Community

Contribute by sharing insights and tips to strengthen the community.

All44
search
lkj513
lkj513

May 05, 2025

General Discussion
체인바운티 메인넷?

체인바운티 메인넷 지갑은 어떻게 만드는거죠?톡큰월렛으로 로그인하니 지갑주소가 아비트럼기반 지갑으로 만드러져서 코인전송하니 톡크월렛으로 체인바운티가 입금된던데..메인넷 지갑 만드는 방법이 무엇인가요?

1 likes41 reads
salaryman
salaryman

May 05, 2025

General Discussion
Cannot upload photos for scam report

I only able login via talken wallet, i already try login using browser and connect my wallet there is nothing happen, actualy web3 what this is in built browser was suck as ever

3 likes21 reads
jxsh3907
jxsh3907

May 04, 2025

Community Investigation
체인바운티 사진 삽입 저만 안되나요?

사진 삽입 안돼서 저만 스캠리포트작성 못하고있네요 ㅠ

2 likes40 reads
uki2
uki2

May 04, 2025

General Discussion
skt 해킹 사건에 대해서 정보 공유 좀 해주세요

고수분들의 많은 고견과 토론 부탁 드립니다.

3 likes28 reads
SCAMMER
SCAMMER

May 03, 2025

General Discussion
What is P2P in crypto ?

What is p2p? Peer to peer is decentralized network where participants connect directly with each other, bypassing a central server or intermediaryHow does it work on crypto?Here’s how it works:You and another person agree on the price and payment methodThe platform holds the crypto in escrow (a safe place) until both sides confirm the deal.You can use different payment methods like bank transfer, PayPal, or even cash.It gives you more control over your trades and can be safer if done carefully.Popular platforms for P2P trading are Binance P2P, Paxful, and LocalBitcoins. Just remember to be careful and avoid scams!

What is P2P in crypto ?
2 likes27 reads
tracker
tracker

May 03, 2025

General Discussion
나는 이제 막 블록체인 수사관이 되기로 결심했다

"왜 하필 블록체인 수사관?"요즘 블록체인 기반의 프로젝트나 서비스를 쓰다 보면, 어디선가 스캠(사기), 피싱, 해킹 이야기가 꼭 들려온다. 탈중앙화라는 개념이 주는 자유 뒤에는, 누군가의 자산이 지켜지지 못하고 사라지는 현실이 존재한다.나 역시 처음엔 블록체인을 기술적으로만 흥미롭게 보았다. 하지만 어느 순간 생각이 바뀌었다.“누군가는 이 어두운 숲을 추적해야 하지 않을까?”그렇게 나는 블록체인 스캠 추적자, 일명 Web3 디지털 수사관이 되기로 결심했다.👣 시작은 ‘의심’을 배우는 것부터첫 걸음은 단순하다.누군가의 지갑에서 이상한 출금이 발생했을 때, 그걸 어떻게 추적할 수 있을까?지갑 주소트랜잭션 해시컨트랙트 주소토큰 전송 기록이런 것들을 하나하나 들여다보며 "이게 왜 이상한가?" 를 판단하는 눈을 키워야 한다.결국 수사의 시작은 데이터고, 그 데이터를 바라보는 의심의 시선이다.🔍 오늘의 학습 목표나는 지금부터 작은 목표들을 설정하고, 하나씩 커뮤니티에 공유할 계획이다.✅ 이더스캔(Etherscan)으로 지갑/트랜잭션 분석하는 법✅ 라벨링된 악성 지갑의 움직임 추적✅ 토네이도캐시 같은 믹싱 서비스의 흔적 파악✅ rug pull(먹튀) 프로젝트의 전형적인 패턴 분석✅ 피싱 메시지 유도 트랜잭션 구조 이해이런 것들을 하나씩 파고들며, 나만의 블록체인 수사 매뉴얼을 만들 예정이다.🧠 아직은 모른다, 하지만 계속 해볼 것이다지금 이 글을 읽는 당신도, 나와 같은 길을 고민하고 있다면,지금 이 순간부터 같이 시작해보자.무조건 정답을 아는 전문가가 되는 게 아니라,“이건 뭔가 이상한데?”라고 말할 수 있는 사람이 먼저 되는 것.그게 진짜 시작이다.📌 다음 글 예고"이더스캔은 그냥 블록 보기 툴 아니야?"→ 아니다. 디지털 범죄의 흔적이 고스란히 남아 있는 수사 기록지다.다음 글에서는 실제 스캠 사례를 하나 들고 와서,그 주소를 어떻게 분석하고, 의심의 실마리를 잡는지 써보겠다.#블록체인수사관 #Web3보안 #Etherscan탐정단 #커뮤니티와함께배우기

