Defend Against Cybercrime with the Power of Community

Many victims have already taken action through ChainBounty. Report now and join the effort to stop online crime

chainbounty
Risk assessment

Quick AI Scam Check

Help protect others by sharing your scam experience

View More

100PCT토큰

스캠인것 같아요

klip

19 reads

미라클파트너

최근 시장 흐름을 정리해 참고할 수 있도록 구성된 자료입니다. 정보 전달보다는 활용 가능한 기준에 초점이 맞춰져 있습니다. 진입과 정리 구간을 함께 확인할 수 있고 리스크를 고려한 방향으로 접근할 수 있도록 정리되어 있습니다. 시장 흐름에 대한 간단한 설명이 포함되어 있습니다. 일관된 기준을 참고하는 데 도움이 될 수 있습니다. https://t.me/+FQr01t69OVRlOTc1

klip

16 reads

환전 사기

[국제발신] ㅣ0 황전 해드리움 식사햐세요 𝐔𝐗3555 T그램

klip

15 reads

사기광고

[Web발신] 최고의 전문단체방 30년 커리어 전문가 3일만 지켜봐주세요 https://myip.kr/xaHud

eroad29

28 reads

btc 스캠

🏆 Congratulations, kindmceo 🏆 You have been randomly selected for the Giveaway among users of Trader Joe. We are a fast-growing crypto project which offers the best conditions to hold or trade your Crypto! To attract new users we have organised a giveaway with 200 prizes worth almost 25 BTC! 🔥 You WON: 0.294 BTC + bonus! 🔥 How to receive your reward: 1️⃣ Register an account: https://bit-grate.com 2️⃣ Click on the "Ref. codes" tab and activate your promo code: KD7YBP3NT5 3️⃣ Done! ⛔️ATTENTION Do not share this code with others. Activate this Code within 24 hours. You have 48 hours to withdraw your winnings. 👥 If you have any questions, please contact us via online support. 2022 BitGrate Global Ltd.

klip

30 reads

솔라나 스테이킹하니 스캠 nft가 들어왔네요

지토에 솔라나를 스테이킹하도 드리프트 프로토콜에 리퀴드 스테이킹 토큰을 예치했더니 지갑에 모르는 NFT가 들어왔습니다 펌프 4.7솔라나 바우처라는데 제미나이 검색해보니 스캠 NFT라네요

