The recent developments in the AI industry have contributed significantly to the technology industry in many ways. The recent use of this advanced technology in detecting crypto exploitation is another such example, highlighting the potential benefits of this sector in everyday life. Although the crypto market has been in a prolonged downturn, the exploiters have not stopped their activities.
AI-powered system detects crypto exploitation on WOOFi
In recent years, such malicious actors have continued to improve their techniques and use of technology. According to the reports, the methods such people use have continued to evolve over time. As a result, these actors have remained effective at targeting unsuspecting crypto users. Despite increasing awareness of how such actors entice their targets, their exclusive and unique techniques continue to deceive people.
In the latest incident, an attacker misused a huge amount of Ether, up to $8.5 million. Ethereum (ETH) has secured a pivotal position among crypto assets as the 2NL-largest cryptocurrency. The reports have revealed that the attacker used Tornado Cash to successfully perform the exploit. Cyvers Alerts, a platform that provides real-time security alerts, has detected the exploit in question.
🚨UPDATE🚨@_WOOFi’s WooPPV2 contract has been exploited on ARB! and our AI-powered system detected the attacker’s malicious transactions!👇
The total loss is $8.5 million. The attacker was funded by @TornadoCash on $ETH.
The attacker began to distrust stolen money to various EOA and other… https://t.co/hYf0F3QwHS pic.twitter.com/1s9NtbkabI— 🚨 Cyvers Alerts 🚨 (@CyversAlerts) March 5, 2024
It took to its official X account and announced that WOOFi’s WooPPV2 contract had witnessed exploitation. In addition, the company’s system was also found to be AI-driven and efficiently detects malicious transfers. According to Cyvers Alerts, the attacker is responsible for carrying out the transfers in question.
The exploiter uses bridges to distribute stolen money across various chains
It added that the attacker began distributing the exploited funds to various chains. For this purpose, the exploiter reportedly used bridges. Continuing, it added that its team has terminated vulnerable contracts. According to this, consumers on Cyvers are now safe while the company keeps a constant eye on them.