fund recovery

Radiant Capital published a review of the theft process, stating that they will identify the attackers and recover the stolen funds as soon as possible

ChainCatcher news, Radiant Capital's official social media post reviewed that the protocol experienced a highly complex security vulnerability on the 16th, resulting in a loss of $50 million. The attacker exploited multiple developers' hardware wallets through highly advanced malware injection.During the intrusion, the front end of Safe Wallet (also known as Gnosis Safe) displayed legitimate transaction data, while the poisoned transactions were signed and executed in the background. This vulnerability occurred during a routine multi-signature emission adjustment process, which is conducted regularly to adapt to market conditions and utilization rates. DAO contributors strictly adhered to many industry standard operating procedures throughout the process. Each transaction was simulated on Tenderly to ensure accuracy and was individually reviewed by multiple developers at each signature stage. During these reviews, neither Tenderly nor the front-end checks in Safe showed any anomalies. To emphasize the importance of this, it was completely undetectable during the manual review of the Gnosis Safe UI and the Tenderly simulation of regular transactions, as confirmed by external security teams.Radiant Capital stated that it has been working closely with Seal911 and Hypernative and has implemented more robust multi-signature controls. The FBI and zeroShadow are fully aware of the violations and are actively working to freeze all stolen assets. The DAO is deeply disturbed by this attack and will continue to work tirelessly with relevant agencies to identify the attackers and recover the stolen funds as soon as possible.

Alex Lab: A portion of the stolen funds has been recovered, and the treasury grant program is under evaluation

ChainCatcher news, Bitcoin decentralized finance tool Alex Lab has released an update on the attack incident, stating that the team is closely monitoring the attacker's wallet and has notified all relevant CEXs. All known CEX accounts associated with the attacker have been frozen. A portion of the stolen funds has been identified and is being recovered from a CEX. The team is actively collaborating with other CEXs through the necessary processes to facilitate the return of more funds. To further recover the stolen funds, we are prepared to file a police report, and if the attacker does not cooperate with us in a timely manner, we will seek police support to assist in the recovery of the funds.So far, all aBTC, sUSDT, xBTC, xUSD, ALEX, atALEX, LiSTX, LUNR, SKO, CHAX, $B20, ORDG, ORMM, ORNJ, TRIO, TX20, and STXS have been recovered. The smart contract code and infrastructure of ALEX have not been compromised.Alex Lab also stated that due to the uncertainty of recovering all stolen funds, they are evaluating the use of ALEX reserves held by the Alex Lab Foundation to fund a treasury grant program to support the community affected by this attack during this difficult time. Additionally, they are considering the possibility of proposing a SIP to the Stacks community to burn STX held in wallets that have not recovered stolen funds and to mint new STX for affected community members.Previous news, the Bitcoin DeFi platform Alex announced the discovery of a vulnerability in the XLink bridge and has actively collaborated with exchanges, partners, and ecosystem contributors to resolve the situation.

The Dongyang People's Court has launched the first round of fund recovery work related to a series of virtual currency fraud cases involving 380 million yuan

ChainCatcher news, the Dongyang People's Court issued a notice on the return of funds in the fraud case involving Zhou Sheng, He Yan, and others. The notice states that based on the effective criminal judgment documents such as Zhe 0783 Criminal First 560 and the information verification registration, the first round of fund return work for the involved funds that have been collected is being carried out. The specific matters are announced as follows: the registration for this fund return work will start from the date of the announcement and will last for 1 month. The recipients of the fund return are investors who have invested in the fraudulent digital currency platforms SIE (later renamed BTUE), CFEX, LKF, GDbit, etc., and have overall losses. The amount of this return is calculated based on the amount of loss and the funds that have been collected, determining a uniform refund ratio.It is reported that this fund return will be conducted through the release on WeChat official accounts, links, and scanning QR codes to enter the APP for information registration, with backend review and confirmation. After passing the review, the payment will be assisted by the Dongyang branch of the Industrial and Commercial Bank of China.In August 2019, the Dongyang Public Security Bureau launched an investigation into digital currency fraud platforms such as SIE, CFEX, LKF, and GDBIT, and key members of this fraud group were successively captured and brought to justice. This fraud group fabricated activities related to blockchain technology development, developing digital currency trading platforms through a technical team, forming a complete fraud industrial chain.In September 2021, according to the Zhejiang Procuratorate, all 171 defendants involved in this digital currency fraud series case, with an amount involved reaching 380 million yuan, were tried and sentenced.
ChainCatcher Building the Web3 world with innovators