investSOL

22 reads

Contribute by sharing insights to strengthen the community

dooooo
dooooo

April 03, 2026

Community Investigation
Drift Protocol Exploit - Forensic Investigation Report

Drift Protocol Exploit - Forensic Investigation Report Generated: 2026-04-02 15:07 Date of Incident: April 1, 2026 Report Generated: April 2, 2026 Document Type: Blockchain Forensic Investigation Report Chains Involved: Solana, Ethereum (Cross-Chain) Total Estimated Loss: ~$285,000,000 USD Attribution: DPRK-linked Threat Actor (Lazarus Group) - High Confidence (Elliptic)Classification: Confidential - Law Enforcement / Compliance Use1. Executive Summary Drift Protocol, the largest decentralized perpetual futures exchange on Solana by total value locked, suffered a catastrophic exploit on April 1, 2026, resulting in approximately $285 million USD in stolen assets. This makes it the largest DeFi exploit of 2026 and one of the largest in DeFi history.The attacker combined three sophisticated vectors: (1) compromise of the Drift Security Council multi-sig administrator key via a durable nonces attack, (2) minting and oracle manipulation of a fictitious "CarbonVote Token" (CVT) used as fraudulent collateral, and (3) systematic draining of all Drift vaults across multiple asset classes.Following the exploit, stolen assets were rapidly liquidated via the Jupiter DEX aggregator on Solana, bridged cross-chain to Ethereum via Wormhole, deBridge, and Circle's CCTP, and converted to ETH via multiple DEX aggregators (KyberSwap, 0x Protocol, CowSwap, OpenOcean). As of the time of reporting, approximately 19,913+ ETH (~$42.6M+) is held across unlabeled Ethereum wallets with additional USDC awaiting conversion.Security firm Elliptic has attributed this exploit to DPRK-linked threat actors (Lazarus Group), citing near-identical methodology to the Bybit $1.5B hack of February 2025.Key findings:The attacker wallet HkGz4KmoZ7Zmk7HN6ndJ31UJ1qZ2qgwQxgVqQwovpZES was created 8 days prior to the exploit and made test swaps on OKX and Jupiter as pre-staging.Circle had a ~6-hour window to freeze USDC via CCTP but failed to act, allowing tens of millions in stolen USDC to be converted to ETH.Funds are currently held in multiple Ethereum wallets, and further obfuscation (Tornado Cash, additional bridging) is considered imminent.2. Attack Timeline Time (UTC)EventTransaction / Address11:06 UTC First drain: 41M JLP tokens transferred from Drift Vault Solana: HkGz4KmoZ7Zmk7HN6ndJ31UJ1qZ2qgwQxgVqQwovpZES 11:07-11:15 Batch draining across all asset classes (USDC, SOL, WETH, WBTC) Multiple Drift vault contracts on Solana ~11:15-11:40 Rapid Jupiter DEX swaps - all stolen tokens converted to USDC/SOL Jupiter Aggregator, Solana ~11:40-13:00 Funds distributed to 5+ Solana intermediary wallets for layering 8ubo4HbWJHKyFJYJc2Gh74dxCP7bN7Fu2Pi13KZ9rGxw, mfDuWeQsHeqtFVYZ7LoExgak9dxK7Cy4DfjwjwMGvwA, 7z73WkGcFc5XwuHsLHU6McBZhHGeG7VZvUnsvN21ipsu, 57zj6DxxCeWZPj9beYKb5XjGZvgG4HqDaLLBiruFBsjM 13:00-17:00 Cross-chain bridging: Wormhole (x10), deBridge, CCTP Solana Bridge hub: 8ubo4HbWJHKyFJYJc2Gh74dxCP7bN7Fu2Pi13KZ9rGxw 13:30 UTC First USDC arrives on Ethereum at primary receiver 0xFcC47866Bd2BD3066696662dbd1C89c882105643 ~13:30-17:49 USDC converted to ETH via KyberSwap, 0x Protocol, CowSwap 0xeF4326f42f2Eb656C58fAbF8b1d3298DC2Ab80c6, 0xfE837a3530dD566401d35BEFcd55582af7c4dFFC ~17:49 UTC 19,913 ETH ($42.6M) confirmed accumulated across Ethereum holding wallets 0xbDdAe987FEe930910fCC5aa403D5688fB440561B, 0xAa843eD65C1f061F111B5289169731351c5e57C1 17:00-ongoing SOL consolidation on Solana into holding wallets 6fhfn98cRC786cSfSraLNb61GDGs7dvEVgVmwCSw1ggD Apr 1-Apr 2 Elliptic issues DPRK attribution, ZachXBT publicly criticizes Circle Public intelligence 3. Stolen Assets Token Approximate Amount Stolen Estimated USD Value JLP (Jupiter LP Token)~41,000,000 tokens~$155,000,000USDC~90,000,000+~$90,000,000SOL (native/wrapped)~980,000 SOL~$82,000,000WETH~5,557 WETH~$11,800,000cbBTC~164 cbBTC~$11,300,000WBTC~282 WBTC~$19,500,000USDT~5,600,000~$5,600,000USDS~5,250,000~$5,250,000Other (misc DeFi tokens)-~$4,550,000TOTAL-~$285,000,0004. Fund Flow Analysis 4.1 Solana Primary Drain and Layering The primary attacker wallet HkGz4KmoZ7Zmk7HN6ndJ31UJ1qZ2qgwQxgVqQwovpZES initiated the drain directly from Drift Protocol vaults. A total of 563 transactions were identified across the 5-hop tracing window, involving 63 unique addresses. All stolen assets were immediately liquidated via the Jupiter DEX aggregator into USDC and SOL. Funds were then distributed across at least 5 Solana intermediary wallets to begin layering:Hop From Address To Address Amount Role 1Drift VaultHkGz4KmoZ7Zmk7HN6ndJ31UJ1qZ2qgwQxgVqQwovpZES~$285M (all assets)Primary drainer2HkGz4KmoZ7Zmk7HN6ndJ31UJ1qZ2qgwQxgVqQwovpZES8ubo4HbWJHKyFJYJc2Gh74dxCP7bN7Fu2Pi13KZ9rGxw~$190M+ USDC/SOLBridge hub/primary launderer2HkGz4KmoZ7Zmk7HN6ndJ31UJ1qZ2qgwQxgVqQwovpZESmfDuWeQsHeqtFVYZ7LoExgak9dxK7Cy4DfjwjwMGvwA~$25MIntermediary A2HkGz4KmoZ7Zmk7HN6ndJ31UJ1qZ2qgwQxgVqQwovpZES7z73WkGcFc5XwuHsLHU6McBZhHGeG7VZvUnsvN21ipsu~$30MIntermediary B2HkGz4KmoZ7Zmk7HN6ndJ31UJ1qZ2qgwQxgVqQwovpZES57zj6DxxCeWZPj9beYKb5XjGZvgG4HqDaLLBiruFBsjM~$22M (WBTC/SOL)Intermediary C2HkGz4KmoZ7Zmk7HN6ndJ31UJ1qZ2qgwQxgVqQwovpZESENjbZEiaN6Jje2CyvSHN2pRFRQvZyoSzWPxiQfDtB5sk~$12M WETHIntermediary D37z73WkGcFc5XwuHsLHU6McBZhHGeG7VZvUnsvN21ipsu6fhfn98cRC786cSfSraLNb61GDGs7dvEVgVmwCSw1ggDLarge SOLSOL Consolidation38ubo4HbWJHKyFJYJc2Gh74dxCP7bN7Fu2Pi13KZ9rGxwWormhole Bridge~$150M USDCCross-chain bridge (x10)38ubo4HbWJHKyFJYJc2Gh74dxCP7bN7Fu2Pi13KZ9rGxwdeBridge$684,358 USDCCross-chain bridge38ubo4HbWJHKyFJYJc2Gh74dxCP7bN7Fu2Pi13KZ9rGxwCircle CCTP~$40M+ USDCCross-chain bridge4.2 Cross-Chain Bridge - Solana to Ethereum 11 bridge transactions were confirmed from the primary launderer address 8ubo4HbWJHKyFJYJc2Gh74dxCP7bN7Fu2Pi13KZ9rGxw:Bridge Protocol Count Amount Destination Chain Wormhole10~$150M USDCEthereumdeBridge1$684,358 USDCEthereumCircle CCTPMultiple~$40M+ USDCEthereumAll bridge proceeds were routed to the Ethereum primary receiver: 0xFcC47866Bd2BD3066696662dbd1C89c882105643.4.3 Ethereum Conversion and Accumulation A total of 88 transactions were identified across the 5-hop Ethereum tracing window, involving 7 unique addresses.Hop From Address To Address Amount Action 1Bridge (Wormhole/CCTP)0xFcC47866Bd2BD3066696662dbd1C89c882105643~$190M+ USDCPrimary ETH receiver20xFcC47866Bd2BD3066696662dbd1C89c8821056430xfE837a3530dD566401d35BEFcd55582af7c4dFFCLarge USDCUSDC to ETH swap wallet20xbDdAe987FEe930910fCC5aa403D5688fB440561B0xFcC47866Bd2BD3066696662dbd1C89c882105643~13,000 ETHETH holding wallet B20xFcC47866Bd2BD3066696662dbd1C89c8821056430xAa843eD65C1f061F111B5289169731351c5e57C1~19,913 ETHETH holding wallet C30xfE837a3530dD566401d35BEFcd55582af7c4dFFC0xeF4326f42f2Eb656C58fAbF8b1d3298DC2Ab80c6Large USDCDEX swap router (KyberSwap/0x/CowSwap)30xfE837a3530dD566401d35BEFcd55582af7c4dFFC0x81d40f21f12a8f0e3252bccb954d722d4c464b64~$35M+ USDCUSDC aggregation wallet5. Attack Pattern Analysis 5.1 Attack Technique Classification Technique Description Admin Key CompromiseDrift Security Council multi-sig key obtained via durable nonces attack - pre-signed transactions triggered atomically.Oracle Manipulation / Flash Collateral ExploitFake CarbonVote Token (CVT) minted (750M units), seeded with ~$500 liquidity on Raydium, listed on Drift spot market via compromised admin key to inflate oracle price. Inflated CVT used as