Cointime

Download App
iOS & Android

$10 Million Crypto Heist Baffles Security Experts as Seasoned Users Targeted

Cointime Official

April 19 (Cointime) - A cyber heist of $10 million, targeting adept cryptocurrency users, leaves leading security specialists perplexed.

Taylor Monahan, the ex-CEO and founder of Ethereum wallet management platform MyCrypto, disclosed via Twitter on Tuesday that more than 5,000 ETH had been purloined since December.

"Over the past 48 hours, I've been unraveling an extensive wallet-draining operation," stated Monahan, who became a part of MetaMask following MyCrypto's acquisition by ConsenSys, the parent company of the crypto wallet, last year. She further tweeted that the victims were individuals with greater-than-average crypto proficiency and "reasonably secure" measures, yet their funds were still depleted.

In other words, the victims are not inexperienced crypto users falling for blatant phishing scams. Instead, the attack is highly advanced, targeting seasoned crypto individuals who are experiencing significant losses, Monahan explained. “No one knows how.”

Read full thread:

If you are reading this, you're the type to be drained by this.

This is NOT a low-brow phishing site or a random scammer. It has NOT rekt a single noob. It ONLY rekts OGs.

If you have all your stuff under a single Secret Recovery Phrase / Private Key, please be safe migrate.

Afaik, no one has determined the source of their compromise.

Multiple devices have been forensic'd. Nothing.

The only known commonalities are:

- Keys were created btwn 2014-2022

- Folks are those who are more crypto native than most (e.g. multiple addresses, work in space, etc)

I'm tired af but I'll lay out some details of the attacker below.

Really the ONLY thing you need to read is this: PLEASE DON'T KEEP ALL YOUR ASSETS IN A SINGLE KEY OR SECRET PHRASE FOR YEARS. THE END. Split up your assets. Get a hw wallet. Migrate. Now.

My best guess rn is that someone has got themselves a fatty cache of data from 1+ yr ago & is methodically draining the keys as they parse them from the treasure trove.

But that's just a guess. I *don't* know.

It is NOT cryptographic/entropy related tho, don't waste your time.

The theft and post-theft on-chain movement is VERY distinct. It's incredible. If you've been drained by this attacker you will gasp as you read this. If you don't gasp, this isn't your thief, sorry.

1. Primary theft txns are almost always between 10am–4pm UTC.

2. Secondary thefts and "dust" collecting occurs anytime but usually 4pm-10pm UTC.

Follow-up drains (for assets missed on the initial sweep) usually occur ~4hrs after the initial theft or at ~7am UTC the following day.

Sometimes accounts are re-swept weeks or months later.

3. Except when stealing v large amounts, the attacker will swap your tokens for ETH *inside your wallet* before sending the ETH out. They will use MM

Swaps, Uniswap, or 0x (esp. recently via the 0x labeled as "0x: Exchange Proxy Flash Wallet")

4. The attacker will often miss staked positions, NFTs, or lesser known tokens. Successful rescue missions are COMMON.

Sometimes the attacker will come back to get assets hours, days, months later.

5. For smaller amounts and assets on other EVM-chains, the attacker will often bridge / move from one of your addresses to another, or even from victim 1 -> victim 2 -> victim 3....

Once a sufficient amt of ETH exists in one address, they will move it out.

This means it may look like random ENS-name'd person sent 0.0X ETH for gas and then stole all your funds.

Or that your wallet was drained *to* an ENS-named account.

The random ENS name is NOT your attacker—it's another victim.

DON'T BE LIKE NICK

6. "Out" is always a centralized swapper such as: FixedFloat SimpleSwap SideShift ChangeNOW LetsExchange Unknown swapper @ 0xca60 Other unlabeled swappers nested at Binance Large Dec'22 thefts used RenBridge Final desty is always Bitcoin LTC, XRP, XMR, etc also moves to BTC.

7. ~20-30 drains will consolidate to 4-6 addies on Bitcoin, sit, then over next 0-6++ days go to:

Coinomize

Wasabi

CryptoMixer

BTC movements are more likely to occur earlier in the day (10am-1pm UTC) or as final move after the thefts (10pm UTC or 1am UTC).