4 likes22 reads
r2ushly
r2ushly

May 02, 2025

Cybersecurity Tips
how to solved wallet hacked

how to solved wallet hacked?my wallet auto send hacker wallet after receive

0 likes22 reads
Olumi
Olumi

May 02, 2025

Cybersecurity Tips
Cyber security

There is a lot of strategy to look into while we Are make i registration on any plat Form:1. Trust of a platform2. Securing a well of a password in any platform

1 likes19 reads
code2exit
code2exit

March 05, 2025

Community Investigation
Bybit Hack Analysis: Another Major Attack by North Korean Hackers

Bybit Hack Analysis: North Korean Hackers Strike Again in One of the Largest Crypto HeistsIn February 2025, Bybit, one of the world’s leading cryptocurrency exchanges, suffered a major security breach, resulting in the loss of approximately $70 million worth of digital assets. According to cybersecurity firms and blockchain analytics companies, the attack was carried out by a North Korean state-sponsored hacking group, likely Lazarus Group, which has been responsible for several high-profile cryptocurrency heists in recent years.This incident underscores the growing sophistication of cybercriminals targeting the cryptocurrency industry and highlights the urgent need for stronger security measures across exchanges. In this report, we will break down the attack, analyze the techniques used by the hackers, and discuss how exchanges can enhance their security to prevent similar breaches in the future.------------------------------------------------------------------------------------1. Overview of the Bybit Hack and Its ImpactThe Bybit hack occurred in early February 2025, with the attackers managing to steal a substantial amount of digital assets from the platform’s hot wallets.Estimated Loss: Approximately $70 million in various cryptocurrencies.Attack Attribution: Security experts at TRM Labs and Chainalysis have linked the attack to North Korean hacking groups.Response from Bybit: The exchange suspended withdrawals, launched an internal investigation, and implemented emergency security measures.Market Reaction: The incident raised concerns among investors, leading to a temporary decline in crypto market confidence.This breach follows a pattern of state-sponsored cyberattacks targeting cryptocurrency platforms, with stolen funds often used to fund North Korea’s nuclear weapons program.------------------------------------------------------------------------------------2. How Did the Attack Happen? Analysis of Hacker TechniquesAccording to cybersecurity reports, the Bybit hack was executed using a combination of social engineering, smart contract vulnerabilities, and blockchain laundering techniques.(1) Spear Phishing & Insider ManipulationHackers likely used sophisticated phishing campaigns to trick Bybit employees or third-party service providers into revealing sensitive credentials.Fake job offers, malicious email attachments, and compromised cloud storage links may have been used to plant malware on Bybit’s internal systems.Targeting insiders is a common strategy of North Korean hackers, allowing them to bypass multi-layered security systems.(2) Exploiting Hot Wallet VulnerabilitiesMany cryptocurrency exchanges store a portion of user funds in hot wallets to facilitate instant withdrawals. However, these wallets are more vulnerable to cyberattacks.The hackers likely exploited a weakness in Bybit’s wallet security system, gaining unauthorized access to move funds out of the exchange.Smart contract exploits or API vulnerabilities may have also been leveraged to manipulate transactions.