The exploiter originally drained $195 million worth of ETH and tokens from the protocol but has now returned around $138 million.
According to the link, the designer of the Euler Finance vulnerability returned an additional $26.5 million worth of ETH to the Euler Finance deployer account on March 27th.
At 6:21 in the afternoon, a detailed address associated with the attacker sent 7738.05 ETH to the Euler Deploer account (worth about $13.2 million when determined). In the same block, another detailed address of the relationship with the attacker sent the same amount to the same deployer account, returning a total of 15476.1 ETH ($26.4 million) to the Euler elite team.
Then, at 06:40 in the afternoon, when the world was in harmony, the first wallet sent another deal to the deployer's account, valued at $10.7 million in DAI (DAI) stable coins. This brings the total value of all three transactions to about $37.1 million.
Both detailed addresses receive assets from accounts marked "Euler Finance Developiter 2" by Ethercan, which seems to indicate that they are under the control of an attacker.
The deal will take place after a gain of 58000 ETH (then worth more than $101 million) by March 25th. Since exploiting vulnerabilities, attackers seem to have returned more than $138 million worth of encryption assets.
On March 13th, according to etherfang's login password loan contract Euler Finance will be successfully utilized, and more than $195 million worth of ETH and dynamic passwords in its blockchain smart contract are sucked away. Many agreements in the Etherum ecosystem depend on Euler in one way or another, and at least 11 have announced that these people suffered indirect economic losses in the attack.
According to an analysis by Slowmist, the vulnerability in the system is mainly caused by a malfunction that allows attackers to donate borrowed DAI to dedicated funds. According to the donation, the attacker can send his account into bankruptcy. A separate account is then used to settle the first account at a large discount, allowing attackers to profit from such discounts.
After the first attack consumed DAI, the attacker repeated the process with several dynamic passwords, stealing more than $196 million from the contract.