ZachXBT: Prisma attackers suspected of multiple attack incidents, personal information has been obtained
ChainCatcher news, on-chain detective ZachXBT released an investigation regarding the suspected $11.1 million exploit of Prisma by 0x77 (Trung) and several vulnerabilities involved. On March 28, 2024, the Prisma team observed a series of transactions on the MigrateTroveZap contract, resulting in a loss of 3,257 ETH (approximately $11.1 million).Initially, the attacker communicated with the Prisma deployers, claiming it was a white hat attack. However, later that same day, all funds were transferred to Tornado Cash, contradicting the previous statement. The exploiter began to make excessive demands, requesting a $3.8 million (34%) white hat bounty. This amount is far above the industry standard of 10%, effectively extorting the team, as the treasury did not have sufficient assets to compensate users.Through on-chain tracking, PrismaFi exploiter 0x77 was previously implicated in the Arcade exploit incident in March 2023 and the Pine protocol exploit incidents starting in February 2024. Additionally, the exploiter's address is linked to the deployer address of Modulus Protocol. 0x77 is one of the few followers of this project, strengthening the connection between each event. Further analysis of this suspected scammer's phone number, email, and other details has been conducted. Their posts on X indicate they have a strong technical background. Currently, all personal details have been compiled, and the Prisma team is pursuing all possible legal avenues in Vietnam and Australia. ZachXBT urged this scammer to return the funds promptly to prevent further escalation and save time for everyone.