(3) Using Blockchain Mixing Services to Launder Stolen FundsOnce the funds were stolen, the attackers immediately split them into thousands of smaller transactions, making them harder to trace.Cryptocurrency mixing services such as Tornado Cash were used to obfuscate the origin of the stolen funds.Security firm Chainalysis reported that portions of the stolen assets were converted into privacy coins like Monero, further complicating law enforcement efforts.This method mirrors previous attacks executed by Lazarus Group, which has stolen over $2 billion worth of cryptocurrency since 2017.------------------------------------------------------------------------------------3. The Growing Threat of North Korean Crypto HacksThe Bybit attack is not an isolated incident. North Korean hackers have been systematically targeting crypto exchanges, DeFi platforms, and bridge networks to fund the country’s economy.Axie Infinity’s Ronin Bridge Hack (2022): $620 million stolen.Horizon Bridge Attack (2022): $100 million stolen.Atomic Wallet Breach (2023): $35 million stolen.Mixin Network Hack (2023): $200 million stolen.According to the United Nations, North Korea has ramped up its cyber operations due to increased international sanctions, using stolen crypto to finance weapons programs, military operations, and illicit trade.The Bybit hack follows the same trend, reinforcing concerns that cryptocurrency platforms remain a prime target for state-sponsored cybercrime.------------------------------------------------------------------------------------4. How Exchanges Can Strengthen Their SecurityIn the wake of the Bybit hack, cybersecurity experts have emphasized the need for more robust security protocols to protect user funds. Here are the key measures exchanges should implement:✅ Multi-Signature Wallets for Secure TransactionsLarge transactions should require multiple approvals from different authorized personnel.This prevents a single compromised account from draining funds.✅ AI-Powered Security MonitoringAI-based anomaly detection systems can flag suspicious withdrawal patterns in real time.Blockchain analytics tools should track fund movements across different addresses to identify potential hacks early.✅ Zero-Trust Security ModelExchanges should limit employee access to sensitive systems and enforce strict authentication policies.Internal audits and penetration testing should be conducted regularly to identify vulnerabilities.✅ Decentralized Cold Wallet StorageA larger percentage of user funds should be kept in cold wallets, disconnected from the internet.Multi-layer authentication should be required for any transfer of funds from cold to hot wallets.✅ Stronger Compliance & Law Enforcement CooperationExchanges should work closely with blockchain security firms and law enforcement to recover stolen assets.Regulatory bodies must introduce stricter KYC and AML (Anti-Money Laundering) measures to prevent illicit transactions.------------------------------------------------------------------------------------5. Conclusion: A Critical Moment for Crypto SecurityThe Bybit hack serves as a harsh reminder of the vulnerabilities present in cryptocurrency exchanges. With state-sponsored cyberattacks becoming more frequent and sophisticated, the industry must prioritize proactive security measures rather than reactive damage control.Bybit is expected to enhance its security infrastructure in response to the breach, but the entire crypto ecosystem must take this attack as a warning. Without stronger defense mechanisms, AI-driven threat detection, and regulatory cooperation, similar incidents will continue to plague the industry.As the crypto space evolves, so too must its security protocols. The Bybit hack is a wake-up call—one that should not be ignored.

Bybit Hack Analysis: Another Major Attack by North Korean Hackers
6 likes111 reads
BountyKing
BountyKing

February 25, 2025

Community Investigation
Bounty King: Bybit Security Breach – $1.4B Stolen Asset Analysis (Ongoing Investigation 2)