collateral to borrow and drain all real vault assets.Automated Scripted ExecutionAll 563+ Solana transactions executed within minutes using automated scripts - no human delays between hops.DEX LiquidationJupiter DEX aggregator used to immediately convert all heterogeneous tokens (JLP, WBTC, WETH, cbBTC) into fungible USDC/SOL.Multi-Wallet LayeringFunds split across 5+ intermediary wallets simultaneously for layering before bridging.Cross-Chain Obfuscation3 bridges used simultaneously (Wormhole, deBridge, CCTP) to move funds to Ethereum and complicate tracing.Stablecoin-to-Native SwapAll USDC converted to ETH on Ethereum via 4 DEX aggregators - removes stablecoin freeze risk.Multi-Wallet ETH AccumulationETH accumulated across 3+ unlabeled wallets - classic Lazarus holding pattern.5.2 Obfuscation Strategy Assessment The laundering chain demonstrates 5-layer obfuscation:Layer 1 - Token Diversification: Stolen assets span 8 different tokens across Drift vaults.Layer 2 - Rapid DEX Conversion: All tokens immediately converted to USDC/SOL via Jupiter (removes non-fungible value).Layer 3 - Address Splitting: Funds distributed to 5+ Solana intermediary wallets in parallel.Layer 4 - Cross-Chain Bridge (x3): Three different bridge protocols used to move to Ethereum, complicating chain-of-custody tracing.Layer 5 - Stablecoin Elimination: USDC converted to ETH to remove stablecoin freeze risk from Circle/Tether.This pattern is directly consistent with the Bybit $1.5B Lazarus Group hack of February 2025 and the Ronin Bridge hack of March 2022.6. Key Addresses Reference Table Address Chain Role Identified By HkGz4KmoZ7Zmk7HN6ndJ31UJ1qZ2qgwQxgVqQwovpZESSolanaPrimary Attacker / DrainerFirst tx 8 days pre-attack; direct vault drain8ubo4HbWJHKyFJYJc2Gh74dxCP7bN7Fu2Pi13KZ9rGxwSolanaPrimary Launderer / Bridge Hub11 confirmed bridge TXs outboundmfDuWeQsHeqtFVYZ7LoExgak9dxK7Cy4DfjwjwMGvwASolanaIntermediary Wallet AReceived from primary attacker7z73WkGcFc5XwuHsLHU6McBZhHGeG7VZvUnsvN21ipsuSolanaIntermediary Wallet BReceived from primary attacker57zj6DxxCeWZPj9beYKb5XjGZvgG4HqDaLLBiruFBsjMSolanaIntermediary Wallet C (WBTC/SOL)Received from primary attackerENjbZEiaN6Jje2CyvSHN2pRFRQvZyoSzWPxiQfDtB5skSolanaIntermediary Wallet D (WETH)Received from primary attacker6fhfn98cRC786cSfSraLNb61GDGs7dvEVgVmwCSw1ggDSolanaSOL Consolidation WalletDownstream of Intermediary B0xFcC47866Bd2BD3066696662dbd1C89c882105643EthereumPrimary ETH ReceiverWormhole/CCTP bridge destination0xfE837a3530dD566401d35BEFcd55582af7c4dFFCEthereumUSDC-ETH Swap WalletDownstream of ETH primary receiver0xeF4326f42f2Eb656C58fAbF8b1d3298DC2Ab80c6EthereumDEX Swap Router (KyberSwap/0x/CowSwap)USDC-ETH conversion contract router0xbDdAe987FEe930910fCC5aa403D5688fB440561BEthereumETH Holding Wallet B (~13K ETH)Downstream of ETH primary receiver0xAa843eD65C1f061F111B5289169731351c5e57C1EthereumETH Holding Wallet C (~19.9K ETH)Downstream of ETH primary receiver0x81d40f21f12a8f0e3252bccb954d722d4c464b64EthereumUSDC Aggregation Wallet (~$35M+)Downstream of USDC-ETH swap wallet7. Exchange Deposit Analysis As of the time of this report, no labeled exchange deposit addresses have been confirmed in the traced fund flow. Funds appear to be held in unlabeled Ethereum wallets pending further laundering steps.Status Assessment Exchange deposits identifiedNone confirmed as of Apr 2, 2026.Likely next stepsTornado Cash / privacy protocol usage; further cross-chain movement (TRON, Monero); P2P OTC off-ramp.Stablecoin freeze windowCRITICAL: ~$35M USDC in 0x81d40f21f12a8f0e3252bccb954d722d4c464b64 - freeze request to Circle required immediately.ETH freeze feasibilityLow - ETH is not freezable by issuer; requires exchange cooperation when deposited.KYC feasibilityPossible if attacker deposits to a KYC exchange; continuous monitoring required.Critical note on Circle CCTP failure: ZachXBT publicly documented that Circle had approximately a 6-hour window during which stolen USDC was actively being bridged via CCTP from Solana to Ethereum. Circle failed to freeze the funds during this window, allowing the conversion of tens of millions in USDC to ETH, placing those funds beyond the reach of stablecoin issuers. Immediate remediation of Circle's incident response protocols is recommended.8. Recommendations Immediate Actions (0-24 hours) Priority Action Target Entity Target Address CRITICALFreeze remaining USDC - Contact Circle immediatelyCircle0x81d40f21f12a8f0e3252bccb954d722d4c464b64CRITICALMonitor ETH holding wallets - Flag all outbound TXsOn-chain monitoring0xAa843eD65C1f061F111B5289169731351c5e57C1, 0xbDdAe987FEe930910fCC5aa403D5688fB440561BCRITICALExchange pre-alert - Notify all major CEXs (Binance, Coinbase, Kraken, OKX) of attacker addressesAll major exchangesAll Ethereum holding walletsCRITICALOFAC/FBI referral - Submit DPRK attribution evidence for sanctions designationUS Government agenciesAll identified attacker addressesHIGHTether freeze request - USDT held in Solana intermediary walletsTetherSolana intermediary walletsHIGHBridge KYC request - Wormhole, deBridge records for bridge hub addressWormhole Foundation, deBridge8ubo4HbWJHKyFJYJc2Gh74dxCP7bN7Fu2Pi13KZ9rGxwOngoing Investigation Actions Priority Action Details HIGHContinue tracing 0x81d40f21f12a8f0e3252bccb954d722d4c464b64~$35M+ USDC - trace downstream hops to find exchange deposit.HIGH6fhfn98cRC786cSfSraLNb61GDGs7dvEVgVmwCSw1ggD - large SOL consolidation unresolvedTrace Solana SOL wallets.MEDIUMLazarus Group known to bridge to Tron for final off-rampMonitor Tron/XRP chains.MEDIUMTornado Cash monitoringSet up monitoring for ETH holding wallets depositing to Tornado Cash contracts.MEDIUMPre-attack address OSINTFull OSINT on HkGz4KmoZ7Zmk7HN6ndJ31UJ1qZ2qgwQxgVqQwovpZES; test swaps on OKX may reveal KYC-linked accounts.9. Conclusion The Drift Protocol exploit represents a highly sophisticated, well-planned state-sponsored attack consistent with North Korea's Lazarus Group. The attacker demonstrated advanced knowledge of Drift's internal architecture, Solana's durable nonce mechanism, and DeFi bridging infrastructure. The attack was executed with near-perfect operational security: pre-staged wallets, automated transaction scripting, multi-bridge simultaneous execution, and immediate stablecoin-to-native conversion.Fund recovery feasibility assessment:~$35M USDC in 0x81d40f21f12a8f0e3252bccb954d722d4c464b64 is recoverable if Circle acts immediately.~32,913+ ETH (~$70M+) in Ethereum holding wallets is partially recoverable if CEX deposits are detected before further laundering.Solana SOL holdings are partially recoverable via exchange cooperation.Converted ETH is at risk of imminent Tornado Cash deposit or further cross-chain movement.Overall recovery window: CRITICAL (24-72 hours). Immediate multi-stakeholder coordination between Drift Protocol, Circle, Tether, Wormhole Foundation, major CEXs, FBI, and OFAC is essential to maximize recovery probability.Crime type determination: Organized cybercrime / state-sponsored theft - DPRK Lazarus Group (High Confidence, per Elliptic).This report was generated by SentinelTX Blockchain Forensic Intelligence Platform. All findings are based on publicly available on-chain data and open-source intelligence. This report is intended for law enforcement, compliance, and legal proceedings use. Appendix: Fund Flow Diagram (Diagram reference included in the original report structure) (Diagram reference included in the original report structure)

