• Bitcoin
  • Ethereum
  • Blockchain
  • DeFi
  • Policies
  • Expert Interview
  • For Beginners
  • All Posts
Hot News

KiloEX Exchange Exploiter Returns $5.5 Million Days Following $7.5 Million Hack

04/18/2025

Crypto Rug Pulls Have Decreased in Frequency, Yet Their Impact Has Intensified: DappRadar

04/18/2025

Manta Founder Describes Attempted Zoom Hack by Lazarus Involving Authentic ‘Legit Faces’

04/18/2025
Facebook X (Twitter) Instagram
X (Twitter) Telegram
CoinomiCoinomi
  • Bitcoin
  • Ethereum
  • Blockchain
  • DeFi
  • Policies
  • Expert Interview
  • For Beginners
  • All Posts
CoinomiCoinomi
Home » Match Systems uncovers ‘digital evidence’ revealing the identity of WBTC address poisoner
Match Systems uncovers 'digital evidence' revealing the identity of WBTC address poisoner
Match Systems uncovers 'digital evidence' revealing the identity of WBTC address poisoner
Blockchain

Match Systems uncovers ‘digital evidence’ revealing the identity of WBTC address poisoner

05/28/20243 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

The individual responsible for the address poisoning attack that drained $68 million worth of Wrapped Bitcoin (WBTC) was identified through digital evidence, including a device fingerprint, as stated by Match Systems CEO Andrey Kutin on May 23. Kutin claims that this evidence played a crucial role in negotiating the return of the stolen funds.

According to Kutin, the attacker did not use regulated exchanges that comply with Know Your Customer and Anti-Money Laundering regulations, making it difficult to definitively prove their identity. However, investigators discovered secondary evidence suggesting that the attacker had acted negligently and obtained the stolen funds due to lack of due diligence. This evidence strengthened their position during negotiations.

The address poisoning attack, which occurred on May 5, targeted an Ethereum account starting with “0x1e.” The attacker created a fake transaction that made it appear as though the victim had willingly transferred their tokens to the attacker’s address in the past. This led the victim to believe that the attacker’s address was safe, resulting in the transfer of $68 million worth of WBTC and a 97% loss.

However, on May 10, the attacker returned almost all of the stolen funds, leading to a near-full recovery. Match Systems claimed that this turnaround was the result of negotiations facilitated by their team, with assistance from the Cryptex cryptocurrency exchange.

In a conversation with Cointelegraph on May 23, Kutin revealed additional details about how they convinced the attacker to return the funds. The Match Systems team became aware of the attack on the day it occurred through social media accounts discussing the transfer. They decided to post a message on the Ethereum network, urging the hacker to refund the stolen funds. A third party contacted the researchers in response to this message, acting as a liaison between the victim and the team. Cryptex also joined in to help with the negotiations.

Since the attacker did not use regulated exchanges or attempt to cash out the stolen funds, it was challenging to determine their identity. However, the team traced some of the attacker’s transactions to IP addresses in Hong Kong, providing a starting point for further investigation. Match Systems was able to connect these IP addresses to other pieces of digital evidence, including a device fingerprint, which helped identify the attacker.

According to Kutin, digital evidence is crucial in catching cybercriminals today, as they rarely cash out through regulated exchanges. Instead, they use special laundering services that facilitate the exchange of crypto for cash. Match Systems focuses on finding a thin thread of digital evidence, such as IP addresses and device fingerprints, to identify scammers.

While the evidence in this case was considered secondary or circumstantial, it proved that the attacker had not conducted due diligence in determining the source of the funds. The team used this evidence during negotiations with the attacker, who eventually returned all of the funds without facing prosecution.

Address poisoning attacks are a common issue for blockchain users, and experts recommend inspecting the sending address in every transaction to avoid falling victim to such attacks.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

KiloEX Exchange Exploiter Returns $5.5 Million Days Following $7.5 Million Hack

04/18/2025

The Collapse of Mantra OM Token Reveals Significant Liquidity Challenges in the Cryptocurrency Market

04/17/2025

Ethena Labs and Securitize Reveal Roadmap for the ‘Converge’ Network

04/17/2025

XRP: Reasons for Its Outperformance Compared to Altcoins and Future Outlook

04/17/2025
Add A Comment

Leave A Reply Cancel Reply

Top Posts

KiloEX Exchange Exploiter Returns $5.5 Million Days Following $7.5 Million Hack

04/18/2025

Crypto Rug Pulls Have Decreased in Frequency, Yet Their Impact Has Intensified: DappRadar

04/18/2025

Manta Founder Describes Attempted Zoom Hack by Lazarus Involving Authentic ‘Legit Faces’

04/18/2025

Coinomi - Where insights meet innovation. Discover the world of blockchain and cryptocurrency with a focus on insightful narratives and groundbreaking trends.

X (Twitter) Telegram
Hot Insights

KiloEX Exchange Exploiter Returns $5.5 Million Days Following $7.5 Million Hack

04/18/2025

Crypto Rug Pulls Have Decreased in Frequency, Yet Their Impact Has Intensified: DappRadar

04/18/2025

Manta Founder Describes Attempted Zoom Hack by Lazarus Involving Authentic ‘Legit Faces’

04/18/2025
X (Twitter) Telegram
  • Home
  • News
  • Bitcoin
  • Ethereum
  • Blockchain
  • DeFi
  • Policies
  • Expert Interview
  • For Beginners
Copyright © 2025 Coinomi. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.