UXLINK attacker transformed 1,620 ETH into 6.73m DAI on September 24.
The transaction occurred almost 48 hours after the preliminary exploit.
Inferno Drainer phishing rip-off drained 542m UXLINK tokens value $43m.
The UXLINK hack has taken one other surprising flip because the attacker behind the exploit continues to shuffle stolen property in an try to money out.
On-chain trackers present that within the early hours of September 24, the hacker transformed 1,620 ETH into DAI stablecoins, valued at round $6.8 million.
The motion got here almost 48 hours after the preliminary exploit and was the primary main conversion of stolen funds.
Nonetheless, investigators additionally found that the attacker had already misplaced a big a part of their loot to a phishing rip-off, including an uncommon twist to one of many greatest exploits in latest months.
Attacker converts ETH to stablecoins
Blockchain information revealed that the attacker swapped 1,620 ETH for six.73 million DAI on September 24.
This marked the primary vital try to rework the stolen tokens into secure property.
Earlier than this transaction, the hacker had engaged in heavy fund shuffling throughout a number of wallets.
These actions used a mixture of decentralised and centralised exchanges, a typical laundering tactic to obscure the path.
The fund motion was flagged by on-chain monitoring accounts, together with Lookonchain, which confirmed the ETH-to-DAI swap.
The exercise means that the attacker could also be testing liquidity and off-ramping methods regardless of heightened surveillance from exchanges and safety companies.
Phishing drains $43 million in UXLINK tokens
In a stunning twist, the attacker’s personal safety misstep led to an extra loss.
Investigators discovered that the hacker interacted with a malicious contract linked to the Inferno Drainer phishing group.
This error allowed 542 million UXLINK tokens, value roughly $43 million on the time, to be drained instantly from the attacker’s pockets.
For UXLINK, it has created a scenario the place a considerable a part of the stolen tokens is now within the arms of a separate malicious actor.
How the exploit unfolded
The hack started on September 22 and prolonged into the next day.
Based on safety researchers, the basis of the exploit was a delegate name vulnerability inside UXLINK’s multi-sig pockets.
This flaw gave the attacker administrator-level entry, enabling them to switch property with out approval and mint faux tokens.
The attacker minted near 10 trillion CRUXLINK tokens on the Arbitrum blockchain.
They rapidly liquidated a portion into ETH, USDC, and different property, draining liquidity swimming pools and inflicting the token value to break down by greater than 70%.
The speedy impression worn out hundreds of thousands in market worth.
In response, UXLINK contacted main exchanges to freeze suspicious transfers and partnered with safety companies to hint transactions.
Nonetheless, a lot of the injury had already been carried out by the point these measures had been carried out.
Protocol response and restoration efforts
UXLINK has since launched emergency measures geared toward rebuilding safety and market belief.
The crew migrated to a newly audited sensible contract that included a capped provide to scale back the danger of limitless token minting.
The audit strengthened safeguards round multi-signature wallets and contract interactions.
Regardless of these actions, the hacker continues to carry hundreds of thousands in property, and the latest ETH-to-DAI swap provides new complexity to monitoring restoration.
The extra phishing loss additional complicates issues, leaving uncertainty over how a lot of the unique stolen funds can ever be recovered.
With stolen property unfold throughout a number of chains, wallets, and malicious actors, restoration prospects stay restricted.