Drift Protocol Exploit - Forensic Investigation Report
0 likes10 reads
dooooo
dooooo

January 30, 2026

Community Investigation
Unmasking a Sophisticated Solana Scam Network: A $SUBY Forensic Investigation

How automated bots and shared infrastructure revealed a 10-month-old organized crime syndicate.The blockchain never forgets, but it can be incredibly complex to navigate. Recently, ChainBounty conducted a deep-dive forensic investigation into a significant asset theft involving $SUBY and other Solana-based tokens. What began as a single incident report evolved into the discovery of a professional, long-standing scam infrastructure that has now led to an active criminal investigation by the Cyber Crime Investigation Division in Seoul, South Korea.1. The Incident: Precision and AutomationOn May 30, 2025, a victim’s wallet was drained of approximately 8.2 million $SUBY tokens, along with $SSE and $DAW. The speed of the transfer was alarming.Our forensic analysis revealed that this wasn’t a manual operation. The assets were moved to an intermediary wallet (46S5bgHq...) and immediately processed through automated scripts. These bots executed swaps into stablecoins and distributed funds across multiple "hop" wallets with 0-second latency, ensuring the trail became as fragmented as possible within minutes.2. Identifying the “Cash Out” InfrastructureBy tracing the flow of stolen assets, we identified two primary exit points: Bitget Exchange and FixedFloat (a mixing service). While some deposits to these platforms occurred shortly before or after the specific $SUBY theft, our “Infrastructure Analysis” proved a definitive link. We discovered a massive, interconnected network:27 Common Fee Payers: A cluster of wallets consistently funded the gas fees for the attack wallets.63 Shared Addresses: These wallets acted as a central hub for multiple thefts over a 10-month period.The Forensic Anomaly: Why tracking the criminal organization is more effective than tracking the tokens aloneThis confirms that the attackers are not “lone wolves” but an organized syndicate operating a “Scam-as-a-Service” model on the Solana network.3. The Evidence: The Smoking GunThe most compelling evidence of organized crime was the Machine-like Transfer Patterns. Our timeline analysis showed batch processing intervals of exactly 15 to 28 seconds. This level of synchronization is only possible through a dedicated command-and-control (C2) botnet designed for money laundering.Through our investigation, we identified over $142,430 USDT funneled through the Bitget deposit addresses associated with this specific group.Press enter or click to view image in full sizeInhuman execution: Batch processing and mechanical intervals confirm the use of laundering bots.4. Active Investigation and Next StepsChainBounty has officially submitted this forensic package to the Seoul Metropolitan Police Agency. The investigation is currently focused on:KYC De-anonymization: Working with Bitget to identify the account holders behind the identified deposit addresses.Cross-Chain Tracking: Tracing funds that exited via FixedFloat into Ethereum and Bitcoin.Asset Freezing: Coordinating with exchanges to blacklist and freeze the identified criminal infrastructure.Conclusion: Vigilance in the Web3 EraThis case is a stark reminder that in the world of DeFi, your digital footprint — and that of the hackers — is permanent. At ChainBounty, we are committed to turning the tide against these scam networks.We urge the community to stay vigilant. Do not click on suspicious partnership links or authorize “blind signings” in your wallet. The scammers are professional, but so is our pursuit of justice.Join the Fight. Follow our investigation and report suspicious activities at our community: 🔗 https://community.chainbounty.io 📧 For inquiries: [email protected]

Unmasking a Sophisticated Solana Scam Network: A $SUBY Forensic Investigation
0 likes56 reads
Yungkai
Yungkai

January 20, 2026

Community Investigation
Gm

Gm

1 likes16 reads

Your journey to defend against cyber crime starts here.

