begun returning the funds, indicating acceptance of a $5 million white-hat bounty.
  • Over $10.5 million in FRAX was first returned to GMX's deployer wallet, with the remaining funds sent shortly afterward.
  • The breach exploited a re-entrancy flaw in GMX's OrderBook contract, prompting GMX to halt V1 trading and minting on Arbitrum and Avalanche.

The attacker who drained over $40 million from GMX’s V1 contracts earlier this week has started returning funds, suggesting they’ve accepted the project’s $5 million white-hat bounty.

The first signs came Friday via an on-chain message: “ok, funds will be returned later.”

Hours later, over $10.5 million in FRAX was sent back to GMX’s deployer wallet. Security firm PeckShield flagged the returns, which appear to be just the start, with more funds expected to follow.

GMX is now trading at $13.15 having risen by 13% over the past 24 hours.

Later on, over $40 million in various tokens were returned to the GMX Security Committee MultiSig address, Lookonchain noted.

The breach, one of the largest DeFi exploits of the year, targeted GMX’s GLP pool on Arbitrum. It exploited a re-entrancy flaw in the OrderBook contract, allowing the attacker to manipulate short positions on BTC, inflate GLP’s valuation, and redeem it for outsized profits across USDC, WBTC, WETH, and FRAX.

Reentrancy is a common bug that allows exploiters to trick a smart contract by repeatedly calling a protocol to steal assets. A call authorizes the smart contract address to interact with a user’s wallet address.

GMX responded by halting V1 trading and minting across both Arbitrum and Avalanche. A bug bounty worth more than 10% of the stolen funds was offered, with a promise of no legal pursuit if the full amount was returned within 48 hours (which the hacker seems to have adhered to as of European morning hours Friday).

More For You

(XRP/CoinDesk)

Wrapped XRP on Solana lets XRP holders access Jupiter, Phantom, and Meteora without selling the asset, the latest step in Hex Trust's multi-chain wXRP rollout first announced in December.

What to know:

  • Wrapped XRP (wXRP) has launched on Solana via custodian Hex Trust and cross-chain protocol LayerZero, making XRP usable in Solana’s DeFi ecosystem for the first time.
  • Each wXRP is backed 1:1 by native XRP held in segregated custody accounts and can be redeemed at any time, allowing holders to deploy...