🚀 Gate Fun Chinese Meme Fever Keeps Rising!
Create, launch, and trade your own Meme tokens to share a 3,000 GT!
Post your Meme on Gate Square for a chance to win $600 in sharing rewards!
A total prize pool of $3,600 awaits all creative Meme masters 💥
🚀 Launch now: https://web3.gate.com/gatefun?tab=explore
🏆 Square Sharing Prizes:
1️⃣ Top Creator by Market Cap (1): $200 Futures Voucher + Gate X RedBull Backpack + Honor Poster
2️⃣ Most Popular Creator (1): $200 Futures Voucher + Gate X RedBull Backpack + Honor Poster
3️⃣ Lucky Participants (10): $20 Futures Voucher (for high-quality posts)
O
Hackers Strike Again — $21M Stablecoin Loot Moved To Ethereum Network | Bitcoinist.com
Related Reading: Bitcoin Or Your Life? Israeli Trader Stabbed, $600K Stolen in Home Attack## Stablecoin: Key Details Of The Theft
According to chain trackers and security feeds, the affected address shown on explorers as 0x0cdC…E955 lost roughly $21 million in stablecoins. Reports place about 17.75 million DAI among the stolen assets and about 3.11 million of a second stable token that some trackers list as MSYRUPUSDP.
Security firms including PeckShield flagged the incident as a private key leak, meaning the attacker gained direct control of the wallet’s signing key and moved funds without breaking a platform’s code.
How The Attack Appears To Have Happened
Based on reports, this was not a smart-contract flaw or a bridge bug. The stablecoin wallet’s secret key was exposed or taken. Once that happened, transfers could be signed and broadcast instantly.
Some of the moves were rapid. Large sum transfers were routed through one or more cross-chain bridges before arriving on Ethereum, where funds were shifted across multiple addresses. That routing made tracing harder, but chain monitors followed many of the hops.
As of today, the market cap of cryptocurrencies stood at $3.69 trillion. Chart: TradingView
Where The Money Traveled
Tracing shows the stolen stablecoins crossed chains and then were shuffled on Ethereum. Observers noted that token labels in explorers did not always match contract names, which can confuse quick summaries.
Using contract addresses is the only precise way to follow funds on chain. Reports say the thief used bridges to obscure origin and then moved assets between a number of addresses, a step which complicates recovery efforts if the funds are not deposited to a centralized service.
Related Reading: Crypto Could Tip The Scales — 64% Of Voters Say It Guides Their Vote### Gaps In The Public Record
Reports have disclosed that several outlets republished the same initial feed from chain-security groups, and no public identity for the actor has emerged. Numbers vary slightly across trackers, which is common when tokens are wrapped, rebranded, or shown differently by different explorers.
Security analysts point to broader figures showing over $1 billion in losses tied to private-key and credential-based incidents in recent years, underlining how common and costly these events remain.
Featured image from Bleeping Computer, chart from TradingView