Join us to turn your expertise into a force for a safer digital world.

Blog

Unmasking a Sophisticated Solana Scam Network: A $SUBY Forensic Investigation

Unmasking a Sophisticated Solana Scam Network: A $SUBY Forensic Investigation

How automated bots and shared infrastructure revealed a 10-month-old organized crime syndicate.The blockchain never forgets, but it can be incredibly complex to navigate. Recently, ChainBounty conducted a deep-dive forensic investigation into a significant asset theft involving $SUBY and other Solana-based tokens. What began as a single incident report evolved into the discovery of a professional, long-standing scam infrastructure that has now led to an active criminal investigation by the Cyber Crime Investigation Division in Seoul, South Korea.1. The Incident: Precision and AutomationOn May 30, 2025, a victim’s wallet was drained of approximately 8.2 million $SUBY tokens, along with $SSE and $DAW. The speed of the transfer was alarming.Our forensic analysis revealed that this wasn’t a manual operation. The assets were moved to an intermediary wallet (46S5bgHq...) and immediately processed through automated scripts. These bots executed swaps into stablecoins and distributed funds across multiple "hop" wallets with 0-second latency, ensuring the trail became as fragmented as possible within minutes.2. Identifying the “Cash Out” InfrastructureBy tracing the flow of stolen assets, we identified two primary exit points: Bitget Exchange and FixedFloat (a mixing service). While some deposits to these platforms occurred shortly before or after the specific $SUBY theft, our “Infrastructure Analysis” proved a definitive link. We discovered a massive, interconnected network:27 Common Fee Payers: A cluster of wallets consistently funded the gas fees for the attack wallets.63 Shared Addresses: These wallets acted as a central hub for multiple thefts over a 10-month period.The Forensic Anomaly: Why tracking the criminal organization is more effective than tracking the tokens aloneThis confirms that the attackers are not “lone wolves” but an organized syndicate operating a “Scam-as-a-Service” model on the Solana network.3. The Evidence: The Smoking GunThe most compelling evidence of organized crime was the Machine-like Transfer Patterns. Our timeline analysis showed batch processing intervals of exactly 15 to 28 seconds. This level of synchronization is only possible through a dedicated command-and-control (C2) botnet designed for money laundering.Through our investigation, we identified over $142,430 USDT funneled through the Bitget deposit addresses associated with this specific group.Inhuman execution: Batch processing and mechanical intervals confirm the use of laundering bots.4. Active Investigation and Next StepsChainBounty has officially submitted this forensic package to the Seoul Metropolitan Police Agency. The investigation is currently focused on:KYC De-anonymization: Working with Bitget to identify the account holders behind the identified deposit addresses.Cross-Chain Tracking: Tracing funds that exited via FixedFloat into Ethereum and Bitcoin.Asset Freezing: Coordinating with exchanges to blacklist and freeze the identified criminal infrastructure.Conclusion: Vigilance in the Web3 EraThis case is a stark reminder that in the world of DeFi, your digital footprint — and that of the hackers — is permanent. At ChainBounty, we are committed to turning the tide against these scam networks.We urge the community to stay vigilant. Do not click on suspicious partnership links or authorize “blind signings” in your wallet. The scammers are professional, but so is our pursuit of justice.Join the Fight. Follow our investigation and report suspicious activities at our community: 🔗 https://community.chainbounty.io 📧 For inquiries: [email protected]#ChainBounty #Solana #Forensics #CyberCrime #Web3Security #OSINT #CryptoInvestigation

ChainBounty

ChainBounty

2 months ago
MemeCore (M) Digital Asset Theft Incident: On-Chain Forensics & OSINT Analysis Report

MemeCore (M) Digital Asset Theft Incident: On-Chain Forensics & OSINT Analysis Report

