Back to Blog

非法资金流动案例研究:5500万美元DAI网络钓鱼

MetaSleuth
November 6, 2024
3 min read

案件背景

2024年8月20日,一起网络钓鱼事件导致超过5400万枚稳定币DAI被盗。被盗地址是一个由Gemini资助的金库,关联的“Maker金库所有者”地址是0xf2b8。网络钓鱼者诱骗受害者(金库的原始所有者)签署一笔交易,将金库所有者更改为攻击者控制的地址,然后执行交易来清空金库。

资金流向分析

2024年8月20日,受害金库的原始所有者被诱骗签署了一笔交易,将金库所有者更改为攻击者控制的地址。大约五个小时后,攻击者发送了一笔交易,将所有权进一步更改为新的地址。在新地址获得金库的完全控制权20分钟后,它签署了一笔交易,将5500万DAI从金库转移走。

随后,在两个小时内,所有非法获得的DAI代币都被转移到攻击者控制的下游地址,而最初清空金库的地址已空无一文。直接与地址0x5D4b(即距离初始地址一个跳点)连接的下游地址共有六个。大部分DAI代币(4400万)被直接转移到下游地址,而1000万枚则兑换成原生代币(3880)ETH,然后转移到地址0x8cc5。用于兑换的DEX是CoW Protocol: GPv2Settlement。兑换交易:0x7c63

被盗DAI从原始地址0x5D4b到1跳下游地址的资金流向图。

将非法资金转移到1跳下游地址后,攻击者开始分批将资金进一步转移到更深的地址。在转移过程中,攻击者逐渐将下游地址持有的DAI兑换成ETH。在距离初始地址4跳的下游地址,所有被盗DAI已被兑换成ETH。这些非法资产以ETH的形式,随后流入中心化交易所(eXch, KuCoin, ChangeNOW)和跨链桥(THORChain, Hop Protocol)。 (点击名称即可查看这些套现地址。)将非法收益存入eXch的交易示例:0x2e42, 0xa982, 0x1e1e, 0xb7a9。将非法收益转移到THORChain的交易示例:0x5c06, 0xf824, 0x391e

部分资金从layer2地址(距离初始地址2跳)流向layer5地址:

在将非法收益转移到深层下游地址的过程中,最长的转移路径达到了12跳,其中约8万美元被转移到交易所KuCoin 17。如下图所示的资金流向图,在2024年8月21日至8月22日期间,攻击者通过12跳路径,分批将38 ETH转移到了中心化交易所。

为了避免引起过多关注,犯罪分子倾向于将大笔资金分配到多个地址,并使用小额转账将资产转移到更深的地址。以下是一个将165万DAI拆分成36个小额转账的例子,由1跳地址0x860c处理:

部分相关地址和交易

地址 交易 非法资金流向
0x860cf33bdc076f42edbc66c6fec30aa9ee99f073 0xa11e, 0x9ef1 1,650,000 DAI
0xdd6397104d57533e507bd571ac88c4b24852bce9 0x7af2, 0x1d45 36,733,858 DAI
0x8cc568f3565a7ed44b3b0af8765a7ef67b8bc2dc 0x7e10, 0x5d08 3879 ETH + 1,825,000 DAI
0xca6061c6e5a7c3657297f9cc45ce110dc4d14470 0xee0d 875 ETH
0x77b9f7e33e42b1f64b915bb27e9a9bca199da83e 0xf97a, 0xbc5c 2164 ETH

资金流向概览:

在MetaSleuth中探索详情: https://metasleuth.io/result/eth/0x5d4b2a02c59197eb2cae95a6df9fe27af60459d4?source=c81289c1-2bd9-49af-a397-e4cc71990595

Sign up for the latest updates
Newsletter - April 2026
Security Insights

Newsletter - April 2026

In April 2026, the DeFi ecosystem experienced three major security incidents. KelpDAO lost ~$290M due to an insecure 1-of-1 DVN bridge configuration exploited via RPC infrastructure compromise, Drift Protocol suffered ~$285M from a multisig governance takeover leveraging Solana's durable nonce mechanism, and Rhea Finance incurred ~$18.4M following a business logic flaw in its margin-trading module that allowed circular swap path manipulatio

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly
Security Insights

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly

This BlockSec weekly security report covers eight attack incidents detected between April 20 and April 26, 2026, across Ethereum, Avalanche, Sui, Base, HyperLiquid, and MegaETH, with total estimated losses of approximately $7.04M. The highlighted incident is the $1.3M GiddyDefi exploit, where the attacker did not break any cryptography or use a flash loan but simply replayed an existing on-chain EIP-712 signature with the unsigned `aggregator` and `fromToken` fields swapped out for a malicious contract, demonstrating how partial signature coverage turns any historical signature into a generic permit. Other incidents include a $3.5M Volo Vault operator key compromise on Sui, a $1.5M Purrlend privileged-role takeover, a $413K SingularityFinance oracle misconfiguration, a $142.7K Scallop cross-pool index injection, a $72.35K Kipseli Router decimal mismatch, a $50.7K REVLoans (Juicebox) accounting pollution, and a $64K Custom Rebalancer arbitrary-call exploit.

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis
Security Insights

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis

This BlockSec deep-dive analyzes the KelpDAO $290M rsETH cross-chain bridge exploit (April 18, 2026), attributed to the Lazarus Group, tracing a causal chain across three layers: how a single-point DVN dependency enabled the attack, how DeFi composability cascaded the damage through Aave V3 lending markets to freeze WETH liquidity exceeding $6.7B across Ethereum, Arbitrum, Base, Mantle, and Linea, and how the crisis forced decentralized governance to exercise centralized emergency powers. The article examines three parameters that shaped the cascade's severity (LTV, pool depth, and cross-chain deployment count) and provides an exclusive technical breakdown of Arbitrum Security Council's forced state transition, an atomic contract upgrade that moved 30,766 ETH without the holder's signature.

Go Deeper with MetaSleuth Investigation

Extend your crypto compliance capabilities with Blocksec's MetaSleuth Investigation, the first platform for tracing funds, mapping transaction networks and revealing hidden on-chain relationships.

Move from detection to resolution faster with clear visual insights and evidence-ready workflows across the digital assets ecosystem.

MetaSleuth Investigation