Ethereum

Unibot hacker moves $630,000 of stolen funds through Tornado Cash

The Unibot hacker has moved $630,000 of the stolen funds from the favored Telegram buying and selling bot via the sanctioned mixing protocol Twister Money, on-chain knowledge reveals.

In an Oct. 31 post on X(previously Twitter), the Unibot crew confirmed that the platform suffered a “token approval exploit” on its new router.

“We skilled a token approval exploit from our new router and have paused our router to comprise the problem,” Unibot stated.

The hack resulted in Unibot’s native UNIBOT token tanking by greater than 30% to as little as $32.94 earlier than recovering to $46.02 as of press time, in accordance with Crypto’s knowledge.

How Unibot was exploited

Whereas the buying and selling bot crew failed to offer details about the quantity stolen, studies from crypto safety agency Cyvers Alerts estimated that the hacker took round 345 Ethereum (ETH), equal to $630,000, from the platform.

Cyvers Alerts stated the attacker was funded by way of Fastened Float and that:

“The basis trigger [of the hack] seems to be the absence of enter for the ‘transferFrom’ operate to switch tokens which were granted approval to the contract.”

Nevertheless, the Unibot crew has tried to downplay the impact of the incident, assuring victims that they are going to be compensated and that their “keys and wallets are protected.”

“We’ll launch an in depth response after investigations conclude,” Unibot added.

Fund motion

Data from Debank reveals that the pockets related to Unibot exploiter first exchanged the entire stolen digital property, together with meme cash, for Ethereum by way of decentralized change platforms like Uniswap and 1inch.

Subsequently, the attacker then transferred all of those ETH by way of Twister Money in an try and obfuscate his transaction path.

The pockets solely has about $69 price of digital property left in its holding as of press time.

Posted In: Ethereum, Hacks



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button