On the move: FTX hacker splits nearly $200M in ETH across 12 wallets

CointelegraphОпубликовано 2022-11-22Обновлено 2022-11-22

Введение

The hacker behind the theft of more than $447 million of crypto from the crypto exchange FTX has been again spotted moving their ill-gotten funds. 

The hacker behind the theft of more than $447 million of crypto from the crypto exchange FTX has been again spotted moving their ill-gotten funds. 
According to Etherscan data, between 4:11 to 4:17 pm UTC on November 21, the attacker moved a total of 180,000 Ether (ETH) across 12 newly created wallets — each receiving 15,000 ETH. The total amount moved totaled $199.3 million at current prices.

Recent transactions from wallet labeled "FTX Accounts Drainer" — Source: EtherscanAt the time of publication, the ETH has not moved from any of the 12 wallets.
Some in the crypto community suggest the attacker may be planning to subdivide it into smaller and smaller amounts in order to confuse investigators, a process known as “peel chaining,” or they may be planning to use a mixing service at some point to obscure which coins are theirs.
Meanwhile, some Ethereum users appear to have sent coded messages to the hacker asking for a share of the loot.
One user registered the Ethereum Name Service (ENS) domain name, “ftx-rekt200k-pls-help.eth” to express that they have lost money from the FTX collapse and to ask for a reimbursement from the hacker.
They sent 21 transactions of 0.000001 Ether to the hacker’s address in an attempt to get noticed.
Another user was even more creative. They registered the ENS domain, “pleasecheckutf8data.eth” and sent 12 transactions of 0.0001 ETH or less to the hacker’s wallet address.

An encoded message asking the FTX Accounts Drainer for a share of funds. Source: EtherscanInside each transaction was a UTF8 encoded message that said “Please send me 100k~, I have medical bills to pay and visit the USA this coming December. I can't walk properly, and have aggressive muscle issues. Please help! I lost most of my money on FTX.”
The message also contained a link to an Imgur post which the user claimed was proof of their medical appointment.
The hack occurred on Nov. 11, the same day that FTX filed for chapter 11 bankruptcy protection.
On November 20, the attacker transferred 50,000 ETH to a separate wallet and then converted it to Bitcoin using two separate renBTC bridges.
As of today, the hacker is the 40th largest holder of ETH.

Похожее

The Real Battlefield of AI Lies in the 'Dark Forest'

The article "AI's Real Battlefield is in the 'Dark Forest'" discusses the shifting dynamics in the global AI landscape, contrasting the strategic directions of Chinese and U.S. AI developers. Chinese companies like Alibaba (with its "HappyHorse" video model), ByteDance (Seedance 2.0), and Kuaishou (Kling 3.0) have taken the lead in text-to-video generation, surpassing OpenAI’s now-discontinued Sora. These models are deeply integrated into their parent companies’ content ecosystems (e.g., Douyin, Kuaishou), serving to reduce content creation costs and enhance user engagement rather than operating as standalone profit centers. In contrast, U.S. firms are pivoting toward high-stakes enterprise and security applications. Anthropic’s Claude Mythos model demonstrates advanced capabilities in autonomously discovering and exploiting software vulnerabilities, prompting concern at the highest levels of U.S. financial and governmental institutions. OpenAI responded with its own GPT-5.4-Cyber, signaling a strategic shift from consumer-facing products to enterprise-grade tools focused on cybersecurity and programming. The divergence is attributed to fundamental differences in resources and market structures. U.S. companies, backed by vast computational resources (e.g., Amazon and Google supply Anthropic with substantial funding and TPU access), can pursue deep, specialized R&D in high-value B2B sectors. Chinese firms, facing significant compute power constraints and a less mature enterprise SaaS market, have found success by leveraging their massive consumer platforms and optimizing for cost-efficiency. The article warns that the AI race is entering a "dark forest" phase—a reference to competitive dynamics where cybersecurity capabilities could determine digital sovereignty. While Chinese models like Zhipu AI’s GLM-5.1 show promise in narrowing the gap in coding proficiency, the author stresses that achieving parity in security-critical AI will require asymmetric strategies, including greater investment in coding models, adaptation to domestic hardware, and exploring international markets in the Global South.

marsbit1 ч. назад

The Real Battlefield of AI Lies in the 'Dark Forest'

marsbit1 ч. назад

Торговля

Спот
Фьючерсы
活动图片