MultiversX Tracker is Live!

A Deeper Trace Analysis of what the FTX Hacker account is actually doing: Tons of swaps and trying to exit

All Cryptocurrencies

by COINS NEWS 86 Views

Intro and TL;DR

You've probably seen the news about the FTX hacker account.

There is so much going in this account that anything you think is happening is probably done to hide his tracks. Dozens of tokens and DeFi swap have been used. Some tokens have been sent over Polygon PoS and Bitcoin bridges. PAXG seemed to be his favorite token by far for token laundering before that was blocked. Since then, he has created at least 11 addresses trying to escape everywhere.

These are all the tokens he's been swapping to:

stETH, USDT, LINK, USDP, LDO, WBTC, SUSHI, YFI, 1INCH, UNI, LINK, MATIC, PAXG, SHIB, AAVE, APE, PAXG, SNX, renBTC, WMATIC

I wouldn't trust anything posted by the media or random Twitter posts unless they're citing experts. This should be done by a professional trace analyzer because they have specialized tools for tracing this.

I do not believe the hacker is related to the Bahamian government. These transactions are much too random, chaotic, and swap for too many random token. If it is the Bahamian government, then they're totally letting SBF create chaos with it.

AFAICT, the hacker is not trying to sell ETH for BTC. I'm guessing he's trying to exit using whatever exchange or swap that hasn't yet blacklisted him. PAXG was the weak link on Nov 12. It's now $60M worth of ETH to WBTC and renBTC, which he's using to exit to BTC mainnet.

Update: ZachXBT mentioned that there are multiple groups with their hands in the cookie jar. There are several whitehat addresses, but this "0x59...32b" address is almost certainly a blackhat. That's why there is so much confusion about whether it's the Bahamian government or the group that Kraken knows. There are multiple groups working on different addresses.


Here's my best attempt at an amateur trace analysis

There are at least 11 FTX hacker addresses, most of which were created on the Nov 12. One last one was created today.

Main address: https://etherscan.io/address/0x59abf3837fa962d6853b4cc0a19513aa031fd32b

  • History
    • This one's been around for 8 days since Nov 12
    • It's been growing ETH. Started with 160k ETH. Grew to 200k ETH on Nov 15 and then to 250k ETH on Nov 19. 50k ETH has been swapped or transferred out today.
    • On the first day, it was sent out to 26 different addresses.
    • Apparently, he found out that PAXG swaps were the weakest link and was able to swap to $60M of it.
    • Since then, it has stayed quiet (other than for shitcoin transfers) until today. There was 1 lone Tx on Nov 15 for token approval for DAI on CoW Protocol
    • Suddenly today, it has become active again
  • Current balance
    • 200k ETH, down from 250k ETH yesterday. that's a difference of about $60M USD worth of ETH that went elsewhere.
    • $14M of PAXG
    • 70+ random shit tokens. Some were sent by others to insult the owner. Some were swapped into by the owner.
  • Nov 12 activity
  • Nov 20 activity (today)

Side addresses

There are at least 6 other accounts people have identified. Most of these had $2-10M worth of ETH before being transferred to other addresses and emptied.

The tokens also exist on many different networks:

Shit token transfers to famous people's addresses

You might have noticed that the accounts are sending lots of random shit tokens like Twitter World Cup Inu, FTTCash, and FTX Sucks to random famous people's accounts. These are actually spoofed tokens: https://medium.com/etherscan-blog/spoof-tokens-on-ethereum-c2ad882d9cf6. You can tell because the account initiating the transfer is not the FTX Hacker account.

Here's an example of one

Anyways, I'm just one person tracing this for 2 hours. I'll leave it to the professionals like Chainanalysis to do a better job.

One of the takeaways is that even if you blacklist one account, it's hard to actively trace the other accounts they're going to and actively block them.

Update: ZachXBT has a great thread on this he posted an hour ago. Covers a lot of same topics, but also includes some details I missed, like how there were multiple parties sending to different accounts.

Update 2 - Spoofed tokens: The sent shitcoins are spoofed tokens meant to make it look like the FTX Hacker sent them. But they're actually smart contracts designed so that someone else could transfer them while tricking the block explorer. The way you can tell is that the FTX Hacker account is not the address initiating the token transfer, and I should've noticed that: https://medium.com/etherscan-blog/spoof-tokens-on-ethereum-c2ad882d9cf6

submitted by /u/Maleficent_Plankton
[link] [comments]
Get BONUS $200 for FREE!

You can get bonuses upto $100 FREE BONUS when you:
πŸ’° Install these recommended apps:
πŸ’² SocialGood - 100% Crypto Back on Everyday Shopping
πŸ’² xPortal - The DeFi For The Next Billion
πŸ’² CryptoTab Browser - Lightweight, fast, and ready to mine!
πŸ’° Register on these recommended exchanges:
🟑 Binance🟑 Bitfinex🟑 Bitmart🟑 Bittrex🟑 Bitget
🟑 CoinEx🟑 Crypto.com🟑 Gate.io🟑 Huobi🟑 Kucoin.



Comments