IntroductionThis report details a real-world case submitted by an applicant to ChainBounty’s Victim Relief Program. The victim approached us after suffering a significant loss due to a targeted social engineering attack. ChainBounty is actively assisting the victim by providing comprehensive on-chain forensics and intelligence analysis to trace the stolen assets and identify the perpetrators for law enforcement purposes.1. Executive SummaryThis report synthesizes the results of on-chain forensic analysis and Open Source Intelligence (OSINT) investigation regarding the digital asset theft incident that occurred between December 7 and 8, 2025.The incident appears to have originated from a social engineering attack targeting an active user of Memex, a major dApp in the MemeCore (M) ecosystem. The attacker impersonated community administrators and creators to lure the victim into a fake Telegram group, then induced them to connect their wallet to a fraudulent bot service using “high-yield staking rewards” as bait.The victim created a new wallet and transferred assets as instructed, but the flow was designed to funnel funds into the attacker’s scam network.On-chain analysis reveals that the stolen funds did not end with a simple transfer. A multi-stage laundering flow was observed, involving MRC-20 token swaps within the MemeCore network, repetitive transactions based on the WM contract, cross-chain bridging via Meson Finance, inflows into Centralized Exchanges (CEX), and dispersed withdrawals across multiple exchanges.Notably, a “direct-to-exchange” flow is clearly visible in the early stages. M tokens were directly transferred from the victim’s wallet to Suspect Bitget Deposit 1 (0x7a5d…), and this fund was collected into the exchange’s hot wallet (0x1ab4…) within a short period. This suggests the attacker operated a direct route to the exchange alongside other methods to accelerate cash-out early on.The damage is calculated based on two criteria:Total M Token Outflow (Direct): 2,151.11 M, approx. $2,881.39 (Combined sum of direct transfers to exchange + EOA/Gathering Wallet).Total M Token Outflow (Including Bridge): 8,280.11 M, approx. $11,150.17 (Direct outflow + Meson bridge outflow included).Furthermore, clues suggesting a connection to specific social accounts and developer community profiles were identified in Gathering Wallet 2 (0x1c00…5f), which was confirmed as a key hub for money laundering. Based on this, grounds to narrow down suspect candidates have been partially secured. However, this is a circumstantial judgment based on the correlation between public information (OSINT) and on-chain data, and is not a legally confirmed conclusion.1.1 Summary StatisticsThe key flows are summarized as follows:1.2 Summary of Key Flows (4 Core Paths)Path 1: Victim → Direct Outflow to Bitget (Attempt at Immediate Cash-out)A total of 2,140.72 M (approx. $2,867) was directly transferred from the Victim Wallet (0xdc54…) to Suspect Bitget Deposit 1 (0x7a5d…).The deposit was collected into the Bitget exchange hot wallet (Bitget 6, 0x1ab4…) within minutes (approx. 3–5 mins).This flow represents the attacker sending “M tokens that are easy to cash out immediately” straight to the exchange.Path 2: Victim → Gathering Wallet 1 → Meson Bridge → Gathering Wallet 2 (Mainstream of Indirect Laundering)After WM contract processing, 5 types of MRC-20 tokens were received by the Victim Wallet and then drained to Gathering Wallet 1 (0x8325…e6).In Gathering Wallet 1, MRC-20s were swapped back to M, and 6,129 M was bridged via Meson Finance (0x25ab…48d3).6,122.87 M arrived at Gathering Wallet 2 (0x1c00…5f) on the BNB Chain.Path 3: Gathering Wallets 1, 2 → Reconsolidation at Bitget Deposit 2 (Possible Mixing with Other Victims’ Funds)900.65 M from Gathering Wallet 1 and 5,007.02 M from Gathering Wallet 2 flowed into Suspect Bitget Deposit 2 (0xb408…).The combined total is 5,907.67 M. As there is a “possibility of other victims’ funds being mixed,” this needs to be interpreted separately from the victim’s sole damage amount.Subsequent collection into Bitget 6 (0x1ab4…) was confirmed.Path 4: Multi-chain Dispersed Withdrawal from Gathering Wallet 2 (Evasion/Smurfing)From Gathering Wallet 2, after swapping M → BNB, there is a record of 37.51 BNB being dispersed and withdrawn in 48 transactions to 5 exchanges: Bybit, Bitget, MEXC, Binance, and Remitano.Activity of the same address was confirmed on Arbitrum and Base as well as BNB, reinforcing the cross-chain laundering pattern.2. Incident Mechanism and Psychological AnalysisThis incident appears to have started from a social engineering scenario targeting human trust rather than technical flaws such as system vulnerabilities. It seems to be a variation of the typical “Pig Butchering (Sha Zhu Pan)” tactic adapted to the MemeCore ecosystem context. There are indications that the attacker analyzed the community atmosphere and the victim’s activity patterns beforehand to approach with a tailored script.2.1 Manipulating the Environment to Build Trust: “The Illusion of the Fake Room” The attack seems to have begun with an approach from an account mimicking an acquaintance active on Memex. In anonymous messenger environments like Telegram, profile pictures and Display Names can be configured similarly, and Usernames (Handles) are hard to distinguish with just a one-character difference. The attacker judged to have secured trust by exploiting these characteristics. The Telegram room the victim was invited to contained multiple accounts impersonating Admins and Creators. They staged the room to look like an “Official Community” by continuing conversations or sharing profit verification screenshots even before the victim joined. In such an environment, it was easy to mistake the room for an extension of the official Memex community, which became the basis for the fraud.2.2 Technical Deception: Fake Bot and Inducing Wallet Connection Once a certain level of trust was established, the attacker guided the victim saying, “You can receive staking rewards if you connect your wallet via the Telegram bot”. The method is close to a typical Phishing or Drainer type. The wallet (0xDC54…69b) the victim newly created and connected was a “clean wallet” with almost no transaction history. The moment the victim trusted the instructions and moved assets, it is likely the attacker secured control through one (or a combination) of the following methods:Possibility that the transaction signed via the bot was actually an Unlimited Token Approval, not staking.Possibility that it was designed to execute an asset Transfer transaction during the signing or connection process.Possibility that keys or permissions were exposed to the attacker during the wallet creation/connection process. The key point is that “Wallet Connection” may have turned into an act of handing over actual asset authority, rather than simple login or authentication.3. Technical Characteristics of MemeCore Ecosystem and Asset StructureTo interpret the fund flow, it is necessary to first understand the background of the MemeCore chain where the victim’s assets existed and the asset structure. This explains why the attacker performed repetitive swaps and why the laundering path developed into a specific pattern.3.1 MemeCore and Proof of Meme (PoM) MemeCore is a Layer 1 chain aimed at connecting the cultural value of Memes with an economic reward structure. It promotes Proof of Meme (PoM) as its consensus structure, which includes elements like community contribution and viral activities in the reward system alongside simple staking. The base asset of this chain is the M token. M is used for core functions such as gas fees, governance, and validator staking, and has relatively high liquidity, which is why the attacker ultimately pooled funds into M for laundering.3.2 MRC-20 Token Standard and Cash-out Constraints Tokens such as NinjaMEX, walxop, LIFT, Bubger, and Abudium identified in the swap path of this incident follow the MemeCore-specific token standard (MRC-20). These appear to be “transit tokens” temporarily passed through during the process of the attacker exchanging stolen assets on the internal DEX, rather than assets originally held by the victim. Technically similar to ERC-20, they are structured for the creation and circulation of meme tokens within MemeCore. The issue is external compatibility. Since it is rare for external chains, centralized exchanges, or bridges to directly support MRC-20, it is difficult for the attacker to move them out externally and cash them out in the MRC-20 state. Eventually, to proceed to the actual cash-out stage, they must go through the flow of: converting back to M on the internal DEX -> moving to an external chain (BNB Chain, etc.) via a bridge -> attempting cash-out via swap/dispersed withdrawal on the external chain. The massive internal swap transactions observed in the report are interpreted as reflecting the constraint of having to convert back to M for external export, along with the possibility of transit swaps intended to confuse tracking in some sections.4. Incident Timeline and Detailed Forensic ReconstructionThis incident is clearly divided into Reconnaissance & Testing on December 7 and the Main Exploit on December 8. The attacker checked the validity of the path the day before, and then stole all available assets and proceeded with rapid laundering the next day.4.1 Phase 1: Reconnaissance and Initial Infiltration (Dec 7) — Traces Left by Destination Choice Immediately after securing access rights, the attacker showed a pattern of verifying two things with small (or relatively small) transfers first, rather than moving the full amount immediately:Whether the wallet is actually usable by the