The hacker that managed to steal $16 million-worth of ethereum from Cryptopia two weeks ago is at it again. According to a post published on the Elementus blog this Wednesday, the New Zealand-based cryptocurrency has lost control of its clients’ ethereum wallets.
Apparently, the hacker managed to siphon off another 1,675 ether tokens, worth approximately $175,000, from 17,000 accounts on the exchange.
And, according to Elementus, 5,000 of the users’ affected by the hack were part of the contingent of traders who had been stolen from in the original attack.
That means that many users seem unaware that the attack had even happened as they had topped up their accounts with more ethereum.
Some users may simply be unaware of the fact that Cryptopia has been hacked. Alternatively, they may be receiving funds from mining pools which are automatically depositing funds into their Cryptopia wallet.
No comment from Cryptopia
Though it did address the fact that it had been hacked two weeks ago, Cryptopia has yet to make any comment regarding the allegations made on Wednesday.
ACY Securities Asia Trading Cup Returns for 2nd YearGo to article >>
— Cryptopia Exchange (@Cryptopia_NZ) January 28, 2019
More worrying is the fact that the exchange is supposed to be on lock-down. The exchange’s website is not operational and, on its Twitter account, the firm said that it is currently undergoing maintenance as the police investigate the prior hack.
The fact that the hacker was still able to continue his attack, after more than two weeks, would seem to indicate that Cryptopia has lost total control of its clients’ ethereum wallets.
Elementus employees were able to trace the public key of the hacker and identify the wallets to which they sent the stolen cash. Unfortunately, that likely won’t be of much help to police or anyone else investigating the crime.
Unless the hacker made some sort of bizarre slip-up that would enable authorities to match their public key to a real-life persona, nothing can really be done to retrieve the stolen funds.