nft Trader is suspected of being breached after several top non-fungible tokens (NFTs) were improperly transferred.
According to a post on
Wu gave an update on the address holder's chain message, denying that the P2P trading platform had been hacked and stating that they rescued the NFTs to return them.
The headline, who identified herself as a female “scavenger,” revealed the real hacker's address as 0x3dc115307c7b79e9ff0afe4c1a0796c22e366a47b47ed2d82194bcd59bb4bd46.
nft Trader also announced that it suffered an attack on old smart contracts on X (formerly Twitter), asking users to remove delegations via Revoke.cash to the following addresses:
- 0xc310e760778ecbca4c65b6c559874757a4c4ece0
- 0x13d8faF4A690f5AE52E2D2C52938d1167057B9af
The P2P trading platform is quite unknown to most nft traders. Its website shows that its CEO is John Pak, who works alongside co-founders Mattia Migliore and a person who uses the pseudonym “Bruckzr.”
On They identified all the stolen digital assets, which amounted to over $2 million, including 37 BAYC, 13 MAYC, 4 World of Women, and 6 VeeFriends.
In order for the hacker to return the NFTs, they sent some demands through their chain message, insisting that the owners should pay them a reward because “it's what they deserve”, asking for 10% of the value of the NFTs for their “work.” “. “
Don't send eth blindly'
The crypto community is skeptical of the lawsuits. Market analysts like ZachXBT They are warning traders not to “blindly send your eth.”
ZachXBT exchanged a few words with the exploiter, questioning the integrity of his word to return the assets.
The analyst estimated that if they were willing to return the stolen assets, they should consider including the Apes in the original wallet address or using a middleman for the process.
The founder of esports platform Kungama, Michael Padilla, known as TFG, was among the victims of the nft Trade exploit.
TFG took to
TFG acknowledged that it did not take necessary steps to protect its assets from the exploit, including revoking permissions on Etherscan.
According to the founder of Eden Block VC, who goes by the name Lior.eth On X, this is not the first time that nft Trader has been hacked, although the platform has not reported any other incidents before today's hack.
A nicknamed user bytes032.xyzwhich describes itself as a white-glove smart contract security services provider, described the hack as “ultimate degeneration.”
They shared a JavaScript report on NFTTrader's exploited smart contract, which showed how everyone was powerless to pause the contract because the platform team did not expose the _pause function with public visibility.
The _pause function is used in a smart contract to stop all activity if something goes wrong. If the _pause function is not public, only the original creator can pause the contract and prevent further loss of funds.
However, if the original creator is not aware of the issue or is not available at the time, the hacker could potentially exhaust all the funds before anyone can stop them.
However, there could be a light among the dark clouds that victims of the nft Trader hack saw, as BAYC founder Greg Solano offered to pay 10% of the reward the exploiter requested for the NFTs to be sold. returned to their rightful place. owners.
Hacker returns nft without reward
In a notable twist, the exploiter has voluntarily returned a World of Women (WOW) nft free of charge, according to etherscan data. After returning the stolen WOW nft, the hacker also return a BAYC and a VFT to their legitimate owners, without any additional payment requirement.
This unexpected twist has added a sense of unpredictability to the ongoing saga, leaving the community stunned and unsure about the hacker's motives.