Investigations by ZachXBT


Kanal geosi va tili: Butun dunyo, Inglizcha


Reports, news, & insights shared by ZachXBT
Donation address
EVM
0x9D727911B54C455B0071A7B682FcF4Bc444B5596
SOL
investigations.sol

Связанные каналы  |  Похожие каналы

Kanal geosi va tili
Butun dunyo, Inglizcha
Statistika
Postlar filtri


Multisig exploiter just transferred 9980 ETH ($31.4M) to the crypto exchange eXch, swapping from Ethereum to Bitcoin in 7 orders.

Source address
0x2d146Aa23645950FDefBb23f636A5d1674FE1047

Destination address
bc1qffvx38hplm6ym5el5yakxmntezv7tg6yurghnq
bc1qut035lpe0k6yklcrkaquhvg4x65lkg5n3uvnel
bc1qe6yk9rnae0l96775gu99zvjdy496j3rrfc5sm0
bc1q4cwvw5x89pjaquq5e25ghjgffevmz6rtz043tx
bc1qpj24paw8hunju2z6fharwej82rfjywexsz629a
bc1qrzzdx82jv4t4tlkfc0gsqjpjp2r9r6ptq7rtuf
bc1qyht95cksxh2un0elgdaq0up874s99kj80ev97d


On-chain clown of the day: The threat actor who hacked Andy Ayrey sold PNUT early for $6.4K and missed out on $31.6M.

Wallet address
Gx3uCAS7su6HjVASf74KkPgsU23DP5sg8LmqiHStXmmT


Do not expect my help with ecosystems where people do not actively support my work (Arbitrum, Cosmos, zkSync, Aptos, Sui, Scroll, etc).

I currently only assist people on the chains which make my work possible: Solana, Ethereum, Bitcoin, OP/Stark.

There is already many scams as is so I would rather focus my time on helping the ecosystems which give back and fund public goods (I receive 1K+ inbounds / month).

This is just a general reminder for all of those people who think they are entitled to my time for free.


Do not buy the Wiz Khalifa Pump Fun it's the same hacker who compromised Andy Ayrey (Truth Terminal creator) the other day.


Looks like the crypto casino Metawin was exploited for $4M+ on Ethereum and Solana earlier today.

See 115+ theft addresses tied to the exploiter here.

So far stolen funds have been transferred to Kucoin and a HitBTC nested service.


I did some initial tracing for the Andy Ayrey (Truth Terminal creator) hack this week which lead to $1.5M+ stolen from deploying multiple bundled meme coins and found one of the people involved in the incident appears to be a FWOG whale.

Theft consolidation address
0xcd27994d2a460e3f7bdee75974188040d7fe723e
6haUPtErdx5g88G6Rv4itwB37XzqvRjaCuJnn4J85Pro
Apc3eA9ScQksuZvfURQswZwVkusEYRaqeKEv4eXXbRZm
CAwocNV1VaEmXoi2XPnfcYZSxnJ3fBTiWNgtPtF3nriH

Holder address
AtdSsizerZZMVuStX4Ji5kAY1bPnNi9LdymfQ4DWuLcr


The crypto exchange M2 was hacked for ~$13M from hot wallets on multiple chains yesterday.

Theft addresses
ETH: 0x968b6984cba14444f23ee51be90652408155e142
BTC: bc1qu4kh7wa38xpkrp8frgxl4sak88wx0jug8n3vfj
SOL: EKko14NvgqdvNttUb8JjXkVGuUs6BTikjfN3hqW4LQoL


Update: The threat actor just transferred $19.2M back to the compromised US government address in the last 30 minutes.

This amount does not include the funds already transferred to instant exchanges (Switchain, HitBTC, N Exchange).


Looks like $20M of seized funds tied to the US Government was likely stolen in the past hour.

Theft address
0x3486ee700ccaf3e2f9c5ec9730a2e916a4740a9f
0xbf6f7c503e858aded4e18ce2bcf93846fd726c15
0x15d0a31ed5050ed8decd3c101aaee0b2ad2e6441


Update: Looks like Transak corrected the blog after my post to say the breach also included ID documents (passport, driver license, etc) and user selfies unlike what they previously said.


