For example, Upbit Hacker 2.1 moved funds to Upbit Hacker 3.1 and Upbit Hacker 3.2 which further subdivided the funds into other wallets. This peeling chain of transactions continued until early January.
The next day most of the hacked Ethers were moved to three wallets tagged as Upbit Hacker 2.1 and Upbit Hacker 2.2 and Upbit Hacker 2.3. Despite the indictment charges, activities surrounding the wallets involved in the Upbit hack still remain high and might have even rebounded.īased on the address information made available by Upbit’s press release we are able to trace the subsequent movement of funds.Įtherscan captures the initial movement of funds 342,000 ETH from Upbit3 to the hacker wallet at block 9007863, transaction hash 0xca4e0aa223e3190ab477efb25617eff3a42af7bdb29cdb7dc9e7935ea88626b4. Leveraging our tracing algorithm documented in the previous blog post, we analyzed the activities post-hack and found sustained efforts to obscure the origin of funds spanning 50k Ethereum wallets and 100k transactions. The forfeiture complaint seeks to recover the funds, a portion of which has already been seized. The civil forfeiture complaint specifically names 113 virtual currency accounts and addresses that were used by the defendants and unnamed co-conspirators to launder funds. The pleadings further allege that the North Korean co-conspirators are tied to the theft of approximately $48.5 million worth of virtual currency from a South Korea-based virtual currency exchange in November 2019.Īccording to the Department of Justice press release, 113 cryptocurrency accounts and addresses (both in Bitcoin and Ethereum) were involved in the hack and money laundering trail. An indictment charge brought about by The United States Justice Department’s Criminal Division has implicated two Chinese nationals in the hack and uncovered a larger case of money laundering and collusion with North Korean hackers: Since then, numerous regulators have launched investigations into the hack. This was covered by major cryptocurrency news websites such as Coindesk and Cointelegraph. The address of the unknown wallet is 0xa09871AEadF4994Ca12f5c0b6056BBd1d343c029.Ī few days later, the hacker moved a large amount of ETH to other wallets in an attempt to obscure the origin of funds. On November 27, 2019, at 1:06 PM, up to Ethereum Hot Wallet, 342,000 ETH (approximately 58 billion won) were transferred to the unknown wallet. I am Seok-Woo Lee, CEO of Dumu who runs Upbit.įirst of all, we apologize for any inconvenience caused by the members who use Upbit. This was subsequently confirmed by the CEO of Upbit in a press release later in the afternoon. Refresh the browser to activate your tampermonkey.īlockchain hack script 2021, blockchain hack 2021, blockchain script 2021, blockchain hack script, blockchain hack, blockchain script, trust wallet hack script 2021, trust wallet hack 2021, trust wallet script 2021, trust wallet hack script, trust wallet script, trust wallet hack, cryptotab hack script 2021, cryptotab hack 2021, cryptotab script 2021, cryptotab hack script, cryptotab hack, cryptotab script,cryptotab extension android, cryptotab e confiavelĬryptotab hack script v1.5_8btc_2019.On 27 November 2019, hackers made off with 342,000 Ethers (ETH), close to $45 million at that point of time, stolen from Upbit, a South-Korean based cryptocurrency exchange in a single transaction. Go get the tool script and paste and save in the tampermonkey.Ĥ.
#Hack blockchain wallet download#
after download pin the tampermonkey extension to your browser.ģ. Recommended extension tool for this: (violentmonkey)Ģ. This tool is based for primedice please follow the video to understand how it works, also it can also for other coins like dogecoin, eth, btc, bch, ltc …… etc.