Radiant Capital hacker doubles $53M stash via ETH trading

'Blind signing is an issue, but not the prime suspect' expert says on Bybit $1.4b saga


The hacker behind the Capital Radiant feat of $ 53 million from last year almost doubled the value of the stolen funds thanks to an Ethereum trading strategy well on a scale.

Summary

  • The Hacker Capital Radiant increased the stolen funds by $ 53 million to $ 94 million via ETH and DAI Trading.
  • The October 2024 attack operated the Multisig Radiant portfolio using MacOS malware.
  • The attribution points to Applejeus in North Korea, with little chances of recovery.

According to the chain analyst Embercn August 19 jobThe pirate had previously sold 9,631 Ethereum (Ethn) on average of $ 4,562 for 43.9 million DAI (Dai), only to buy 2,109.5 ETH for $ 8.64 million DAI once prices fell to $ 4,096.

The portfolio now contains 14,436 ETH and 35.29 million DAI, a portfolio worth 94.63 million dollars. This represents a gain of more than $ 41 million on the initial value of stolen funds. The blockchain analysis company, Lookonchain, noted that the decision to keep most of the assets of the ETH during its rally played a major role in the increased balance.

From $ 53 million to $ 94 million stash

October 2024 break From Radiant Capital, a multi-chain decentralized financial protocol, was one of the most damaging attacks of the year. By compromising the multisignature portfolio of its basic team through a specific macOS malware called inletdrift, the attacker siphone the tokens from loan pools on arbitrum (ARB) and BNB (Bnb) Chain.

At the time, stolen assets were quickly converted to 21,957 ETH, then valued at around $ 53 million while Ethereum was negotiated nearly $ 2,500. Rather than liquidating the assets, the pirate held ETH as his price rose. In recent weeks, the attacker has executed several trades To increase exposure.

Radiant Capital Hack Award and risks in progress

The attack was related By some safety experts from Applejeus’ Blockchain in North Korea, known to target DFI exchanges and protocols. Radiant Capital has worked with the FBI, the analysis channel and web security companies like Seal911 and Zeroshadow after hacking, but recovery prospects remain thin while funds continue to move through the negotiation activity based on Ethereum.

The October incident marked the second Radiant violation in 2024, following a small flash loan of $ 4.5 million exploit Earlier this year. He underlined the persistent security risks in DEFI, which has already experienced significant losses in 2025.

With more than $ 94 million now under control, the attacker’s next decision will be closely monitored by analysts and security teams.



Post Comment