Bounty King: Investigation Series follows a team of skilled investigators as they navigate the dark world of cybercrime, uncovering hidden digital trails and solving complex mysteries with the power of AI and blockchain technology. Each case takes them deeper into the realm of online fraud, crypto hacks, and digital heists, where bounties fuel the relentless pursuit of truth. With every investigation, they piece together the puzzle—tracing lost assets and exposing the individuals behind the screens. It’s a journey of persistence, intelligence, and teamwork, where every clue brings them one step closer to justice in an ever-evolving digital landscape.In Ongoing Investigation 1, we identified a money laundering network on the BNB Chain by analyzing a shared wallet (0x33d057af74779925c4b2e720a820387cb89f8f65) linked to both Bybit and Phemex. We also tracked the centralized exchanges where some of the laundered funds started off.In Ongoing Investigation 2, we’ll look deeper into how these connected laundering networks move funds multiple times before making large deposits into CEXs.For on-chain analysis, the key to proving connections is accurate transaction data. The best way to do this is by tracking transactions (tx), as they clearly show how funds move between wallets.Our next step is to expand the investigation based on a key fund aggregator address found in Investigation 1: 0x672ee9a8db4ce9787752f7ca34b85a1d30f69572.Bounty King: Bybit Security Breach – $1.4B Stolen Asset Analysis (Ongoing Investigation 1) https://community.chainbounty.io/posts/0195352f-55de-7791-aae3-9e6008c8bcb9On the BNB Chain, this address collects small amounts of BNB from different wallets and then sends them to specific target addresses. The same pattern appears on the Ethereum mainnet, so we’ll check for any unusual withdrawals from this wallet.We usually start by analyzing withdrawal addresses because the person controlling the wallet actively decides where to send the funds, which gives us clues about their intentions. In contrast, deposit addresses are more passive, making it harder to determine the owner's motives.This address has also been seen sending 0.03 ETH to multiple wallets (Figure 1) on the Ethereum network.Figure 1: Outgoing transaction patterns of the fund aggregator wallet on EthereumIf we look at the types of tokens held by the connected wallets, most of them commonly have stablecoins like DAI and USDT, along with the native coin ETH. Since stablecoins are pegged to a fixed value, they are less volatile.However, two wallets stand out because they hold different types of tokens:0x264e3ca158787b40798d1f006c0fd6558a203ded –This wallet has a history of holding tokens named Arb.0x27d680edfd1094efa01ba003113e5a6c4e202d59 – This wallet has a history of holding tokens named Polygon ecosystem.In on-chain analysis, looking at different pieces of information helps us understand the intent behind transactions. In cases like this, the presence of specific tokens in certain wallets can be an important clue. Automated wallets typically do not hold unique tokens unless they are manually operated, making these cases worth further investigation.For example, 0x264e3ca158787b40798d1f006c0fd6558a203ded received ARB through OKX and later transferred it to Gate.io.(Figure 2)Figure 2: Suspicious token transfers from CEX to CEXTransaction Details:First TransactionFrom: OKX Withdraw Wallet  (0x6cc5f688a315f3dc28a7781717a9a798a59fda7b)To: 0x264e3ca158787b40798d1f006c0fd6558a203dedDate & Time: August 6, 2024, 04:19 AM (UTC)Transaction Hash: 0xe8431526a81a2b9549acbd7ce3f377feb72467052f19ddf36968802eda76c1a3Amount: 9.168 ARBSecond TransactionFrom: 0x0ba9161b32a541bf30ac8db6842b9a6904e2d924To: Gate.io User Wallet (0x0ba9161b32a541bf30ac8db6842b9a6904e2d924)Date & Time: December 28, 2024, 12:57 PM (UTC)Transaction Hash: 0x6603d59dad51ade1feb121df40bfd8026ebc67d7147ff1490e94f33fff93650eAmount 9.168 ARBIn the previous ongoing investigation, only the withdrawal transaction from the exchange was confirmed. However, the deposit transaction has now also been identified. Therefore, it is important to work with law enforcement to verify the user details associated with these transactions.It is also confirmed that 0x27d680edfd1094efa01ba003113e5a6c4e202d59 received Polygon from Gate.io.