London Escorts sunderland escorts asyabahis.org dumanbet.live pinbahiscasino.com www.sekabet.net olabahisgir.com maltcasino.net faffbet-giris.com asyabahisgo1.com dumanbetyenigiris.com pinbahisgo1.com sekabet-giris2.com www.olabahisgo.com maltcasino-giris.com www.faffbet.net www.betforward1.org betforward.mobi www.1xbet-adres.com 1xbet4iran.com www.romabet1.com www.yasbet2.net www.1xirani.com romabet.top www.3btforward1.com 1xbet 1xbet-farsi4.com بهترین سایت شرط بندی بت فوروارد
Sunday, April 27, 2025

Hacker falls sufferer to phishing rip-off after exploiting ZkLend for hundreds of thousands


ZkLend, a decentralized lending protocol constructed on Starknet, has confirmed that the hacker answerable for its February exploit misplaced a good portion of the stolen funds to a phishing rip-off.

In an April 1 publish on X, ZkLend revealed that the attacker tried to launder 2,930 ETH, value round $5.4 million, by crypto mixer Twister Money.

Nonetheless, as an alternative of utilizing the reliable platform, the hacker mistakenly interacted with a malicious phishing website: tornadoeth[.]money. In consequence, one other occasion efficiently drained the ETH.

Blockchain analytics agency Lookonchain corroborated ZkLend’s findings, confirming the lack of 2,930 ETH as a result of phishing incident.

Apparently, the hacker later despatched an on-chain message to ZkLend’s deployer handle, admitting the blunder. Within the message, the attacker wrote:

“I attempted to maneuver funds to Twister however used a phishing web site. All of the funds have been misplaced. I’m devastated and sorry for the havoc and losses precipitated. I don’t have the cash anymore.”

The hacker urged ZkLend to pursue the phishing website operators as an alternative.

‘No connection’

This surprising flip has fueled hypothesis that the unique hacker and the phishing scammers is perhaps linked, although no proof has surfaced to assist that concept.

In the meantime, ZkLend said that the phishing web site seems to have been lively for over 5 years. The venture furthered that no concrete proof hyperlinks the phishing operators to the unique hacker.

Nonetheless, pockets addresses tied to the phishing website have been added to ongoing fund-tracing efforts.

The group additionally famous elevated exercise from wallets related to the hacker. Safety consultants, centralized exchanges (CEXs), and related authorities had been monitoring these actions in real-time.

ZkLend was exploited in February, with blockchain safety agency Cyvers estimating the loss at roughly $9.5 million.

The protocol supplied the attacker a ten% bounty in the event that they returned the remaining. Nonetheless, the hacker ignored the proposal and stored the funds, prompting ZkLend to accomplice with safety groups from Starknet, StarkWare, and Binance in a broader fund restoration effort.

XRP Turbo

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles