Author: Lisa & 23pds Editor: Sherry background On June 18, 2025, the on-chain detective ZachXBT revealed that Iran’s largest crypto trading platform, Nobitex, was suspected of being hacked, involving abnormalAuthor: Lisa & 23pds Editor: Sherry background On June 18, 2025, the on-chain detective ZachXBT revealed that Iran’s largest crypto trading platform, Nobitex, was suspected of being hacked, involving abnormal

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

2025/06/20 15:00
4분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

Author: Lisa & 23pds

Editor: Sherry

background

On June 18, 2025, the on-chain detective ZachXBT revealed that Iran’s largest crypto trading platform, Nobitex, was suspected of being hacked, involving abnormal transfers of large amounts of assets across multiple public chains.

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

 (https://t.me/investigations)

SlowMist further confirmed that the affected assets in the incident included TRON, EVM and BTC networks, and the initial estimated loss was approximately US$81.7 million.

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

 (https://x.com/slowmist_team/status/1935246606095593578)

Nobitex also issued an announcement confirming that some infrastructure and hot wallets had indeed suffered unauthorized access, but emphasized that user funds were safe.

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

 (https://x.com/nobitexmarket/status/1935244739575480472)

It is worth noting that the attacker not only transferred the funds, but also actively transferred a large amount of assets to a specially designed destruction address. The value of the assets that were "burned" was nearly 100 million US dollars.

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

 (https://x.com/GonjeshkeDarand/status/1935412212320891089)

Timeline

June 18

  • ZachXBT disclosed that the Iranian crypto exchange Nobitex was suspected of being hacked, and a large number of suspicious withdrawal transactions occurred on the TRON chain. SlowMist further confirmed that the attack involved multiple chains, and the initial estimated loss was about 81.7 million US dollars.
  • Nobitex said that the technical team detected illegal access to some infrastructure and hot wallets, and immediately cut off external interfaces and launched an investigation. The vast majority of assets stored in cold wallets were not affected, and the intrusion was limited to some hot wallets used for daily liquidity.
  • The hacker group Predatory Sparrow (Gonjeshke Darande) claimed responsibility for the attack and announced that it would release Nobitex source code and internal data within 24 hours.

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

 (https://x.com/GonjeshkeDarand/status/1935231018937536681)

June 19

  • Nobitex released its fourth statement, saying that the platform has completely blocked external access to the server, and that the hot wallet transfer was "active migration made by the security team to protect funds." At the same time, the official confirmed that the stolen assets were transferred to some wallets with non-standard addresses composed of arbitrary characters, which were used to destroy user assets, totaling about $100 million.
  • The hacker group Predatory Sparrow (Gonjeshke Darande) claims to have burned about $90 million worth of crypto assets, calling it a "sanctions circumvention tool."
  • The hacker group Predatory Sparrow (Gonjeshke Darande) released the Nobitex source code.

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

 (https://x.com/GonjeshkeDarand/status/1935593397156270534)

Source code information

According to the source code information released by the attacker, the folder information is as follows:

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

Specifically, the following contents are involved:

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

The core system of Nobitex is mainly written in Python and deployed and managed using K8s. Based on the known information, we speculate that the attacker may have broken through the operation and maintenance boundary and entered the intranet, which will not be analyzed here.

MistTrack Analysis

The attacker used multiple seemingly legitimate but uncontrollable "destruction addresses" to receive assets. Most of these addresses comply with the on-chain address format verification rules and can successfully receive assets, but once the funds are transferred in, they are permanently destroyed. At the same time, these addresses also contain emotional and provocative words, which are offensive. Some of the "destruction addresses" used by the attacker are as follows:

  • TKFuckiRGCTerroristsNoBiTEXy2r7mNX
  • 0xffFFfFFffFFffFfFffFFfFfFfFFFFfFfFFFFDead
  • 1FuckiRGCTerroristsNoBiTEXXXaAovLX
  • DFuckiRGCTerroristsNoBiTEXXWLW65t
  • FuckiRGCTerroristsNoBiTEXXXXXXXXXXXXXXXXXXX
  • UQABFuckIRGCTerroristsNOBITEX11111111111111111_jT
  • one19fuckterr0rfuckterr0rfuckterr0rxn7kj7u
  • rFuckiRGCTerroristsNoBiTEXypBrmUM

We used the on-chain anti-money laundering and tracking tool MistTrack for analysis, and the incomplete statistics of Nobitex’s losses are as follows:

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

According to MistTrack analysis, the attacker completed 110,641 USDT transactions and 2,889 TRX transactions on TRON:

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

The EVM chains stolen by the attacker mainly include BSC, Ethereum, Arbitrum, Polygon and Avalanche. In addition to the mainstream currencies of each ecosystem, they also include UNI, LINK, SHIB and other tokens.

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

On Bitcoin, the attacker stole a total of 18.4716 BTC, or about 2,086 transactions.

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

On Dogechain, the attacker stole a total of 39,409,954.5439 DOGE, approximately 34,081 transactions.

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

On Solana, the attacker steals SOL, WIF, and RENDER:

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

On TON, Harmony, and Ripple, the attacker stole 3,374.4 TON, 35,098,851.74 ONE, and 373,852.87 XRP respectively:

Nearly $100 million stolen: Iranian exchange Nobitex theft incident

MistTrack has added the relevant addresses to the malicious address database and will continue to pay attention to related chain trends.

Conclusion

The Nobitex incident once again reminds the industry that security is a whole. Platforms need to further strengthen security protection and adopt more advanced defense mechanisms, especially for platforms that use hot wallets for daily operations. SlowMist recommends:

  • Strictly isolate the permissions and access paths of cold and hot wallets, and regularly audit the hot wallet call permissions;
  • Use on-chain real-time monitoring systems (such as MistEye) to obtain comprehensive threat intelligence and dynamic security monitoring in a timely manner;
  • Cooperate with on-chain anti-money laundering systems (such as MistTrack) to promptly detect abnormal fund flows;
  • Strengthen emergency response mechanisms to ensure effective response within the golden window after an attack occurs.
  • The incident is still under investigation, and the SlowMist security team will continue to follow up and update the progress in a timely manner.
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!