Home CryptocurrencyBitcoin Crypto bug bounty platform Immunefi raises $24 million led by Framework Ventures

Crypto bug bounty platform Immunefi raises $24 million led by Framework Ventures

by SuperiorInvest

Web3 bug bounty and security services platform Immunefi has closed a $24 million Series A funding round, setting the company on a path to expanding its internal capacity amid widespread vulnerabilities in the blockchain industry.

The funding rounds were led by San Francisco-based venture firm Framework Ventures, with additional participation from Electric Capital, Polygon Ventures, Samsung Next, P2P Capital and others. Immunefi said the capital will be used to hire staff as it adapts to growing demand for blockchain security and bug bounty services.

Immunefi claims to have paid out $60 million in total rewards since it was founded less than two years ago. The platform now supports over 300 projects across the crypto ecosystem, including Chainlink (LINK), MakerDAO and Compound (comp). Motivate white hat hackersImmunefi offers bounties and rewards for exposing security vulnerabilities of leading blockchain protocols.

As reported by Cointelegraph, Immunefi has raised $5.5 million in funding last October to further strengthen its security capabilities. At the time, the company paid out $7.5 million in bonuses.

Related: The impact of the Wintermute hack could have been worse than 3AC, Voyager and Celsius – here’s why

The decentralized finance, or DeFi, sector has been particularly prone to security vulnerabilities. Only in 2021 scams and exploits targeting DeFi protocols cost the industry over $10.2 billion, according to Immunefi research. DeFi remains a a major attack vector for fraudsters in 2022, as evidenced by the recent Leveraging $160M Crypto Market Maker Wintermute.

One of the biggest DeFi exploits happened in April of this year when the Ronin bridge was Axie Infinity hacked for over $600 million.Axis she launched her Ronin Bridge again three months later.

Source Link

Related Posts

%d bloggers like this: