It’s worse than we thought.
After our initial investigation, ErgoBTC uncovered even more lost funds from Crypto.com.
Another 444 BTC: ~$18.7M.
That brings the total value lost up to $33.7M, and moves Crypto.com up to position 15 on the leaderboard.
And still no acknowledgement of any loss from Crypto.com.
“All funds safe” ???
They’re lying to you.
We noted this abnormally large withdrawal from @cryptocom's payout wallet bc1q7cyrfmck2ffu2ud3rn5l5a8yv6f0chkp0zpemf via
Shortly after, several hundred withdrawals are consolidated into 4 outputs for 67.75 BTC.
The 271 BTC then make a series 24 or 25 BTC deposits to a well known BTC tumbler. 173 BTC at address bc1qk8wlwypvvr6v5lmsngg5a248k2a9cgrsrw5jsq is likely associated with the hack, has not yet been sent to the tumbler.
This tumbler has been commonly used in hacks attributed to the DPRK Lazarus Group and more recently in the attempted laundering of BTC from to this summer's Darkside ransomware activity.
These findings double the damage from our initial investigation, and increase the pressure on Crypto.com to come clean about what happened.
At least the CEO is happy…
Crypto.com should stop shitposting and tell their users where their money has gone.
Our original article continues below.
Another CEX rekt, but they have yet to admit it.
The first message from crypto.com about the attack was at Jan-17-2022 04:44 AM UTC, stating that:
”We have a small number of users reporting suspicious activity on their accounts. We will be pausing withdrawals shortly, as our team is investigating. All funds are safe.”
~8 hours later, at 12:17, Crypto.com doubled down on their statements, with a tweet that said:
”Earlier today a small number of users experienced unauthorized activity in their accounts. All funds are safe.”
Later that day, at 18:44 +UTC, hundreds of users crypto.com wallets were drained. Funds were not safe.
How did the attacker bypass users 2FA, and their email withdrawal approvals?
If, as CEO @Kris_HK also claimed “all funds are safe”
Certik wrote that:
The total loss is around 4,836 ETH and 282 users' wallets have been affected by the hack.
The stolen ETH was sent to Tornado Cash and the address has been inactive since Jan-18-2022 01:21:13 AM +UTC.
The hacker bypassed existing 2FA, they bypassed the withdrawal whitelist, could this attack really have come from outside?
When one of the most recognisable crypto brands falls victim to an exploit, it damages the reputation of the entire industry. Centralised exchanges rely on retail investors, who will be easily put off by events such as this.
Will crypto.com ever admit that funds were not safe?
Surely a $15M recompensation plan is better than trying to pretend that nothing happened.
Or maybe they will quietly refund the affected users, rather than announce anything official.
We await the official post-mortem from crypto.com.
REKT serves as a public platform for anonymous authors, we take no responsibility for the views or content hosted on REKT.
donate (ETH / ERC20): 0x3C5c2F4bCeC51a36494682f91Dbc6cA7c63B514C
REKT is not responsible or liable in any manner for any Content posted on our Website or in connection with our Services, whether posted or caused by ANON Author of our Website, or by REKT. Although we provide rules for Anon Author conduct and postings, we do not control and are not responsible for what Anon Author post, transmit or share on our Website or Services, and are not responsible for any offensive, inappropriate, obscene, unlawful or otherwise objectionable content you may encounter on our Website or Services. REKT is not responsible for the conduct, whether online or offline, of any user of our Website or Services.
you might also like...
Deribit has lost $28M from their hot wallets on the Ethereum and Bitcoin networks. As with all cases of “compromised keys”, only insiders can say for certain what caused the breach, but we have our usual suspects…
Nothing to see here… Another CEX rekt, $7.94M stolen. The USP of centralised finance grows smaller by the day.
Four cases in ten days. $140M gone from Vulcan Forged. "Compromised keys" are so hot right now.