Cointime

Download App
iOS & Android

$10 Million Crypto Heist Baffles Security Experts as Seasoned Users Targeted

Cointime Official

April 19 (Cointime) - A cyber heist of $10 million, targeting adept cryptocurrency users, leaves leading security specialists perplexed.

Taylor Monahan, the ex-CEO and founder of Ethereum wallet management platform MyCrypto, disclosed via Twitter on Tuesday that more than 5,000 ETH had been purloined since December.

"Over the past 48 hours, I've been unraveling an extensive wallet-draining operation," stated Monahan, who became a part of MetaMask following MyCrypto's acquisition by ConsenSys, the parent company of the crypto wallet, last year. She further tweeted that the victims were individuals with greater-than-average crypto proficiency and "reasonably secure" measures, yet their funds were still depleted.

In other words, the victims are not inexperienced crypto users falling for blatant phishing scams. Instead, the attack is highly advanced, targeting seasoned crypto individuals who are experiencing significant losses, Monahan explained. “No one knows how.”

Read full thread:

If you are reading this, you're the type to be drained by this.

This is NOT a low-brow phishing site or a random scammer. It has NOT rekt a single noob. It ONLY rekts OGs.

If you have all your stuff under a single Secret Recovery Phrase / Private Key, please be safe migrate.

Afaik, no one has determined the source of their compromise.

Multiple devices have been forensic'd. Nothing.

The only known commonalities are:

- Keys were created btwn 2014-2022

- Folks are those who are more crypto native than most (e.g. multiple addresses, work in space, etc)

I'm tired af but I'll lay out some details of the attacker below.

Really the ONLY thing you need to read is this: PLEASE DON'T KEEP ALL YOUR ASSETS IN A SINGLE KEY OR SECRET PHRASE FOR YEARS. THE END. Split up your assets. Get a hw wallet. Migrate. Now.

My best guess rn is that someone has got themselves a fatty cache of data from 1+ yr ago & is methodically draining the keys as they parse them from the treasure trove.

But that's just a guess. I *don't* know.

It is NOT cryptographic/entropy related tho, don't waste your time.

The theft and post-theft on-chain movement is VERY distinct. It's incredible. If you've been drained by this attacker you will gasp as you read this. If you don't gasp, this isn't your thief, sorry.

1. Primary theft txns are almost always between 10am–4pm UTC.

2. Secondary thefts and "dust" collecting occurs anytime but usually 4pm-10pm UTC.

Follow-up drains (for assets missed on the initial sweep) usually occur ~4hrs after the initial theft or at ~7am UTC the following day.

Sometimes accounts are re-swept weeks or months later.

3. Except when stealing v large amounts, the attacker will swap your tokens for ETH *inside your wallet* before sending the ETH out. They will use MM

Swaps, Uniswap, or 0x (esp. recently via the 0x labeled as "0x: Exchange Proxy Flash Wallet")

4. The attacker will often miss staked positions, NFTs, or lesser known tokens. Successful rescue missions are COMMON.

Sometimes the attacker will come back to get assets hours, days, months later.

5. For smaller amounts and assets on other EVM-chains, the attacker will often bridge / move from one of your addresses to another, or even from victim 1 -> victim 2 -> victim 3....

Once a sufficient amt of ETH exists in one address, they will move it out.

This means it may look like random ENS-name'd person sent 0.0X ETH for gas and then stole all your funds.

Or that your wallet was drained *to* an ENS-named account.

The random ENS name is NOT your attacker—it's another victim.

DON'T BE LIKE NICK

6. "Out" is always a centralized swapper such as: FixedFloat SimpleSwap SideShift ChangeNOW LetsExchange Unknown swapper @ 0xca60 Other unlabeled swappers nested at Binance Large Dec'22 thefts used RenBridge Final desty is always Bitcoin LTC, XRP, XMR, etc also moves to BTC.

7. ~20-30 drains will consolidate to 4-6 addies on Bitcoin, sit, then over next 0-6++ days go to:

Coinomize

Wasabi

CryptoMixer

BTC movements are more likely to occur earlier in the day (10am-1pm UTC) or as final move after the thefts (10pm UTC or 1am UTC).

8. Except in large sweeps, which are scripted, attacker is sending txns via MM

. Yes, this attacker is draining OG MM users and OG MM employees using MM. Yayyyyy.

(ps: I don't know this bc of some secret MM intel—I know it bc its easily discernible on-chain. Don't even.)

9. Dust remaining in original drained address and/or from other keys under the same seed have been stolen 80+ days after first address was drained.

Known large dust collections from already drained accounts occured on:

Feb 15

Feb 17

Feb 22

Mar 23

Mar 26

Apr 6

10. Recent IPs are a lot of HideMy but a *lot* of IPs & UAs have been seen. VPNs, not VPNs, proxies, unlabeled stuff.

Usually Windows/Chrome but Windows/FF & Mac/Chrome have been seen too. All over the place tbh, its weird af. (MM / Infura DO *NOT* HAVE UAs/IPs. Dont even.)

