{"id":67688,"date":"2022-09-26T15:30:25","date_gmt":"2022-09-26T12:30:25","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=67688"},"modified":"2025-09-07T08:00:52","modified_gmt":"2025-09-07T05:00:52","slug":"hackers-stole-an-additional-950000-due-to-profanity-vulnerability","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/hackers-stole-an-additional-950000-due-to-profanity-vulnerability\/","title":{"rendered":"Hackers stole an additional $950,000 due to Profanity vulnerability"},"content":{"rendered":"<p>PeckShield analysts recorded a theft of around 732 ETH (about $950,000) from an Ethereum address generated with the Profanity vanity-address generator. <\/p>\n<figure class=\\\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\\\">\n<div class=\\\"wp-block-embed__wrapper\\\">\n<blockquote class=\\\"twitter-tweet\\\" data-width=\\\"500\\\" data-dnt=\\\"true\\\">\n<p lang=\\\"en\\\" dir=\\\"ltr\\\"><a href=\\\"https:\/\/twitter.com\/hashtag\/PeckShieldAlert?src=hash&#038;ref_src=twsrc%5Etfw\\\">#PeckShieldAlert<\/a> Seems like $950k worth of crypto has been stolen by 0x9731F from Ethereum \u201cvanity address\u201d generated with a tool called Profanity. The exploiter already transferred ~732 <a href=\\\"https:\/\/twitter.com\/search?q=%24ETH&#038;src=ctag&#038;ref_src=twsrc%5Etfw\\\">$ETH<\/a> into Mixer <a href=\\\"https:\/\/t.co\/QOZfnE49H4\\\">pic.twitter.com\/QOZfnE49H4<\/a><\/p>\n<p>\u2014 PeckShieldAlert (@PeckShieldAlert) <a href=\\\"https:\/\/twitter.com\/PeckShieldAlert\/status\/1574286302501306368?ref_src=twsrc%5Etfw\\\">September 26, 2022<\/a><\/p><\/blockquote>\n<p><script async src=\\\"https:\/\/platform.twitter.com\/widgets.js\\\" charset=\\\"utf-8\\\"><\/script>\n<\/div>\n<\/figure>\n<p>On September 25, the hacker stole the funds and sent them to the cryptocurrency mixer Tornado Cash, which had previously been <a href=\"https:\/\/u1f987.com\/en\/news\/us-sanctions-tornado-cash-the-ethereum-mixer\">sanctioned by the United States<\/a>.<\/p>\n<p>The Profanity vulnerability was discovered on GitHub back in January, but it gained wide attention thanks to <a href=\"https:\/\/u1f987.com\/en\/news\/uber-hack-europes-record-ddos-attack-and-other-cybersecurity-events\">the 1inch Network team<\/a>.<\/p>\n<p>The tool allowed generating readable Ethereum addresses (vanity addresses) containing words, names or phrases. 1inch Network experts warned that keys to such addresses can be brute-forced\u2014a systematic enumeration of all possible character combinations.<\/p>\n<p>This incident marked the third vanity-address theft in the month.<\/p>\n<p>Earlier, using the vulnerability, attackers drained Ethereum wallets around <a href=\"https:\/\/u1f987.com\/en\/news\/hackers-stole-about-3-3-million-through-vulnerability-in-profanity-ethereum-address-generator\">$3.3 million<\/a>. Later, the exploit was used for <a href=\"https:\/\/u1f987.com\/en\/news\/experts-tie-wintermutes-160-million-hack-to-vanity-address-generator-vulnerability\">the $160 million theft from market maker Wintermute<\/a>.<\/p>\n<p>Follow ForkLog&#8217;s bitcoin news on our <a href=\\\"https:\/\/telegram.me\/forklog\\\" target=\\\"_blank\\\" rel=\\\"nofollow noopener\\\">Telegram<\/a> \u2014 crypto news, prices and analytics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PeckShield analysts recorded a theft of around 732 ETH (about $950,000) from an Ethereum address generated with the Profanity vanity-address generator.<\/p>\n","protected":false},"author":1,"featured_media":67689,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1301,1154],"class_list":["post-67688","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-blockchain-vulnerabilities","tag-crimes"],"aioseo_notices":[],"amp_enabled":true,"views":"27","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/67688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=67688"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/67688\/revisions"}],"predecessor-version":[{"id":67690,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/67688\/revisions\/67690"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/67689"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=67688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=67688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=67688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}