Skip to content

10% White-Hat Bounty Window Closing for $160M Wintermute Hacker

  • 2 min read
  • Latest

The clock is ticking for the Wintermute hacker to return $160 million in stolen funds, after which the London-based company will take legal action.

Following the Wintermute attack on Sep. 20, 2022, the company reached out to the hacker on Etherscan after crypto sleuth ZachXBT tracked down wallet addresses containing the stolen funds.

“We want to cooperate with you and resolve this matter immediately. Accept the terms of the bounty and return the funds within 24 hours before Sep. 22 UST by 23:59 while we can still consider this a white-hat event for a 10% bounty as offered. If the stolen funds are not returned by the deadline, you will force us to remove our bounty offer and white-hat label; we will then proceed accordingly with the appropriate authorities and avenues,” the company said.

At press time, the hacker had not responded, according to Etherscan.

Human error resulted in the hack

On the day of the hack, Wintermute CEO Evgeny Gaevoy said that the hacker exploited weaknesses in a domain service called Profanity, which takes the long strings of letters and numbers used in a wallet address and turns them into so-called “vanity addresses.” Vanity addresses are personalized human-readable wallet addresses that make transactions on Ethereum simpler. The hacker was able to generate all the combinations of keys or passwords for a single vanity address, enabling them to peek into the account balances of the address. Wintermute used one of Profanity’s additional features to reduce transaction costs.

Profanity’s vulnerabilities were first highlighted in a Sep. 15, 2022 blog post by 1inch, a decentralized exchange aggregator. Wintermute responded by blacklisting Profanity accounts to prevent their liquidation but missed one through human error. The profanity account was linked to the company’s decentralized finance wallet. The hacker then exploited that single account to drain $120 million worth of
Read Full Article…