10zoudonglin pfp
10zoudonglin
@10zoudonglin
(2/2) 2/ 🔍Further analysis of the hacker's related address on Starknet: 0x04d7191dc8eac499bac710dd368706e3ce76c9945da52535de770d06ce7d3b26 It was found that this address was linked to #L1 addresses before the attack: - 0xd95b3c1e638ce3cdc070ad6d4f385c61e2ee8662 - 0x93920786e0fda8496248c4447e2e082da69b6c40 - 0x34e5dc779cb705200e951239b6a89aaf5c7dbfc1 3/ 🤔According to @MistTrack_io , 0x9392 and 0x34e5 are associated with the #EraLend hacker, which increases the possibility that the same hacker may be involved in both the zkLend and EraLend attacks. We will continue to follow up on this incident
0 reply
0 recast
0 reaction

10zoudonglin pfp
10zoudonglin
@10zoudonglin
0 reply
0 recast
0 reaction

10zoudonglin pfp
10zoudonglin
@10zoudonglin
👍
0 reply
0 recast
0 reaction