Looks like the crypto payments provider Transak was recently breached by a ransomware group who claims responsibility.

Transak in a blog post earlier today stated it is limited to names and basic identity info for a small portion of users while the ransomware group alleges it also includes PII and is a larger set of users.

According to Transak's website it has been integrated by Metamask, Trust Wallet, Coinbase, Ledger, etc for fiat to crypto on/off ramps


It also looks like Masa never disclosed their hack to the community for six figures on September 20, 2024.

Here are the theft addresses below and a screenshot of outflows from the Masa deployer
0x4c16506f257a3782dee8d245f9504439c21314f8
0x6483c58f4fd3c07ddad4c9b9b2756dc963d5dc0b


Tapioca DAO hack is likely the result of a team member downloading malware as the theft is tied on-chain to other recent hacks such as Nexera, Concentric, Masa, SpaceCatch, Reach, Serenity Shield, MurAll, etc I have previously covered which were the result of fake job scams (contagious interview)

Stolen funds from this incident were bridged from Arbitrum to BSC where ~$4.7M currently sits.
0x69d91e56ca80f2a4d7b808b59053ea5c5505ffe2


Eigenlayer X/Twitter account is currently compromised do not click any links.

55k 6 223 365


55k 9 641 577

Probably will do Solana, Sui, Base, Arbitrum, or Aptos at some point as the exchange attribution on those chains is awful for anyone who frequently checks the chain.


I went and attributed 15 exchange hot wallets on Starknet so they would be publicly tagged on block explorers as I noticed none were previously tagged anywhere (sharing them below).

Which ecosystem should I do next?

Any interested teams send me a message on X/Twitter.

Binance 0x0213c67ed78bc280887234fe5ed5e77272465317978ae86c25a71531d9332a2d
OKX 0x0269ea391a9c99cb6cee43ff589169f547cbc48d7554fdfbbfa7f97f516da700
Bybit 0x076601136372fcdbbd914eea797082f7504f828e122288ad45748b0c8b0c9696
Kraken 0x620102ea610be8518125cf2de850d0c4f5d0c5d81f969cff666fb53b05042d2
Kucoin 0x0566ec9d06c79b1ca32970519715a27f066e76fac8971bbd21b96a50db826d90
HTX 0x03fd14213a96e9d90563ebe1b224f357c6481a755ee6f046c8ce9acd9b8654a7
MEXC 0x069a7818562b608ce8c5d0039e7f6d1c6ee55f36978f633b151858d85c022d2f
Gate 0x00e91830f84747f37692127b20d4e4f9b96482b1007592fee1d7c0136ee60e6d
Bitget 0x0299b9008e2d3fa88de6d06781fc9f32f601b2626cb0efa8e8c19f2b17837ed1
HitBTC 0x04b555a99b585adf082754e5ea36e4202f13efa649e6ac16dfe8c0e217c454bc
CoinEX 0x00fb108ed29e1b5d82bb61a39a15bbab410543818bf7df9be3c0f5dd0d612cf3
ChangeNow 0x062b6edccf9d86aff918634e53f3fac9545a8bcf84bcb59a0a09f9194d18282d
XT 0x0786c463590ca32345e0118a0303a8f66af10882d7315ce282840feb5d6817f9
Bitrue 0x01a103074e6ea2f988b427c77e671207c20d6005d407a685eeee2e1f61028392
Bitmart 0x04de639e634c071c3ce8b1c69fac0500aab5ddb25a08fd0f757176243e4c0467


In the past hour a victim was drained for 12K spWETH ($32.4M)

Theft txn hash
0xf7c00f18175cdea49f8fdad6a1d45edeb318f18f3009f51ab9f4675171c1d8fb

Theft address
0x471c725Bd1F29850CBb8eeA4cdf6c9Ce3caC5607

h/t ScamSniffer


Have seen an uptick in irl robberies targeting crypto traders located in Western Europe over the past few months.

The cases all involve known people in the crypto community where they were held at gunpoint.

As the rest of the cycle continues be extra mindful of who you share your wins with and meet up with irl.



20 ta oxirgi post ko‘rsatilgan.