(Figure 3)From: Gate.io Withdrawal Wallet (0x0d0707963952f2fba59dd06f2b425ace40b492fe)To: 0x27d680edfd1094efa01ba003113e5a6c4e202d59Date & Time: November 17, 2024, 07:48 AM (UTC)Transaction Hash: 0x99e537e4839c5a4285334828507ba4cdba987d2cd02a95d11094765ee31b2946Amount: 107.170 PolFigure 3: Suspicious token transfers from CEX  In this case, after passing through four steps, funds from 0x27d680edfd1094efa01ba003113e5a6c4e202d59 eventually flow into 0x33d057af74779925c4b2e720a820387cb89f8f65, which is an overlapping address(Figure 4) used by both Phemex and Bybit for ETH transactions.Within the cluster, multiple addresses are interconnected, forming links both forward and backward. Therefore, identifying relationships between wallets that follow this pattern is crucial for understanding the overall flow of funds and verifying transactions.Figure 4: Connection to 0x33d057af74779925c4b2e720a820387cb89f8f65By following this cluster flow, we can identify addresses with significant transfer in/out activity.For example, the address 0x24c367c656c9960655936bac8cf8b738a70433dc exhibits such behavior.Looking at the flow of the wallet 0x264e3ca158787b40798d1f006c0fd6558a203ded, which has a history of transferring ARB from OKX to Gate.io, we can see that after four steps, 140 ETH(Figure 5) was transferred in and out of 0x24c367c656c9960655936bac8cf8b738a70433dc.Figure 5: Large Distribution Wallet ObservationThe overlapping addresses above are also used for fund distribution in money laundering schemes. Based on this, we can infer that relay wallets exist within approximately four steps between the aggregator and the distribution phase.Now, let's analyze 0x264e3ca158787b40798d1f006c0fd6558a203ded further to identify additional patterns.Looking at the in/out transaction history of 0x264e3ca158787b40798d1f006c0fd6558a203ded, we can see that the address 0x9ff1b430a699ee6215b315ea8f7892520e14b9cd transferred 140 ETH.(Figure 6) This address shows significant incoming transactions from multiple wallets.A key observation here is that the 140 ETH was bridged via Debridge, which utilizes OKX’s cross-chain DEX. (Figure 6)Figure 6: Distribution Wallet AnalysisBy examining 0x9ff1b430a699ee6215b315ea8f7892520e14b9cd as the source of these funds, we can clearly (Figure 7) see a connection.From 0x9ff1b430a699ee6215b315ea8f7892520e14b9cd, a total of 1,141 ETH was split and distributed across eight different addresses. These funds were then swapped cross-chain through Debridge.In fact, using Debridge for money laundering is a well-known pattern commonly used by groups like Lazarus and other laundering operations.The following visualization illustrates how large-scale fund distributions are processed.Figure 7: Large Distribution Wallet operationLet’s highlight an important point here.Looking at the source of wallet 0x9ff1b430a699ee6215b315ea8f7892520e14b9cd, which distributes funds through eight wallets via Debridge, we can see multiple records of deposits from CEXs (Figure 8). This is crucial to understand because money laundering networks do not rely solely on DEXs; they often move funds through multiple CEXs as well.Therefore, the process involves a combination of swaps, cross-chain transfers, and CEX transactions to obscure the fund trail.By following this report, we can observe how CEXs ultimately serve as the final gateway for money laundering.Figure 8: Illicit Sources from CEXsFor example, laundered funds from Huobi (HTX) are further distributed across multiple wallets before ultimately reaching the pre-Debridge distribution wallets. This process illustrates how funds are layered and moved to obscure their origins.