November 27, 2024: Our X/Twitter account (@threadreaderapp) got hacked and unrolls aren't working right now. We appreciate your patience until this is resolved.
$ENM hacker used Tornado to fund his address a week ago. Right after that, he claimed $UNI tokens for one of arbitrage contracts and withdrew them to himself in another tx by simulating arb. In theory, this claim could be a hack, which is why a mixer might have been used.
But it was necessary to guess without source code that arb function would help to withdraw $UNI and then use it in a certain way. Because of this, I’m more confident that it was the creator of the arb contract himself - 0x2d033fe
My hypothesis based on on-chain data:
0x223034e = $ENM hacker
0x762bfbd = the contract from which the hacker withdrawn $UNI
0x2d033fe = address of creator of 0x762bfbd
0x2f14f72 = address which funded creator (very likely one owner)
The arbitrageur, in turn, received funds from two addresses funded from 0x2f14f72. This gives hope for the identification of a possible culprit, because this address used Huobi, Bitmax, Hotbit and 1inch. For these projects to help, first contact the police. GL
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Today, we’re launching The Alpha Challenge, a two-week experiment for the crypto community to test their on-chain analysis skills and for Wintermute to hire top talent
We've also collaborated with six companies to provide exciting awards for those who will not be hired👇
2/6
We developed this idea because using case studies is our (and my personal) approach to hiring for research-related roles
The feedback was always excellent, so it would be interesting to check it on a larger scale
That’s why we're posting 10 case studies instead of a few
3/6
Think of this challenge as a simpler way to check your on-chain skills because if you collect 60+ points, then you’re in a good position to receive awards from our frens
If not, you can read writeups after the challenge ends and learn something new (similar to CTFs)
Alright, I've been sitting on this news all day, but let's look at the @BaldBaseBald deployer.
This is definitely someone from Alameda, but I don't think we can safely say that this is @SBF_FTX (even though he is a psycho)
Let's go👇
2/12
I started the morning by making sure that he is not a Coinbase insider, despite the mention of the address (0xccFa05) as the largest holder on DeFi governance forums
Upon closer inspection, one could find that cbETH was not minted by Coinbase, but was bought on Uniswap v3
3/12
Despite the incredible amount of funds the address held, the leading exchanges used were Binance, FTX, Coinbase
Nothing out of the ordinary, right?
It could be anyone, so I went to see if any previous addresses were associated with exchange accounts
For more than a week, someone has been trying to carry out a governance attack on @SwerveFinance (a dead Curve clone) and steal $1M+ in various stablecoins
Let’s figure out why he didn’t succeed and also find out who the exploiter is👇