UXLINK attacker transformed 1,620 ETH into 6.73m DAI on September 24.
The transaction occurred almost 48 hours after the preliminary exploit.
Inferno Drainer phishing rip-off drained 542m UXLINK tokens price $43m.
The UXLINK hack has taken one other sudden flip because the attacker behind the exploit continues to shuffle stolen property in an try to money out.
On-chain trackers present that within the early hours of September 24, the hacker transformed 1,620 ETH into DAI stablecoins, valued at round $6.8 million.
The motion got here almost 48 hours after the preliminary exploit and was the primary main conversion of stolen funds.
Nevertheless, investigators additionally found that the attacker had already misplaced a big a part of their loot to a phishing rip-off, including an uncommon twist to one of many largest exploits in current months.
Attacker converts ETH to stablecoins
Blockchain knowledge revealed that the attacker swapped 1,620 ETH for six.73 million DAI on September 24.
This marked the primary vital try to remodel the stolen tokens into secure property.
Earlier than this transaction, the hacker had engaged in heavy fund shuffling throughout a number of wallets.
These actions used a mixture of decentralised and centralised exchanges, a standard laundering tactic to obscure the path.
The fund motion was flagged by on-chain monitoring accounts, together with Lookonchain, which confirmed the ETH-to-DAI swap.
The exercise means that the attacker could also be testing liquidity and off-ramping methods regardless of heightened surveillance from exchanges and safety companies.
Phishing drains $43 million in UXLINK tokens
In a stunning twist, the attacker’s personal safety misstep led to an extra loss.
Investigators discovered that the hacker interacted with a malicious contract linked to the Inferno Drainer phishing group.
This error allowed 542 million UXLINK tokens, price roughly $43 million on the time, to be drained straight from the attacker’s pockets.
For UXLINK, it has created a state of affairs the place a considerable a part of the stolen tokens is now within the arms of a separate malicious actor.
How the exploit unfolded
The hack started on September 22 and prolonged into the next day.
In line with safety researchers, the foundation of the exploit was a delegate name vulnerability inside UXLINK’s multi-sig pockets.
This flaw gave the attacker administrator-level entry, enabling them to switch property with out approval and mint faux tokens.
The attacker minted near 10 trillion CRUXLINK tokens on the Arbitrum blockchain.
They rapidly liquidated a portion into ETH, USDC, and different property, draining liquidity swimming pools and inflicting the token value to break down by greater than 70%.
The speedy impression worn out tens of millions in market worth.
In response, UXLINK contacted main exchanges to freeze suspicious transfers and partnered with safety companies to hint transactions.
Nevertheless, a lot of the harm had already been performed by the point these measures have been applied.
Protocol response and restoration efforts
UXLINK has since launched emergency measures aimed toward rebuilding safety and market belief.
The group migrated to a newly audited sensible contract that included a capped provide to scale back the chance of limitless token minting.
The audit strengthened safeguards round multi-signature wallets and contract interactions.
Regardless of these actions, the hacker continues to carry tens of millions in property, and the current ETH-to-DAI swap provides new complexity to monitoring restoration.
The extra phishing loss additional complicates issues, leaving uncertainty over how a lot of the unique stolen funds can ever be recovered.
With stolen property unfold throughout a number of chains, wallets, and malicious actors, restoration prospects stay restricted.