A prolific blockchain security researcher under the name Nick L. Franklin, and investigator of Smart Contract Hacks, suspected of being involved in the $50 million hack in October, was carried out by the infamous North Korean Hacking Collective Bros. Zaro Group.
A fellow security researcher was warned of suspicious behavior by Anton Bukov of a distributed Exchange 1inch and began digging into the messaging history of Franklin’s (now deleted) Telegram account.
Read more: Radiant Capital’s $50 Million Crypto Hack highlights Defi’s multisig dependencies
For more than a year, Franklin’s Handle has been consistently active in a crypto-security-centric telegram group. Even the low dollar value hacks are quicker by linking to the root cause analysis of smart contract exploits that are often published in X profiles.
he”We analyzed all major blockchain hacks. ”
Bukov’s alert claimed he caught Franklin trying to send a bug report in the form of an app, and then other crypto security experts looked into Franklin’s past posts.
Taylor Monaghan from Metamask maintains a GitHub repository with details of addresses linked to countless Lazarus Group Hacks, pointing to previous warnings that security researchers and their communities are particularly targeted.
She also highlighted repeated, increasingly desperate telegram messages about radioactive capital before the hack.
However, when working with Zeroshadow investigator Tanuki42, a big, obvious release occurred. The address used by Franklin to request a testnet token matches one of the addresses identified in the Monaghan repository used in testing the $50 million radiant hack.
Read more: North Korean hackers pretending to be exposed developers in “I Hate Kim Jongun” test
Franklin responded to Bukov’s first post, explaining that his “telegram and personal site have been compromised,” then asked to “delete this post as soon as possible.”
Franklin has been there He failed to respond to various requests to publicly sham North Korea’s supreme leader Kim Jong-un.tongue (though apparently effective) screening methods are popular among the rightfully questionable code crowd.
Since the glowing capital attack, North Korean hackers were able to use similar attack vectors to fleece $1.5 billion worth of ether from centralized exchange Bybit last month.
Heading towards the end of last year, the activities on the decentralized leveraged trading platform hyperliquid also sparked suspicions as accounts using the funds of the sparkling hack appear to be testing the vulnerability.
But today’s revelation comes against the background of Hyperliquid’s latest stress test. This is because another “whale” tried to keep the platform’s high-definition provider Vault holding the bag.
Considering that similar tactics paid off on the song $1.8 million just two weeks agothe high lipid validator went into this time and decided to manually override the price of the token in question.
Discover more from Earlybirds Invest
Subscribe to get the latest posts sent to your email.