tradingkey.logo

$53M Radiant Capital hacker $40M+ in profits trading ETH with stolen funds

Cryptopolitan2025年8月20日 11:56

Radiant Capital hacker has turned their $53 million heist to around $94.6 million after timing ETH trades strategically.

The attacker sold 9,631 ETH at an average rate of $4,562 and got $43.9 million DAI. Then they reentered the market with $8.64 million DAI, buying 2,109.5 ETH as prices declined. They currently hold 14,436 ETH and 35.29 million DAI, valued at $94.63 million.

Radiant Capital Hacker executes profitable ETH swing trading

EmberCN, an analyst, tracked the Radiant Capital hacker who utilized stolen money as a trading tactic to earn profits. The hacker sold 9,631 ETH worth on average $4,562 with a profit of 43.937 million DAI alone last week. That was when Ethereum made local highs before the market correction.

Radiant Capital hacker turns $53M heist into $94.6M after timing ETH trades
Source: X post by EmberCN

The hacker had been waiting for ETH price pullback in the past few days before implementing the buyback strategy. With $8.64 million DAI in the last hour, they bought 2,109.5 ETH for $4,096 per token. It is a $466 price difference per ETH between buy and sell orders achieving massive arbitrage profits.

Current portfolio investments include 14,436 ETH tokens and 35.29 million DAI, with a total value of $94.63 million. The original October 2024 heist was worth around $53 million.

The trading plan is like that of experienced market makers, who short at resistance areas and long on support bounces. Volatility in the price of ETH during the range of $4,562 to $4,100 provided perfect conditions for swing trading gains.

October 2024 attack netted $53 million

The Radiant Capital attack occurred on 16 October 2024 and resulted in an estimated $53 to $58 million loss from user funds.

Hackers accessed Radiant’s multisignature wallet system, which was built around a 3-of-11 model requiring three of eleven signers to sign transactions. The hackers were able to steal three private keys, precisely hitting the threshold to access. They were able to update smart contracts and siphon funds from the protocol treasury.

Attack planning commenced weeks prior to deployment with buggy contracts rolled out on October 2, 2024. This 14-day attack planning gave attackers time to test systems and strategize extraction techniques. The timing indicates deliberate planning as opposed to opportunistic exploitation.

Cybersecurity firm Mandiant worked with Radiant Capital to investigate the attack and identify threat actors. The investigation revealed state-level sophistication in both attack methods and execution timing.

Join Bybit now and claim a $50 bonus in minutes

免责声明:本网站提供的信息仅供教育和参考之用,不应视为财务或投资建议。

相关文章

Tradingkey
tradingkey.logo
tradingkey.logo
日内数据由路孚特(Refinitiv)提供,并受使用条款约束。历史及当前收盘数据均由路孚特提供。所有报价均以当地交易所时间为准。美股报价的实时最后成交数据仅反映通过纳斯达克报告的交易。日内数据延迟至少15分钟或遵循交易所要求。
* 参考、分析和交易策略由第三方提供商Trading Central提供,观点基于分析师的独立评估和判断,未考虑投资者的投资目标和财务状况。
风险提示:我们的网站和移动应用程序仅提供关于某些投资产品的一般信息。Finsights 不提供财务建议或对任何投资产品的推荐,且提供此类信息不应被解释为 Finsights 提供财务建议或推荐。
投资产品存在重大投资风险,包括可能损失投资的本金,且可能并不适合所有人。投资产品的过去表现并不代表其未来表现。
Finsights 可能允许第三方广告商或关联公司在我们的网站或移动应用程序的任何部分放置或投放广告,并可能根据您与广告的互动情况获得报酬。
© 版权所有: FINSIGHTS MEDIA PTE. LTD. 版权所有
KeyAI