Recently, the cryptocurrency exchange BTCTurk announced that it was hacked, with over $48 million in funds flowing out abnormally from multiple on-chain hot wallets. The Beosin security team analyzed this incident and tracked the funds, sharing the results as follows:
The following hot wallet addresses have been found to have transferred funds:
0xde2faca4bbc0aca08ff04d387c39b6f6325bf82a
0x2cea0297bfb1b55ff37126b677d78e2b1fd2e856
0xb5a46bc8b76fd2825aeb43db9c9e89e89158ecde
Involving chains such as Bitcoin, Ethereum (ETH), Avalanche (AVAX), Arbitrum (ARB), Base (BASE), Optimism (OP), and Polygon (POL).
Currently detected related hacker transit addresses are as follows:
0xa041feb3a8297c5689fee180083164a061a17fd6
0xb4b537626e21df5386cf167d1e654b38785056cc
0x7d91d1ebeba91257733a523409125aedac5d8b6e
The hacker's sedimentation addresses are as follows:
0x0fe41fe8786329fb6bd8f2baa73aa55e770f0951
0x95ab53305bc71d0e6e2d46f2e62690599cbc87fc
0xddfa0884f32d0d210597a996060fbdb5b068b0ea
bc1q3xgyvmfk6mw6zvhjklsw7v8wl2dk0xtm35ulut
Using the Beosin Trace tool to track the stolen funds, the following flow charts of the main stolen funds on the EVM and Bitcoin chains can be obtained:
Beosin Trace EVM chain fund analysis chart
Beosin Trace Bitcoin chain fund analysis chart
Currently, the reason for the attack on BTCTurk's hot wallet has not been disclosed. Multiple aspects need to be investigated for evidence, including the internal operational security of the exchange, the security of signing devices, mnemonic management, and the security of the signing environment. Similar security incidents at exchanges have occurred multiple times before.
Exchange security remains a significant challenge in the Web3 ecosystem, requiring continuous efforts and cooperation from exchanges, security companies, regulatory and law enforcement agencies. Beosin Trace has added the hacker-related addresses from this incident to the blacklist and will continue to track them.