In December 2021, BitMart Exchange experienced a significant security incident where hackers used stolen private keys to steal approximately $196 million worth of crypto assets from hot wallets.Affected assets included BTC, Ethereum, Binance Smart Chain tokens, and others.
This program seeks to identify those responsible for the BitMart breach, trace stolen assets, and facilitate fund recovery. Verified contributions will be rewarded, with additional bounties for successful recoveries. White-hat participants who provide verified key information will be eligible for rewards. A percentage of the recovered amount will be distributed as a bounty to those who made significant contributions.
In December 2021, BitMart Exchange experienced a significant security incident where hackers used stolen private keys to steal approximately $196 million worth of crypto assets from hot wallets.Affected assets included BTC, Ethereum, Binance Smart Chain tokens, and others.
This program seeks to identify those responsible for the BitMart breach, trace stolen assets, and facilitate fund recovery. Verified contributions will be rewarded, with additional bounties for successful recoveries. White-hat participants who provide verified key information will be eligible for rewards. Additionally, if the stolen assets are successfully recovered, a percentage of the recovered amount will be distributed as a bounty to those who made significant contributions.
We seek verified intelligence related to the BitMart hot wallet theft on December 4, 2021 (UTC). This includes but is not limited to:
Submissions lacking forensic value, repeating known data without new context, or providing unverifiable claims will not be eligible for rewards.
Hacker Address | Type of Asset |
---|---|
0x39fb0dcd13945b835d47410ae0de7181d3edf270 |
ETH |
0x4bb7d80282f5e0616705d7f832acfc59f89f7091 |
ETH |
0x8eafee3d0df538a1e04487a43239c1c73b50032d |
ETH |
0xAf631C6EebFC5Ff3a267788bafa52A18670D577c |
ETH |
0x132f8cEEfE9ea00e1DbC06b32f625864BA21d66c |
ETH |
0xC47A987521e2E646423ac92b1Eb0b3cB2193625D |
ETH |
0xa9e4332448318da58cdd398286c0809684ed9bd4 |
ETH |
0x402be63f5d8189f8027d429b8588df4f0aec9f53 |
ETH |
0xe68a520f67c0225b7856bb9496dfc6b476217256 |
ETH |
0xb4f8abad5d64f7132c74013569d55a6ac9bbaa1d |
ETH |
0xf082af2426ee0d626c75597649f8f8fe0b5fbeee |
ETH |
0x6723736dd131c0baed60d712d8e569fe6e9509b0 |
ETH |
0x041afe8c155997de612d69f3ff0287ae58504246 |
ETH |
0x25fb126b6c6b5c8ef732b86822fa0f0024e16c61 |
BSC |
3Nsop3FW7jjjTKd6MkLc6qjyWuAm9XLU81 |
BTC |
0x59E55AC0cb34358B9511bbB3f3C1327BD40523E5 |
AVAX |
bnb15r4fzmhjv54ncf4f0cvmjvadjgwffd93gf56qv |
Binance Chain |
TL1NRNDe3babg3zZywe8PC1tTMta1mqkTX |
TRON |
TBTPmRe7Lpjka6Koxr2v7CrAocCNGZKsW5 |
TRON |
TGScTPMkm3MDF8T3xpUzb7u3jXUV4qcBYm |
TRON |
0x673B380f1667b2f9A216Fd1eBB6225Ee75cC7d55 |
VeChain |
0xbb3fd383d1c5540e52ef0a7bcb9433375793aeaf |
VeChain |
0x6f39fa0096b075becdb2c46c62976e92f03ca104 |
VeChain |
0x8cbcc75678cd88e3d450941dcd3d27b560a6ecba |
THETA |
119.91.93.28
(Discovered in Dec 2021)38.102.175.100
(Discovered in Dec 2021)Submissions should include:
Important data that directly identifies the attacker or connects them to individuals, groups, or APT organizations, or significantly increases the likelihood of recovering funds. This includes sensitive personal identification information (e.g., personal email, phone number, ID number, home address, social relationships) or CEX account information directly tied to the stolen assets.
Indirect intelligence that helps identify the attacker, such as IP addresses, domain names, or evidence that indirectly links the attacker to individuals, groups, or APT organizations.