Cointime

Download App
iOS & Android

SharkTeam: Analysis of the Attack Principles and Money Laundering Patterns in Atomic Wallet

On June 3rd, the cryptocurrency wallet Atomic Wallet was targeted in an attack, resulting in a significant amount of user assets being stolen. Some users suffered losses exceeding millions of dollars, causing widespread impact. SharkTeam conducted an analysis of the attack principles employed in this incident, as well as the hackers' money laundering patterns.

1. Analysis of the Attack Principles:

SharkTeam conducted a closed black-box testing on Atomic Wallet, focusing on the app and server API. The testing process is outlined as follows:

(1) The tested versions were Android's Atomic Wallet 1.13.20 and 1.15.1. We matched the packaging and publishing certificate information of the Android application and found them to be consistent with the official certificates. This ruled out the possibility of "repackaging + phishing websites" attacks aimed at stealing private keys.

(2) We analyzed the local cache files of the app and determined that sensitive data related to account information was obfuscated and encrypted.

(3) We conducted packet capturing during the app's runtime, but no attack behavior involving key upload or leakage was detected. Additionally, the data had undergone reasonable encryption measures.

(4) The Android client lacked dynamic protection and reinforcement measures, making it susceptible to injection attacks. Users could be targeted and their private keys compromised if they installed malicious apps controlled by hackers. These malicious apps could be installed through social engineering techniques or as pre-installed applications in certain malicious Android systems.

(5) By using a traffic monitoring tool to examine network connections and observing the HTTP, DNS, ICMP, SSH, and other traffic patterns after a period of operation, no obvious instances were found of the app sending sensitive data to third parties. Analysis of the interactions between the app and the backend API revealed that all API interfaces required authentication, and no unauthorized or hidden interfaces were discovered.

Based on the testing and analysis, we identified the following as the most likely attack vectors for this incident:

(1) It is possible that a malicious SDK was inadvertently introduced during the development process of Atomic Wallet, creating a backdoor through a "software supply chain attack" by which hackers gained unauthorized access.

(2) Leakage of information related to the data encryption algorithm, leading to the discovery of encryption methods and vulnerabilities, and subsequent brute-forcing of private keys.

(3) The lack of dynamic protection in the Android app client allowed for the implantation of malicious software into users' Android devices, enabling injection attacks to steal user passwords or private keys.

2. Analysis of Money Laundering Patterns:

As a result of the hacker attack on Atomic Wallet, users suffered losses of at least $35 million, with the top five victims accounting for $17 million. One particular user had $7.95 million stolen. Furthermore, according to ChainAegis, SharkTeam's on-chain security analysis platform, the total losses incurred by victims have exceeded $50 million. We conducted a fund flow analysis on the addresses of two victims from the top five in terms of losses. After eliminating the technical interference factors set up by the hackers (including a large number of false token transfers and transactions divided among multiple addresses), we identified the following money transfer patterns employed by the hackers:

Image: Atomic Wallet Victim 1 Fund Transfer View

Victim 1 address 0xb02d...c6072 transferred 304.36 ETH to the hacker's address 0x3916...6340. The funds were then divided eight times through the intermediate address 0x0159...7b70 before being aggregated to address 0x69ca...5324. Subsequently, the aggregated funds were transferred to address 0x514c...58f67, where they currently remain. The address holds a balance of 692.74 ETH (worth $1.27 million) in ETH.

Image: Atomic Wallet Victim 2 Fund Transfer View

Victim 2 address 0x0b45...d662 transferred 1.266 million USDT to the hacker's address 0xf0f7...79b3. The hacker divided it into three transactions, with two transfers going to Uniswap, totaling 1.266 million USDT. The remaining amount was transferred to address 0x49ce...80fb, with a transfer amount of 672.71 ETH. Victim 2 also transferred 22,000 USDT to the hacker's address 0x0d5a...08c2. The hacker utilized intermediate addresses like 0xec13...02d6 for multiple rounds of fund division, eventually consolidating the funds to address 0x3c2e...94a8.

This money laundering pattern closely aligns with the techniques observed in previous attacks by North Korean hackers in the Ronin Network and Harmony incidents. The pattern involves three steps:

(1) Consolidation and conversion of stolen funds: After the attack, the stolen tokens are consolidated and swapped for ETH using decentralized exchanges (DEX) or similar methods. This is a common practice to avoid freezing of funds.

(2) Aggregation of stolen funds: The consolidated ETH is collected in several one-time-use wallet addresses. In the Ronin incident, the hackers used nine such addresses, while in the Harmony incident, they used 14. In the case of the Atomic Wallet incident, nearly 30 addresses were used.

(3) Transfer of stolen funds: The collected funds are laundered using Tornado.Cash, effectively completing the entire money transfer process.

In addition to following the same money laundering pattern, there are significant similarities in the laundering details:

(1) The attackers demonstrate patience, conducting the laundering operations for up to a week. They initiate the subsequent laundering actions a few days after the initial attack. Currently, a portion of the stolen funds in the Atomic Wallet incident has been divided, but the process of mixing them through Tornado.Cash has not yet begun. It is likely that the mixing will commence in a few days.

(2) Automated transactions are utilized throughout the money laundering process. Most of the fund aggregation actions involve multiple transactions with small time intervals, following a consistent pattern.

Figure: View of Ronin Network breathfirst money laundering mode
Figure: View of Harmony breathfirst money laundering mode

Based on the on-chain analysis, we conclude the following:

(1) The money laundering techniques employed in the Atomic Wallet incident exhibit consistency with the laundering methods observed in the Ronin Network and Harmony incidents. These methods involve dividing funds among multiple accounts and conducting small-scale asset trans fers. Therefore, it is possible that The attackers are affiliated with North Korean hacker organizations.