Lastly, a lot of the thefts seem to take place on the weekend???? I obvs don't have every transaction but it's weird af. I don't know. It's just weird. Dec 18 = Sunday Dec 25 = Sunday Jan 29 = Sunday Feb 17-19 = Friday-Sunday Apr 15 = Saturday

To be completely clear: this is NOT a MM-specific exploit.

Users of *all* wallets, even those created on a hardware wallet or generated for the Ethereum presale, have been impacted by this.

This source of this exploit is unidentified, and I'm trying to identify it.

Comments

All Comments

Recommended for you

  • Bank of Japan to Maintain Interest Rates in April

    On April 21, according to Nikkei News: The Bank of Japan will maintain interest rates unchanged in April.

  • Iranian Military: Ready to Respond Decisively to 'Enemy's Breach of Promises'

    On April 21, local time, Abdollahi, commander of the Khatam al-Anbiya Central Command of the Iranian Armed Forces, stated that Iran is prepared to respond decisively to the 'enemy's breach of promises.' Abdollahi emphasized that the current Iranian military possesses 'authority, readiness, and comprehensive strategic capabilities.' He noted that the Islamic Revolutionary Guard Corps and other defense forces have demonstrated combat capabilities in relevant operations, putting 'Israel and the United States in a difficult and fatigued position,' forcing them to 'seek a ceasefire.' Abdollahi also stressed that the Iranian armed forces maintain a high level of unity with the government and the people under the supreme leader's unified command, and will respond 'decisively, resolutely, and promptly' to any threats and actions. (CCTV News)

  • Another Iranian Oil Tanker Returns to Iran After Breaking US Blockade

    On April 21, according to CCTV News, maritime intelligence company 'TankerTrackers' reported that a tanker belonging to the National Iranian Tanker Company returned to Iran after unloading approximately 2 million barrels of crude oil in Indonesia, crossing the relevant maritime blockade line. The tanker is currently en route to Iran's main oil export hub, Khark Island, and is expected to arrive on April 22 local time. It is reported that the tanker set sail from Iran in late March, heading towards the Riau Islands of Indonesia.

  • White House: US and Iran on the Verge of Reaching an Agreement

    On April 21, White House Press Secretary Kayleigh McEnany stated in an interview with Fox News on the evening of the 20th that the United States and Iran are on the "verge of reaching an agreement." McEnany remarked, "The US has never been closer to achieving a truly good deal." However, she did not disclose any information regarding the current status of the negotiations. McEnany noted that even if an agreement is not reached, President Trump has multiple options and is not afraid to utilize these measures. Previous actions have demonstrated that Trump is not just "bluffing."

  • Kelp DAO Attacker Transfers 30,800 ETH to Special Address

    On April 21, news emerged that, according to monitoring by PeckShield, the Kelp DAO attacker transferred 30,800 ETH to a special address starting with 0x00000, possibly indicating a destruction action.

  • Trump: 'Midnight Hammer' Completely Dismantled Iran's Nuclear Dust Base

    On April 21, U.S. President Trump stated that the 'Midnight Hammer' operation has completely destroyed the 'nuclear dust' base within Iran. As a result, the cleanup will be a long and arduous process. The fake news media, including CNN and other corrupt media networks and platforms, have failed to give our great pilots the credit they deserve, instead always attempting to belittle and undermine them. They are losers!!! (Dongxin News Agency)

  • BTC Drops Below $76,000

    Market data shows that BTC has dropped below $76,000, currently priced at $75,999.63, with a 24-hour increase of 1.68%. The market is experiencing significant volatility, so please ensure proper risk management.

  • Japan Officially Allows Export of Lethal Weapons Through Cabinet Resolution

    On April 21, according to Kyodo News, the Japanese government officially revised the 'Three Principles on Transfer of Defense Equipment' and its operational guidelines during a cabinet meeting, which will, in principle, allow the export of lethal weapons. (Xinhua News Agency)

  • Trump Claims Iran Will Negotiate

    On April 21, during a phone interview with CNN, U.S. President Trump stated that Iran "will negotiate" and expressed confidence in potential talks set to take place in Pakistan. Trump remarked, "They will negotiate; if they don't, they will face unprecedented problems." He also expressed hope that both sides could reach a "fair agreement" and emphasized that Iran "will not have nuclear weapons." Additionally, he defended military actions against Iran by stating there was "no choice" and claimed that they would ultimately "wrap things up."

  • Amazon to Invest Additional $5 Billion in Anthropic

    On April 21, Amazon announced on Monday that it will invest an additional $5 billion in the artificial intelligence company Anthropic, bringing the total investment to as much as $20 billion. Anthropic develops the Claude chatbot and programming tools, and plans to invest over $100 billion in Amazon's cloud technology and chips over the next decade.