(Figure 9)Figure 9: Complex Source from CEXsBelow is the detailed information on 1,140 ETH being sent to Debridge through nine transactions across eight addresses.This data can be analyzed further using the Debridge Explorer to track how the assets are converted into different cryptocurrencies.Transaction Summary (Debridge Identified) 1) Transaction Hash: 0x85ae303e13c17c16336cfe7f23f812f074414566d522652a4bb91d8a820077acFrom: 0xd9274cda8346d25a7e344079594d8e1a1a4d3a02To (Debridge): 0x663dc15d3c1ac63ff12e45ab68fea3f0a883c251Transaction Time (UTC): 2025-02-06 21:27:47Token: ETHAmount: 159.984891 2) Transaction Hash: 0x5cf2b00098898c1af5ce7ce240908102edde611906d2eae967e4ddeed75402a9From: 0x24c367c656c9960655936bac8cf8b738a70433dcTo (Debridge): 0x663dc15d3c1ac63ff12e45ab68fea3f0a883c251Transaction Time (UTC): 2025-02-06 18:54:35Token: ETHAmount: 139.981718 3) Transaction Hash: 0x7930109426d980a9de4a29309103d4cde3ddc3ab28a3f259ff69a574b8524976From: 0xa7fce5ed6006626bb07749245a9854296a60e2d1To (Debridge): 0x663dc15d3c1ac63ff12e45ab68fea3f0a883c251Transaction Time (UTC): 2025-02-06 17:36:35Token: ETHAmount: 137.969672 4) Transaction Hash: 0x6b9434bf9faaf0b7552e002ac687a0e2e596960188a4c1d8c06d1fb980205ec1From: 0xcbc18f2c0371a03b25b1ec596b497d1f5a7b54e8To (Debridge): 0x663dc15d3c1ac63ff12e45ab68fea3f0a883c251Transaction Time (UTC): 2025-02-06 22:22:23Token: ETHAmount: 76.985214 5) Transaction Hash: 0x8f98c88f6b4b72c257fbc947250921fd82b94739fa422be24bee497378b03d53From: 0xbe7a5460d177ca8c89839ba3f900e3b61e4d4d89To (Debridge): 0x663dc15d3c1ac63ff12e45ab68fea3f0a883c251Transaction Time (UTC): 2025-02-10 12:23:59Token: ETHAmount: 5.902455 6) Transaction Hash: 0xe225eed10a1dc3b2b06b510c06d7bacd2f69b1043a3b9c8e98d704dc1bf5df06From: 0xbe7a5460d177ca8c89839ba3f900e3b61e4d4d89To (Debridge): 0x663dc15d3c1ac63ff12e45ab68fea3f0a883c251Transaction Time (UTC): 2025-02-10 12:23:11Token: ETHAmount: 159.905085 7) Transaction Hash: 0xf2a9fa7022e97b6178f36f0ba1d978e2aabd53154d99feef560c3113596c17d9From: 0x74851cba5b37cb085b75a16c778a1f74c6b27d3fTo (Debridge): 0x663dc15d3c1ac63ff12e45ab68fea3f0a883c251Transaction Time (UTC): 2025-02-06 19:23:59Token: ETHAmount: 139.985168 8) Transaction Hash: 0x52d77d0d4a9ec43e6abf23628cd0eadb7c67687530d5030e0da91a43c06f4553From: 0x81ceaa93e6c7021276f92da90a62f1cbed802d44To (Debridge): 0x663dc15d3c1ac63ff12e45ab68fea3f0a883c251Transaction Time (UTC): 2025-02-06 20:48:11Token: ETHAmount: 160 9) Transaction Hash: 0x634af7279d816d98b6c57311ea7e695cea129f46bb1e92db05357087a3c0dacdFrom: 0x0bd2d8e6f19fe540cb69a6c72ee3e942218c1f86To (Debridge): 0x663dc15d3c1ac63ff12e45ab68fea3f0a883c251Transaction Time (UTC): 2025-02-06 19:56:59Token: ETHAmount: 159.985086For example, a transaction sending 159.984891 ETH in TX 0x85ae303e13c17c16336cfe7f23f812f074414566d522652a4bb91d8a820077ac goes through two conversions:159.98 ETH → 429,120 USDC (Solana) → 429,120 USDC (BSC). (Figure 10)Figure 10: Cross-chain swap from ETH to Solana and BSCSource: https://app.debridge.finance/orders?s=52ptwAmkmMsg7PaQiCexjbJmkEYtA3VZXebTjtrgBoAUAfter that, 428,772 USDC is sent from BSC back to deBridge. (Figure 11)Figure 11: Cross-chain swap from BSC by DebridgeSource: https://bscscan.com/address/0x55788125568c5b22d14c020914b86d9acf753272#tokentxnsAfter that, 428,772 USDC is sent from BSC to Solana, where it arrives at 428,520 USDC. Figure 12: Cross-chain swap from BSC to SolanaSource: https://app.debridge.finance/orders?s=0x55788125568c5B22D14C020914b86d9acf753272This transaction undergoes a total of three cross-chain swaps:ETH → Solana → BSC → SolanaThe final destination wallet is as follows:The 428K USDC was ultimately deposited into a private wallet:8rduN4bx1UuYZk1UAhQ31Wt5sKDPTKcPQQc3PJApDNwgThis wallet presents two interesting points:There is a history of deposits and withdrawals involving approximately 428K USDC from a wallet that the community refers to as Wintermute. (Figure 13)However, we cannot definitively confirm that this