Web3 Hackers Evolving
Our story begins two and half weeks ago, and the twist in this story has created a new chapter in the evolution of Web3 hackers. On September 21st, a storage vault owned by Shezmu was compromised. As a result, approximately $4.9 million USD worth of ShezUSD were stolen, and Shezmu later confirmed that its stablecoin vaults had been drained.
https://x.com/shoucccc/status/1837228053862437244
Tracking the Hackers Footprint
Shezmu contacted the hacker with an on-chain message, urging him to return the funds in exchange for a 10% bounty reward, ”in exchange for treating this as a white-hat incident”. Pretty standard. While speaking softly, Shezmu also ‘carried a big stick’ by stating “…your wallet is Linked to a KYC exchange”. Whenever hackers make this mistake, it allows tracking their footprints, eventually leading to their real world identities, and potentially allowing the victim to pursue legal actions. In the past, this leverage caused many hackers to pay (back) for their mistakes, giving up all the stolen funds in order to avoid facing the severe legal consequences of their actions.
The Twist
Just recently, spherex rescued more than $550k USD worth of crypto assets exactly this way. Once you get to the hacker’s real world identity, it’s game over almost instantly. But our story is about to get a twist. A few hours later, the hacker replies. Good news, he’s open to a discussion. Bad news, only on his terms - retaining 20% of the funds for himself (~$1 million), and the surprising twist: “btw I have no problem with that KYC”. The main leverage Shezmu had, was gone.
Not an Isolated Incident
In recent years, more and more attackers have stopped using anonymization tools such as TornadoCash, switching to fabricated or stolen KYC accounts. Using a KYC account evades a prominent indicator used by many security monitoring firms that look for TornadoCash funded accounts. As this trend grows, those security firms will lose one of their key indicators for identifying potential attacker wallets. After losing the ability to predict attacks by breaking them down into phases, one of the main early warning signs, monitoring companies will lose yet another indicator.
Conclusion
About the author
Maor has many years of experience in software development, QA, cyber security and more. Before joining SphereX as an analyst, Maor served 10 years in the Israeli intelligence doing software development, QA, research and leading teams, and 4 years in Kayhut as R&D group leader and product management.