Skip to content

Shiba Inu Hacker *0xSifu* Unmasked After $2.4M Bridge Exploit Blunders

A careless ETH transfer and Tornado Cash slip-up cracked the case. Now, the FBI and KuCoin hold the keys to recovering $2.4 million.

In this picture we can see there are some drawings and words on the wall and in front of the wall...
In this picture we can see there are some drawings and words on the wall and in front of the wall there is a rusted fence.

Shiba Inu Hacker *0xSifu* Unmasked After $2.4M Bridge Exploit Blunders

A hacker known as 0xSifu exploited the Shibarium bridge in September, stealing $2.4 million. The incident left the Shiba Inu community searching for answers. Now, new findings from an investigation have uncovered key details about the attacker's identity and movements.

The attack began when the hacker drained funds from the bridge but later refused a bounty offer from K9 Finance. Investigators, including contributor Shima, tracked the stolen assets using MetaSleuth. They discovered that one of the hacker's wallets mistakenly sent ETH to a hidden withdrawal address, exposing their identity.

A further error occurred when the hacker used Tornado Cash, a privacy tool. This slip allowed investigators to connect the original hack wallets to withdrawal addresses. Shima also traced the flow of funds to deposit addresses on KuCoin, a major cryptocurrency exchange.

The Shibarium team was advised to involve law enforcement before releasing details publicly. Developer Kaal Dhairya now plans to share the full report with the FBI and KuCoin. Meanwhile, the unclaimed ETH from the K9 bounty contract has been returned to its rightful owners.

The investigation has identified 0xSifu as the hacker behind the $2.4 million Shibarium bridge exploit. With evidence linking the stolen funds to KuCoin, authorities may take further action. The Shiba Inu team continues to work with investigators, leaving the next steps in the hands of law enforcement.

Latest