Loss exceeds 10 million USD, analysis of the UXLINK security incident vulnerability and tracking of stolen funds.

robot
Abstract generation in progress

On September 23, UXLINK was attacked due to the leakage of the Multi-signature Wallet Private Key, with the attacker minting UXLINK Tokens and selling for a profit of over $11.3 million. The Beosin security team conducted vulnerability analysis and fund tracking for this attack incident and shared the results as follows:

####Event Review

The UXLINK project contract was compromised due to a Private Key leak, resulting in the attacker's address being added as a Multi-signature Wallet for the contract while removing the other existing multi-signature accounts. Additionally, the contract's signature threshold was reset to 1, allowing the attacker's address to execute contract operations with just their signature, giving the attacker complete control over the contract. Subsequently, the attacker began minting UXLINK Tokens and selling them for profit.

The attacker minted tokens 5 times, and three token receiving addresses 0xeff9cefdedb2a34b9e9e371bda0bf8db8b7eb9a7, 0x2ef43c1d0c88c071d242b6c2d0430e1751607b87, 0x78786a967ee948aea1ccd3150f973cf07d9864f3 exchanged UXLINK tokens for ETH and DAI through swapping, transferring, and cross-chain, storing them on the ETH chain address.

####Stolen Funds Tracking

The following is an analysis by the Beosin security team of the main flow of funds in this security incident:

#####ARBITRUM Chain

Hacker address: 0x6385eb73fae34bf90ed4c3d4c8afbc957ff4121c

Stolen address: 0xCe82784d2E6C838c9b390A14a79B70d644F615EB

The stolen amount is approximately: 904,401 USDT

After stealing the funds, the hacker exchanged 904,401 USDT for 215.71 ETH and transferred the ETH to the Ethereum address 0x6385eb73fae34bf90ed4c3d4c8afbc957ff4121c through cross-chain.

#####Ethereum Chain

Hacker Address: 0x6385eb73fae34bf90ed4c3d4c8afbc957ff4121c

Stolen addresses: 0x4457d81a97ab6074468da95f4c0c452924267da5, 0x8676d208484899f5448ad6e8b19792d21e5dc14f, 0x561f7ced7e85c597ad712db4d73e796a4f767654

Stolen funds approximately: 25.27 ETH, 5,564,402.99 USDT, 3.7 WBTC, 500,000 USDC

After stealing the funds, the hacker exchanged 5,564,402.99 USDT and 500,000 USDC for 6,068,370.29 DAI, and finally consolidated the funds to the address 0xac77b44a5f3acc54e3844a609fffd64f182ef931, which currently has a balance of: 240.99 ETH, 6,068,370.29 DAI, and 3.7 WBTC.

The main capital flows between Ethereum and Arbitrum are shown in the figure below:

According to Beosin Trace analysis, all stolen funds are still stored in multiple addresses of the attacker.

Beosin Trace has blacklisted all addresses related to the attacker and is continuously tracking them. Below is the current balance situation of the addresses related to the attacker:

ETH-0.48%
DAI0.03%
WBTC0.03%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)