Drift Money Laundering Path Exposed, Backpack KYC Becomes the Key to Catching the Culprit.


On-chain analyst aryan revealed that the attacker’s address had obtained initial funds through NEAR Intents 8 days ago and has been lurking ever since.
After gaining the funds, they were transferred to multiple money laundering addresses (including 8ub…Gxw). The critical turning point: these laundering addresses received funds from Backpack wallets one day before the incident.
Subsequently, the money launderer used Wormhole to bridge the funds to an Ethereum address, which had previously received funds from Tornado Cash — a classic money laundering cycle.
However, Backpack enforces KYC verification for all users (identity information + document upload + facial recognition), meaning the real identities of these laundering accounts are likely traceable, potentially providing a breakthrough in tracking down the attacker.
Backpack co-founder Armani Ferrante responded that the fund flow was an "indirect path: Backpack → non-attacker (cross-chain intent solver) → attacker," and stated that they have verified the related account holders.
Hackers think they are hunters, but they forget that KYC is the strongest net.
#Drift #Backpack #KYC
View Original
post-image
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin