CAT Protocol sent a letter to the protocol attackers on the X platform, saying it has gathered significant leads about the attempted attack and is working with security companies and law enforcement agencies such as SlowMist to track down and hold those responsible accountable. If the attacker's intention is to expose the vulnerability, encourage responsible and ethical engagement and contact via email, CAT Protocol is willing to reward such disclosure within the scope of the policy.
According to MistTrack, the DEXX event attackers are currently exchanging assets and bridging to Ethereum, as of now: There is still a balance of $620,000 in the 0xFFB9 address, which is distributed across the Ethereum and BNB chains and the Base chain. DEXX hackers have transferred 6212.4 ETH to Tornado Cash.
According to Scam Sniffer, most Solana wallet attackers actively use third-party domains to bypass the wallet blacklist. (For example, register an expired DAPP domain, now exploiting XSS vulnerabilities). If you see a DAPP pop-up with a second window (or redirect) asking to connect in another window, double check that it is secure.
ZachXBT, a detective on the chain, wrote on the X platform: "Radiant attackers have been long ETH on Hyperliquid through multiple addresses and have made about $600,000 so far."
Slow Mist founder Cosine Yu X confirmed in a post that DEXX attackers are collecting scattered stolen funds on Solana and splitting them from the collection address. Some of them are starting to use Wormhole cross-chain services to cross assets to addresses starting with Ethereum 0xffe224e.
The founder of Slow Mist, Cosine Yu X, wrote that in the early morning of this morning, various value tokens on the Solana address related to the DEXX attacker were exchanged for SOL. At present, these SOL have not been transferred out. In addition, the attacker's EVM (ETH/BSC/BASE) addresses have begun to experience abnormal tests, and there has been no large-scale abnormal.
SlowMist Cosine revealed on the X platform that the DEXX attacker started testing the token exchange ETH operation of the EVM chain half an hour ago.
SlowMist has released a list of DEXX attacker addresses, and 8,612 addresses have been identified on the Solana blockchain. The data comes from DEXX officials and reports from thousands of victims. As for the EVM chain, it is still cleaning and compiling statistics and is expected to be ready in the coming days.
Slow Mist founder Cosine X issued a statement saying that the attacker used the XSS vulnerability of the Cointelegraph website to trick the target user to open the Cointelegraph official website (with XSS malicious script), so: - malicious script loading execution; - The address bar is set to https://cointelegraph [.] com/not-public/drafts/article-1033 at first glance, I thought it was an official unpublished draft; - Sign in with X box; - After clicking Sign in with X, open X's third-party app ...
The founder of Slow Mist, Cosine Yu X, wrote that at around 4 a.m. this morning, various value tokens on the Solana address related to the DEXX attacker were exchanged for SOL. At present, these SOL have not been transferred out. In addition, the attacker's EVM address has not been changed for the time being.
Pump Science said on social media that the attackers are issuing more tokens from our compromised wallet. These tokens were not created by our team and the wallet has been compromised. Once again, none of these tokens were issued by our team and are fraudulent. Do not trust PSCIENCE's information page.
According to CertiK, the Polterfinance attackers split 11.5 million FTM (about $8 million) of stolen funds into Arbitrum and Ethereum in batches, and then began depositing funds into Tornado.Cash. So far, 220 ETH ($689,000) has been deposited into Ethereum from addresses starting with 0x141C.
According to PeckShield monitoring, polterfinance attackers have transferred 120 ETH to Tornado Cash. Previously, polterfinance was hacked and lost about $8.70 million worth of cryptocurrency.
According to CertiK, the CoinStats attackers have just resumed their money laundering activities after months of inactivity. On November 9, approximately 2.6 million dai were transferred to four new addresses, and a day later another approximately 2.6 million dai were deposited into MakersDai contracts. Nonetheless, half of the 3,027 ETH (about $10 million) transferred to 0x7397 did not move, as 2.6 million Dai on 0x7b00 and 762 ETH on 0x7d38.
SUNRAY_DEX private keys were compromised; the attackers took ownership of the SUN and ARC tokens, minted a large number of them, and then dumped them to exhaust the dex pair. So far, the attackers have stolen 2.855 million dollars,