🔤 Arrested the Wrong Ape?
🟠In one of the most embarrassing twists in #NFT crime history, U.S. law enforcement allegedly cuffed a Yuga Labs security researcher for a $1M Bored Ape heist… that he was investigating.
🟠According to #zachxbt , Sam Curry — ex-Yuga staffer — got flagged based on an OpenSea log tied to his home IP. Problem? He was doing whitehat work, analyzing a phishing site where the real attacker had left a private key inside JavaScript.
🟠Meanwhile, the actual scammer jacked 14 Bored Apes (then worth ~$86K each), laundered the funds through #TornadoCash , and vanished — until Zach reconstructed the trail and matched it to a deleted X account. Not bad for a chain sleuth.
🟠Now Zach’s calling on cops to chase the right wallet. He’s dropped addresses, suspect details, and on-chain proof. The only thing missing? Accountability from the system that turned a whitehat into a suspect.
🫰 Moral of the story? In Web3, the real threats hide in the code — not behind an airport boarding gate.