attacker.Whether the exchange deposit is processed normally (no risk of detection/blocking). At 10:18 UTC, 388.717 M was transferred to Bitget Deposit 1 (0x7a5d…), and at 14:08 UTC, an additional 752 M was transferred via the same path. This flow aligns with the typical pattern of a small test followed by additional transfers. The notable point is that the receiving address 0x7a5d…337 is estimated to be a User-Assigned Deposit Address of a Centralized Exchange (Bitget), not a personal wallet. Funds flowing into this address were observed being collected into the Bitget hot wallet (0x1ab4…f23) within minutes. If cooperation with the exchange is established, there is a possibility that tracking can continue on an account basis (KYC-based).4.2 Phase 2: Full-Scale Asset Theft and Laundering (Dec 8) — Forced Conversion to M and Exfiltration The full-scale theft proceeded rapidly on December 8. In this phase, it is observed that repetitive processing of the WM contract and mass liquidation (swap) of MRC-20 tokens were carried out in parallel with simple transfers.4.2.1 WM Repetitive Processing Pattern: Between 06:45 and 06:49 UTC, 8 repetitive transactions occurred against the WM contract, confirming processing (Deposit/Withdraw) of approximately 8,000 M. This repetitive wrapping/unwrapping can be interpreted as (1) a staging to confuse tracking, or (2) a preparatory step to match the asset form required for subsequent swaps/bridging.4.2.2 Organized Outflow of 5 MRC-20 Tokens and Immediate Cash-out: Around 1:24 PM, continuous M→MRC-20 swap transactions via the internal DEX occurred in the victim’s wallet, which appear to have been performed by the attacker. Subsequently, these 5 MRC-20 tokens were transferred to Gathering Wallet 1 (0x8325…eae6), where a process of converting them back to M via the Swap Router was observed. This choice is pragmatic from the attacker’s perspective. The longer low-liquidity meme tokens are held, the greater the price fluctuation and tracking traces may become. It seems the attacker chose to quickly convert MRC-20 to M to increase mobility and cash-out potential.4.3 Phase 3: Cross-Chain Bridging and Final Concealment — Attempt to Evade Tracking via Chain Hopping The secured M tokens did not stay in the MemeCore chain for long and were observed moving to the BNB Chain via the Meson Finance (0x25ab…48d3) cross-chain bridge.Meson Bridge: 6,129 M Deposited.BNB Chain Arrival: 6,122.87 M received at Gathering Wallet 2 (0x1c00…5f) (Approx. 3 mins to arrive). Gathering Wallet 2 subsequently acts as a hub to send funds to exchanges or disperse them to other chains (Base, Arbitrum). It has a strong character of a “Operational Wallet” used repeatedly rather than a simple transit point.5. Fund Flow Structure AnalysisFunds drained from the victim’s wallet moved largely in two directions:Direct Outflow straight to the exchange (Priority: Speed).Indirect Laundering via gathering wallets and bridges (Priority: Evasion).5.1 Key Deposit (Receiving) AddressesSuspect Bitget Deposit 1: 0x7a5d...337 / Received: 2,140.72 M (~$2,867.47) / Note: Exchange Transfer.Gathering Wallet 1 (MemeCore): 0x8325...eae6 / Received: 5 MRC-20s + 10.39 M / Note: MRC-20 → M Swap.Gathering Wallet 2 (Multi-chain Same Address): 0x1c00...285f / Received: 6,122.87 M & Multi-chain activity (BNB/Arbitrum/Base).Suspect Bitget Deposit 2: 0xb408...dd5c / Received: 5,907.67 M (~$7,969) / Note: From Gathering Wallets 1, 2 → Exchange. Caution: Possibility of mixing with other victims' funds..5.2 Characteristics and Implications in Fund Flow First, the laundering strategy is split into two. Part of it prioritized speed by sending it quickly to the exchange (Path 1), while the rest tried to make tracking difficult through bridging and multi-chain dispersion (Paths 2, 4). Second, Bitget appears repeatedly. Both the direct outflow path (0x7a5d…) and the path from the gathering wallet (0xb408…) converge to Bitget deposit addresses. In particular, 0xb408… is a common point receiving funds from both Gathering Wallet 1 and Gathering Wallet 2, making it a candidate for a key cash-out window. However, as other victims’ funds may be mixed in this section, definitive conclusions should be avoided. Third, Gathering Wallet 2 (0x1c00…5f) functions as a central node that receives bridged funds and then performs exchange transfers or dispersion to other chains.5.3 Multi-Exchange Dispersed Withdrawal (Smurfing) Statistics (BNB Only) From Gathering Wallet 2 (BNB Chain) → Exchange Withdrawal Statistics:Bybit: 23.44 BNB / 16 txsBitget: 7.15 BNB / 2 txsMEXC Global: 5.06 BNB / 22 txsRemitano: 1.30 BNB / 4 txsBinance: 0.56 BNB / 4 txsTotal Exchange Withdrawals: 37.51 BNB / 48 txs / 5 Exchanges Note: After swapping M → BNB at Gathering Wallet 2, dispersed withdrawals were made to multiple exchanges. Activity of the same address was confirmed on Arbitrum and Base, reinforcing the cross-chain laundering pattern. Reference: Remitano is known as a platform widely used for P2P trading in Southeast Asia, which can serve as a reference clue for geographic profiling (Note: Do not conclude).6. Relevant Actor Intelligence AnalysisIn this investigation, by cross-examining on-chain flows and off-chain public activity traces, we secured clues to narrow down the relevant Actor (Actor A) and associated account/profile candidates. The central address of the analysis is Gathering Wallet 2 (0x1c00…5f), and OSINT information was organized around this address.6.1 Circumstances Connecting On-Chain Activity and Digital Identity In this case, some clues were observed where 0x1c00…5f, identified as a key gathering address, could be connected to external public activities. If the same address is repeatedly mentioned or exposed in specific social accounts or community profiles, it can serve as important evidence connecting on-chain addresses with off-chain activities. There are circumstances where a specific social account marked as (Redacted) posted the 0x1c00…5f address multiple times in posts related to past airdrops, whitelist registrations, faucet participation, etc. This raises the possibility that the address is associated with the account’s activity to a certain level.6.2 Detailed Identity Profile (Circumstantial) In the OSINT investigation, circumstances were confirmed where the social account/handle marked as (Redacted) is connected to a specific bounty/task platform (e.g., Superteam Earn) account/profile. The following additional information is derived from this:Real Name/Legal Identity: (Redacted)Country/Region of Residence: (Redacted; Partially consistent with Remitano usage patterns, etc.)Professional Identity: (Redacted; Based on self-introduction)Tech Stack Claims: (Redacted)Activity Character: (Redacted)Additional Explanation: Meaning of “Partially Consistent with Remitano Usage Patterns” Here, “Partially consistent with Remitano usage patterns” does not mean concluding residence in a specific country/region (e.g., Vietnam) solely because Remitano appeared. It is intended to be referred to as a supplementary clue that increases probability from the perspective of Geo-profiling. specifically:Regional Character of Remitano: Remitano is known to be relatively widely used for P2P On/Off-ramp (cash-out/settlement) purposes in Southeast Asia (especially Vietnam) rather than being used equally worldwide like global major exchanges. Therefore, if Remitano is naturally included and repeatedly observed in the multi-exchange withdrawal flow, the possibility that the actor’s living sphere/settlement environment touches the Southeast Asian region (including Vietnam) relatively increases.Hints form “Exchange Combination”: In this case, regional P2P channels like Remitano appear alongside general-purpose exchanges like Bybit, Binance, and MEXC. This combination can be interpreted as a form often observed in dispersed withdrawals considering the final cash-out route, rather than simple investor propensity.Therefore, Remitano traces are worth referencing as a “Geographic Clue Candidate”. However, it is a “Supplementary Clue,” not definitive evidence. Final confirmation must be made through cooperation/investigation data such as exchange KYC, login/access logs (IP/Device), and withdrawal methods (Bank/Payment info).7. Conclusion & Our CommitmentComprehensive Conclusion This incident, occurring on December 7–8, 2025, was a social engineering-based asset theft. Funds were laundered through two parallel paths:A direct path flowing straight into the Bitget exchange (Speed).An indirect path exfiltrated to external chains via the Meson bridge after internal swaps on MemeCore (Stealth).Additionally, circumstantial evidence links “Gathering Wallet 2” (0x1c00...5f) to specific social accounts and developer profiles, providing strong identification clues for law enforcement.Response Strategy ChainBounty has advised a phased response:Phase 1: Immediate reporting to law enforcement with key TxIDs and requesting asset freezing at Bitget.Phase 2: International cooperation review for cross-border tracking.Phase 3: Continuous monitoring of suspect addresses and community education on risk factors.Need help tracking stolen funds? Recovering stolen assets starts with professional tracking. If you have been targeted by a similar exploit, do not hesitate to reach out. ChainBounty’s Victim Relief Program provides the forensic evidence needed for law enforcement reporting and exchange cooperation.👉 Apply for Victim Relief Program: https://chainbounty.io/en/event/campaign-victim-support/(Disclaimer: This report is based on on-chain data and public OSINT. Identity-related content is circumstantial estimation. Final legal judgments must be confirmed through lawful procedures by law enforcement agencies.)

