Cardano’s RayStake Will Hunt Down Recent Attacker Unless He Returns Stolen Funds: Details


article image

Yuri Molchan

Cardano’s Staking Center team promises to launch a “wanted” campaign on the hacker who drained funds from it recently

Contents

In a blog post published earlier today, Cardano’s Staking Center RayStake shared the details of two recent attacks that took place on October 3 and October 10.

The hacker managed to steal a large amount of crypto, which he later sold for nearly half a billion ADA.

Now, the team offers the hacker to return the funds, allowing him to keep a percentage from it. Otherwise they threaten to launch a “wanted” campaign and give a reward to those who will help hunt the attacker down.

HackerADA_098u4ret
Image via raynetwork

Details of the RayStake exploit

According to the blog post, the attacker managed to change a stake key in the payment address, thus making the vending machine to shift crypto to the hacker’s wallet.

Ads

The attacker managed to withdraw 5,554,113 XRAY (Ray Network’s native coin) and 112 XDIAMOND. Later he sold them for a total of 412,253 ADA on Minswap dex and Sundaeswap.

The RayStake team say they know on which addresses the attacker holds the 412,253 ADA, publishing them in the blog post.

Settlement offer to the hacker

The RayStake team has offered the hacker to settle this matter if he returns the ADA he got for the stolen funds to their address. In this case, they are willing to leave him 20 percent of that amount, pretending that he is a “white hat hacker”, who helped them find a vulnerability in the system.

The total sum of ADA held by the hacker’s address at the moment is 4,600,000, plus the 412,000 he got for the stolen crypto.

According to them, the hacker has left “a lot of digital footprints” that will help DPS Cyber Security keep him in their crosshairs.

If this offer is not accepted, on Monday, RayStake will launch a campaign to hunt the hacker down by offering 10,000 ADA as a reward.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *