HomeAboutWhat is web3?FAQLicenseTwitterMastodonBlueskyInstagramThreadsRSSLeaderboardGlossaryContributeNewsletterStore

Archived tweet

Back

Tweet by BigWhale:

EMERGENCY UPDATE:

Edit: Update: We are now actively working with 
@SolidProof_io
  and 
@Cyvers_
  to further investigate this case, as well as with Binance, and other regulatory authorities, to freeze the hacker assets, trace them down, and have the funds returned to us.

Unfortunately, we suffered what seems to be a spoofing type or some other type of hack at about 2023-10-03 5:01:14 UTC, with one failed zApproveLoanGrant transaction, followed by a successful one - in addition to this, the 5% dev fees which were there in our dev / contract creator wallet were moved to an address - 0xe6964ba0483b24ca142515345d2dc58820992d7c

Our own dev / contract creator address also ends in d1c - which is not similar to d7c, but there have been transaction spoofing attacks similar to this we're aware of in the past, where similar addresses are used to "snoop attack" a transaction - although at this point in time details remain unclear as we await our team to regroup in a few hours from now to get to the bottom of this.

What we do know so far:
1. There was a failed zApproveLoanGrant originating from the 0xe6964ba0483b24ca142515345d2dc58820992d7c wallet, at around 2023-10-03 according to on-chain data and then a successful one, where they moved out all of the TVL from the contract to the said wallet.

2. Our dev / contract creator wallet, which is 0x71D9e22a39EC815da9b7819feD1434609f2fCd1C was also drained off its 5% dev fee funds which are collected there and usually left there, during this same time period.

3. As much of a shock and panic causing this is to every indiviudal investor here, as well as to us, we would like to make one thing clear: Not only are we going to use the fullest extent of the law to go after the person or persons behind this hack / attack, we will also use ALL OTHER MEANS NECESSARY - and we do have such resources at our disposal, to go after the ones who are behind this. (We work with assets within the Russian government directly, among other things, which at this point in time, we're OK to share with you all)

4. No matter what is the outcome of point no. 3 -- we will refund all investor funds down to the last cent, as more details of this attack emerge as we hold an emergency team meeting (a lot of our people work remotely in different time zones), we will move ahead in both directions - that is, the investigation, as well as the refunds that we now owe to all of our investors - that is you all.

5. Even as of now, we are offering a 20% bounty to whoever is behind this attack, to simply refund the funds, and it will end there. If not, not only are we going to use all of our legal (and other, governmental) resources at our disposal, we we do not take any responsibility for what governmental actions lead to (for the hackers).
@CyversAlerts 
Tweeted at 6:50 AM · Oct 3, 2023

Text is licensed under a Creative Commons Attribution 3.0 Unported License. All attribution can be found on the attribution page.

Source code | Contribute