AMLBot

1.8K posts

AMLBot banner
AMLBot

AMLBot

@AMLBotHQ

Blockchain Intelligence at your fingertips. Report malicious crypto addresses here: https://t.co/VdIaZEqRBN

Katılım Ekim 2020
494 Takip Edilen7.2K Takipçiler
Solid Intel 📡
Solid Intel 📡@solidintel_x·
INTEL: Thorchain appears to have suffered multi-chain exploit across Bitcoin, Ethereum, BSC and Base with losses exceeding $7.4M
Solid Intel 📡 tweet mediaSolid Intel 📡 tweet media
English
57
37
323
112.2K
AMLBot
AMLBot@AMLBotHQ·
⚡️Just in: @zachxbt reports @THORChain was exploited on Bitcoin, Ethereum, BSC, Base for $7.4M Our tracing shows that funds were swapped to native ETH and BTC and are now lying dormant on attackers' intermediate addresses. We are actively monitoring their activity.
AMLBot tweet media
English
0
4
11
850
AMLBot
AMLBot@AMLBotHQ·
So how do YOU avoid this? A few rules: 🔍 Always verify the full wallet address — not just the first/last characters, but also the characters in the middle 🔖Save trusted addresses in an address book, not from history ✅ Run an AML check before large transfers
English
1
0
1
114
AMLBot
AMLBot@AMLBotHQ·
🧵 Czech company lost $50k to an address poisoning attack. Here is how we traced and recovered the funds ⏬
AMLBot tweet media
English
1
2
5
503
CyberScamMonitor
CyberScamMonitor@CyberScamWatch·
CAMBODIA: Korean police arrest man accused of laundering 747 billion Korean won (US$500m) in criminal funds through Huione Pay between March 2022 and Aug 2025. 1/2 chosun.com/english/nation…
English
3
14
42
3.1K
AMLBot
AMLBot@AMLBotHQ·
Attackers obtained $1.8M from exploiting @TransitFinance and are now holding this amount in DAI stablecoin. Project's team is now in contact with the attacker, urging him to return the funds for the bounty. Our tracing showed that part of the funds originated from HitBTC.
AMLBot tweet media
English
0
3
15
1.4K
AMLBot
AMLBot@AMLBotHQ·
Dev responsible for creating the contract involved in recent @TheRoaringKitty incident was funded by ByBit and split the funds between 3 wallets directly. Some of the funds are still lying dormant.
AMLBot tweet media
English
0
2
2
1.1K
AMLBot
AMLBot@AMLBotHQ·
@zachxbt It's fun how they completely disregard staying low-profile after committing crimes. Instead they flex watches on Instagram
English
0
1
5
2.6K
ZachXBT
ZachXBT@zachxbt·
1/ Meet Dritan Kapllani Jr, a US based threat actor tied to $19M from social engineering thefts targeting crypto holders. Dritan flexes luxury cars, watches, private jets, & clubs all over social media. Recently he was recorded on a call showing off a wallet with stolen funds.
ZachXBT tweet media
English
787
628
7K
1.4M
AMLBot
AMLBot@AMLBotHQ·
@Aurellion_Labs suffered from an exploit leading to $456k damage. Our analysis showed that attacker was funded by Tornado Cash, sent ETH to pay comissions via Across Protocol, and after that proceeded stolen funds via LiFi. $456k were swapped to USDC on ETH and now lay dormant.
AMLBot tweet media
English
1
0
2
279
AMLBot
AMLBot@AMLBotHQ·
@inkfinance suffered from a security incident that led to a $140k loss. Attackers deployed his exploit at an address that matched a whitelisted address in INK's contract, this bypassing access control. Stolen funds were bridged to ETH Mainnet, and 10k USDT were sent to the attacker's second address.
AMLBot tweet media
English
0
0
1
262
AMLBot
AMLBot@AMLBotHQ·
Renegade Dark Pool was exploited for $209k. ‘Initializer’ on the proxy of the pool did not have access control, which allowed the attacker to set his own malicious implementation. Different ERC-20 assets were stolen and are now lying dormant at attackers’ account 0x777253F28AdC29645152b7b41BE5c772A9657777 Attackers have interacted with MEXC in the past.
AMLBot tweet media
English
0
1
0
320
AMLBot
AMLBot@AMLBotHQ·
On Thursday TrustedVolumes was exploited for $5.87M in different assets, including ETH, USDT and wBTC. Tracing shows that attacker has spliced funds to several addresses and swapped all tokens to native ETH. 110 ETH were swapped to BTC via @THORChain. It is notable that 0.5 ETH were sent to @RAILGUN_Project, but due to them implementing our AML blocklist, the transaction was reverted.
AMLBot tweet media
English
1
3
11
1.1K
AMLBot
AMLBot@AMLBotHQ·
According to @exvulsec a security incident occurred on ETH Mainnet, with about $230k stolen and sent to address 0x224c940003dd0b8aa1a20e655ced0363d573fa46. Our tracing shows that after an unsuccessful attempt of sending funds to @RAILGUN_Project, the attacker converted funds to 0.95 WETH and 227K aEthUSDT. Funds are now lying dormant on the attacker’s address 0xe68d0c829bec9ac3310f15db179406abc6decf48.
AMLBot tweet media
English
0
4
12
1.1K