wallet belongs to Wintermute, a globally recognized market maker and OTC trading firm.Figure 13: Final Wallet on SolanaSource: https://intel.arkm.com/explorer/address/8rduN4bx1UuYZk1UAhQ31Wt5sKDPTKcPQQc3PJApDNwgIf multiple sources, including the community and Arkham Intelligence, label the wallet as Wintermute, this becomes particularly noteworthy.If the owner of this wallet was involved in money laundering, they likely completed KYC verification at some point.Wintermute, if indeed associated with the wallet, would have access to relevant KYC information.Next Steps for Law EnforcementTo establish the facts, law enforcement should consider reaching out to Wintermute for verification. If the wallet is indeed tied to them, they may hold crucial KYC data that could assist in further investigation. By tracing the nine initial ETH transactions sent to deBridge, we can observe that all funds eventually consolidate into a single exchange wallet.Destination Exchange WalletOKX Deposit Wallet: HK7RDBzzBfhSr8DWxgLtwKA62zAzf3iUtsVsw54tAv5fThis wallet started receiving funds on February 4, approximately three weeks ago.It has a total deposit history of 3.37M USDC.This indicates that the source funds were aggregated and transferred to OKX(Figure 14), making it a key point of interest for further investigation.Figure 14: OKX User WalletSource: https://explorer.bitquery.io/solana/address/HK7RDBzzBfhSr8DWxgLtwKA62zAzf3iUtsVsw54tAv5f?from=2024-02-01&till=2025-02-25This OKX deposit wallet has been actively receiving funds since February 4, 2025, accumulating a total deposit of 3.37M USDC. This wallet serves as the final destination for the traced transactions, consolidating funds from multiple cross-chain transfers.Based on multiple findings, we analyzed Large Distribution Wallets using fund aggregator addresses linked to money laundering clusters previously identified on Phemex and Bybit.Conclusion & Next Steps for Law Enforcement and Exchanges1. Large-Scale Money Laundering Activity ConfirmedThe investigation has identified a clear pattern of cross-chain money laundering, where stolen funds were transferred through three separate cross-chain swaps before being deposited into a specific OKX wallet. This structured movement of funds suggests the involvement of an organized laundering network designed to obscure the origins of stolen assets.2. Suspicious Transactions Involving a Wallet Labeled as "Wintermute"One of the laundering wallets has transaction records linking it to a wallet that Arkham Intelligence and the community have labeled as "Wintermute." However, we cannot confirm with certainty that this wallet actually belongs to Wintermute, which is a global market maker and OTC firm. If this wallet is indeed linked to Wintermute, this could be a key point of investigation, as companies like Wintermute are required to follow strict KYC and compliance regulations. Unlike anonymous or fake KYC accounts on exchanges, firms like Wintermute typically collect verified identity data on their clients. If law enforcement confirms this connection, Wintermute could possess important identity records related to the individuals involved in these transactions. There is a high chance this wallet has been mislabelled as open-source information identifying the wallet with Wintermute has never once cited any evidence.3. 3.37M USDC Deposited into an OKX Wallet from a Laundering NetworkA wallet on OKX has received 3.37 million USDC since February 4, 2025, with transactions that strongly match known laundering methods. Given the timing and pattern of transfers, this wallet is highly likely connected to the Phemex hack.Analyzing other wallets with similar transaction behaviors on OKX and other exchanges could reveal additional laundering accounts and transactions.We will continue to work on the investigation and will share further information.

Bounty King: Bybit Security Breach – $1.4B Stolen Asset Analysis (Ongoing Investigation 2)
1 likes224 reads