(2) However, in the function transfer proces of the atomic incident, a significant number of false token transactions we identify. Technique to increase the diffical of analysis. fund division, with 23 of them being associated with false token transfers. This interference technique was not observed in the previous two incidents, indicating an upgrade in the hackers' money laundering tactics.

(3) Currently, the stolen funds from the Atomic Wallet incident remain in the divided addresses. If this is indeed an attack by North Korean hackers, the laundering process is not yet complete, and it is possible that the funds will be transferred to Tornado.Cash for mixing, similar to the Harmony incident.

(4) During the analysis of fund flows, addresses 0x3c2eebc and 0x3b4e6e7e were observed to interact with hot wallet addresses labeled as "Binance 18" and "Binance 14," respectively. However, due to the small transfer amounts, it is not ruled out that these interactions may not have undergone Know Your Customer (KYC) verification on the Binance platform.

About us

SharkTeam’s vision is to comprehensively protect the security of the Web3 world. The team is composed of experienced security professionals and senior researchers from all over the world. They are proficient in the underlying theory of blockchain and smart contracts, and provide services including smart contract auditing, on-chain analysis, and emergency response. It has established long-term cooperative relationships with key players in various fields of the blockchain ecosystem, such as Polkadot, Moonbeam, polygon, OKC, Huobi Global, imToken, ChainIDE, etc.
Official website: https://www.sharkteam.org/
Twitter: https://twitter.com/sharkteamorg
Discord: https://discord.gg/jGH9xXCjDZ
Telegram: https://t.me/sharkteamorg

Comments

All Comments

Recommended for you

  • Cointime May 4th News Express

    1. Hong Kong Bitcoin Spot ETF has held 4,218 BTC since its listing three days ago

  • Blockchain Asset Management announces launch of a dedicated blockchain fund for accredited investors

    Blockchain Asset Management, a cryptocurrency fund with a scale of $100 million, announced the launch of an exclusive blockchain fund for qualified investors. The specific amount of funds raised by the fund has not been disclosed yet, but it is said to have reached "eight figures", which means it is in the tens of millions of dollars. In addition, the investment threshold for the new fund is $100,000, and all investors are required to meet the approved standards (annual income exceeding $200,000, net assets exceeding $1 million).

  • Renault's BWT Alpine F1 Team announces partnership with ApeCoinDAO

    The BWT Alpine F1 team under Renault announced a partnership with ApeCoinDAO on X platform, which will introduce APE into the Alpine F1 ecosystem and collaborate with global token holders to launch peripheral products and digital assets inspired by the first ApeCoin. It is reported that according to the cooperation between the two parties, in the future, BAYC NFTs may be able to wear equipment and clothing with the Alpine team logo.

  • BTC breaks through $63,000

    The market shows BTC has broken through $63,000 and is currently trading at $63,014.9, with a daily increase of 6.11%. The market is volatile, so please exercise caution in risk management.

  • The total gas consumption on the Base chain exceeds 10,000 ETH

    According to the blockchain analysis platform Dune Analytics, the total gas consumption on the Base chain has exceeded 10,000 ETH, reaching 10,839.5062 ETH at the time of writing (equivalent to over $33.6 million at current prices). The average gas usage amount is about $0.1754 per transaction (0.000059661 ETH), and the total number of blocks has reached 13.41 million, with an average transaction volume of about 14.63 transactions per block. In addition, the data shows that the total transaction volume on the Base chain has exceeded 196.2 million, with over 8.366 million users and over 184 million user transactions at the time of writing. Furthermore, the total number of contracts created on the Base chain has exceeded 64 million, reaching 64,056,573 in the current period.

  • A wallet received 2,000 ETH from Alemeda/FTX

    As monitored by The Data Nerd, 6 hours ago, wallet 0xaEa received 2,000 ETH (approximately $6.23 million) from Alemeda/FTX. Within a week, it received a total of 8,000 ETH (approximately $24.71 million) from Alameda and deposited 6,000 ETH into Binance.

  • A single transaction with a transaction fee of up to 1.5 BTC appeared on the Bitcoin chain

    According to on-chain data tracking service monitoring , there has been a single transaction on the Bitcoin network with a transaction fee as high as 1.5 BTC, worth about $100,254. It is reported that the sender of the transaction is an address starting with "bc1p4n" and the recipient is an address starting with "bc1pqv".

  • 2 wallets deposited 211 billion SHIB into Coinbase within 10 hours

    According to The Data Nerd's monitoring, within 10 hours, 2 wallets (with the same amount of SHIB) deposited a total of 211 billion SHIB (about 5.16 million US dollars) into Coinbase. These wallets accumulated these SHIBs last week, and if sold at the current price, it would cause a small loss (about 120,000 US dollars).

  • USDT issuance on TON chain reaches $100 million

    According to official data, the issuance and circulation of USDT on the TON chain has reached 100 million US dollars, making TON the fastest-growing blockchain for Tether USDT issuance in Web3 history.

  • USDC circulation decreased by $200 million in the past week, with a total circulation of $33.1 billion

    According to official data, Circle issued a total of 2.8 billion USDC and redeemed approximately 3 billion USDC in the past 7 days, resulting in a decrease in circulation of approximately 200 million USDC. The total circulation of USDC is 33.1 billion US dollars, with a reserve of 33.2 billion US dollars, including approximately 3.4 billion US dollars in cash, and Circle Reserve Fund holding approximately 29.8 billion US dollars.