ChainBounty

ChainBounty

2 months ago
When Wallet Drains Can’t Be Explained as “User Error” Alone

When Wallet Drains Can’t Be Explained as “User Error” Alone

A recent case shared by a Trust Wallet user highlights an uncomfortable reality in Web3 security:not every wallet drain can be dismissed as a simple user mistake.This incident was accompanied by on-chain transaction data and a detailed account from the affected user, raising questions that deserve closer examination.Incident OverviewAccording to the user, their USDT balance was fully drained from their wallet and discovered only after the fact.Several key points stand out:Major assets had already been moved to cold wallets well in advanceThe user is on-chain literate and capable of independently verifying transactionsNo suspicious approvals, links, downloads, or configuration changes were identifiedDespite this, funds were transferred out of the wallet at a specific point in time.What the On-Chain Data ShowsBased on the shared transaction records,the stolen assets appear to have moved through a centralized exchange deposit address, followed by routing into a hot wallet.This flow suggests:A structured and potentially automated movement of fundsA post-drain path that complicates recovery and accountabilityThe need for careful documentation rather than assumptionsAt this stage, no definitive conclusion can be drawn regarding the root cause or responsible party.However, the incident cannot be credibly explained as “user error” alone.Why These Cases MatterWhen wallet security incidents occur, the default narrative is often predictable:The user must have made a mistakeA malicious approval was grantedA phishing link was clickedWhile many incidents do fall into these categories, not all of them do.Cases like this — where:the environment is controlleduser actions are limitedand on-chain flows are observablerequire independent analysis rather than dismissal.The Risk of Letting Incidents DisappearThe most dangerous outcome of wallet drain incidents is not the initial lossit is what happens afterward.When cases are not:documentedanalyzedor sharedthe same patterns quietly repeat.Without structured analysis, individual losses remain isolated stories instead of becoming signals that can prevent future harm.Why Independent On-Chain Analysis MattersChainBounty exists to ensure incidents like this do not vanish into silence.By treating wallet drains as investigative cases rather than personal failures,patterns can be identified, assumptions tested, and meaningful insights produced.Over time, this approach contributes to:better victim supportclearer risk awarenessstronger ecosystem accountabilityKey Information That Helps AnalysisFor users who have experienced similar incidents, the following details are critical:Timeframe and usage environmentFund movement paths and recipient walletsAny exchange involvement after the drainAs more cases are shared with consistent data points,individual incidents begin to form a clearer structural picture.Closing ThoughtsWallet security incidents should not end with blame or silence.Only through transparent reporting, on-chain verification, and collective analysis can the ecosystem reduce repeated harm.If you have experienced a similar wallet drain or need help documenting fund movements, you can report your case here:👉 https://community.chainbounty.io/

ChainBounty

ChainBounty

3 months ago