According to PANews, an investigation into a suspected exploiter of a Prisma vulnerability, known as 0x77 or Trung, has been released by blockchain detective ZachXBT. The investigation relates to multiple vulnerabilities and an alleged loss of $11 million. On March 28, 2024, the Prisma team observed a series of transactions on the MigrateTroveZap contract, resulting in a loss of 3,257 ETH, approximately $11 million. Initially, the attacker communicated with the Prisma deployer, claiming it was a white-hat attack. However, later the same day, all funds were transferred to Tornado Cash, contradicting the previous statement. The exploiter began making excessive demands, asking for a white-hat bounty of $3.8 million (34%), significantly higher than the industry standard of 10%. This was essentially an extortion attempt, as the vault did not have sufficient assets to compensate users.
Through on-chain tracking, it was found that the PrismaFi vulnerability exploiter 0x77 was also suspected of exploiting the Arcade vulnerability in March 2023 and a vulnerability on the Pine protocol from February 2024. Furthermore, the exploiter's address is linked to the deployer address of the Modulus Protocol. 0x77 is one of the few followers of this project, strengthening the connection between each event. Further analysis of the alleged scammer's phone number, email, and other details revealed a strong technical background. All personal details have now been compiled, and the Prisma team is pursuing all possible legal avenues in Vietnam and Australia. ZachXBT is urging the scammer to return the funds as soon as possible to avoid further escalation and save time for everyone.