8. Except in large sweeps, which are scripted, attacker is sending txns via MM

. Yes, this attacker is draining OG MM users and OG MM employees using MM. Yayyyyy.

(ps: I don't know this bc of some secret MM intel—I know it bc its easily discernible on-chain. Don't even.)

9. Dust remaining in original drained address and/or from other keys under the same seed have been stolen 80+ days after first address was drained.

Known large dust collections from already drained accounts occured on:

Feb 15

Feb 17

Feb 22

Mar 23

Mar 26

Apr 6

10. Recent IPs are a lot of HideMy but a *lot* of IPs & UAs have been seen. VPNs, not VPNs, proxies, unlabeled stuff.

Usually Windows/Chrome but Windows/FF & Mac/Chrome have been seen too. All over the place tbh, its weird af. (MM / Infura DO *NOT* HAVE UAs/IPs. Dont even.)

Lastly, a lot of the thefts seem to take place on the weekend???? I obvs don't have every transaction but it's weird af. I don't know. It's just weird. Dec 18 = Sunday Dec 25 = Sunday Jan 29 = Sunday Feb 17-19 = Friday-Sunday Apr 15 = Saturday

To be completely clear: this is NOT a MM-specific exploit.

Users of *all* wallets, even those created on a hardware wallet or generated for the Ethereum presale, have been impacted by this.

This source of this exploit is unidentified, and I'm trying to identify it.

Comments

All Comments

Recommended for you

  • BTC breaks through $69,000

     the market shows BTC breaking through $69,000, currently at $69,021.49, with a 24-hour increase of 1.15%. The market is highly volatile, please manage your risk accordingly.

  • Spanish Foreign Minister: Not worried about any consequences of refusing US access to military bases

     on March 3 local time, Spanish Foreign Minister Alvarez defended the Spanish government's refusal to provide the Rota and Moron military bases to the United States for participation in attacks on Iran. Alvarez stated that the operation initiated by the United States and Israel is not supported by the United Nations and is not part of the bilateral agreements allowing the use of the aforementioned Spanish sovereign military bases. Alvarez also said that the Spanish government is not concerned that this stance will have any consequences. Alvarez stated: "The position of the Spanish government represents the will of the vast majority of the Spanish people as well as the vast majority of people worldwide, which is to defend the UN Charter, respect international law, and believe that cooperation is always more powerful than confrontation."

  • Spot gold plunges nearly $100 in the short term.

     spot gold plunged nearly 100 dollars in a short time, spot gold fell below 5170 dollars/ounce, with a daily decline of 2.94%. 

  • BTC falls below $67,000

    the market shows BTC fell below $67,000, currently at $66,996.93, with a 24-hour increase of 1.18%. The market is highly volatile, please manage your risk accordingly.

  • ETH breaks $2,000

    the market shows ETH breaking through $2000, currently at $2001.64, with a 24-hour increase of 2.89%. The market is highly volatile, please manage your risks accordingly.

  • The US spot Bitcoin ETF saw a net inflow of $962.48 million yesterday.

    according to Trader T's monitoring, the US spot Bitcoin ETF had a net inflow of 962.48 million USD yesterday.

  • BTC falls below $66,000

     the market shows BTC fell below 66,000 USD, currently at 65,986.66 USD, with a 24-hour decline of 1.31%. The market is highly volatile, please manage your risks accordingly.

  • BTC falls below $66,000

     the market shows BTC fell below $66,000, currently at $65,973.16, a 24-hour drop of 2.66%. The market is highly volatile, please manage your risks accordingly.

  • ETH breaks $2,000

    market shows ETH breaking through $2000, currently at $2000.29, with a 24-hour increase of 3.73%. The market is volatile, please manage your risk accordingly.

  • The United States uses Anthropic's artificial intelligence technology in its airstrikes in the Middle East.

     United States used Anthropic's artificial intelligence technology in airstrikes in the Middle East, and just hours before the attack, Trump had just issued a ban against Anthropic.