Scan to download
BTC $65,462.43 -3.73%
ETH $1,883.79 -4.56%
BNB $593.75 -5.01%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $557.27 -1.01%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%
BTC $65,462.43 -3.73%
ETH $1,883.79 -4.56%
BNB $593.75 -5.01%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $557.27 -1.01%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%

Nearly 100 million dollars destroyed: A review of the Nobitex theft incident in Iran

Summary: Iran's largest cryptocurrency trading platform, Nobitex, has suffered a hacker attack, with on-chain detectives ZachXBT and the Slow Mist team confirming losses of up to $81.7 million. The hacker group "Looting Sparrow" claims responsibility for the incident, having not only stolen assets but also deliberately transferred nearly $100 million worth of cryptocurrency to a specially created burn address. The attack involved multiple public chains, including TRON, EVM, and BTC, and the hackers subsequently released the platform's source code. Slow Mist recommends that exchanges strengthen the isolation of hot and cold wallets, deploy real-time monitoring systems, and improve emergency response mechanisms. This incident once again highlights the urgency of security protection in the cryptocurrency industry.
Slowmist
2025-06-19 22:30:51
Collection
Iran's largest cryptocurrency trading platform, Nobitex, has suffered a hacker attack, with on-chain detectives ZachXBT and the Slow Mist team confirming losses of up to $81.7 million. The hacker group "Looting Sparrow" claims responsibility for the incident, having not only stolen assets but also deliberately transferred nearly $100 million worth of cryptocurrency to a specially created burn address. The attack involved multiple public chains, including TRON, EVM, and BTC, and the hackers subsequently released the platform's source code. Slow Mist recommends that exchanges strengthen the isolation of hot and cold wallets, deploy real-time monitoring systems, and improve emergency response mechanisms. This incident once again highlights the urgency of security protection in the cryptocurrency industry.

Author: Lisa & 23pds

Editor: Sherry

Background

On June 18, 2025, on-chain detective ZachXBT disclosed that Nobitex, Iran's largest cryptocurrency exchange, was suspected of being hacked, involving abnormal large asset transfers across multiple public chains.

Image

(https://t.me/investigations) SlowMist further confirmed that the affected assets in the incident covered TRON, EVM, and BTC networks, with preliminary estimated losses of about $81.7 million.

Image

(https://x.com/slowmist_team/status/1935246606095593578)

Nobitex also released a statement confirming that some infrastructure and hot wallets had indeed experienced unauthorized access, but emphasized that user funds were safe.

Image

(https://x.com/nobitexmarket/status/1935244739575480472)

It is noteworthy that the attackers not only transferred funds but also actively moved a large amount of assets to specially created burn addresses, with the "burned" assets valued at nearly $100 million.

Image

(https://x.com/GonjeshkeDarand/status/1935412212320891089)

Timeline

June 18

  • ZachXBT disclosed that the Iranian cryptocurrency exchange Nobitex was suspected of being hacked, with a large number of suspicious withdrawal transactions occurring on the TRON chain. SlowMist further confirmed that the attack involved multiple chains, with preliminary estimated losses of about $81.7 million.
  • Nobitex stated that its technical team detected unauthorized access to some infrastructure and hot wallets, and immediately cut off external interfaces and initiated an investigation. The vast majority of assets stored in cold wallets were unaffected; this intrusion was limited to a portion of hot wallets used for daily liquidity.
  • The hacker group Predatory Sparrow (Gonjeshke Darande) claimed responsibility for the attack and announced that they would release Nobitex's source code and internal data within 24 hours.

Image

(https://x.com/GonjeshkeDarand/status/1935231018937536681)

June 19

  • Nobitex released its fourth statement, indicating that the platform had completely blocked external access to its servers, and that the hot wallet transfers were "proactive migrations made by the security team to protect funds." At the same time, the official confirmed that the stolen assets were transferred to wallets with non-standard addresses composed of arbitrary characters, which were used to destroy user assets, totaling about $100 million.
  • The hacker group Predatory Sparrow (Gonjeshke Darande) claimed to have burned approximately $90 million worth of cryptocurrency assets, referring to them as "sanction evasion tools."

  • The hacker group Predatory Sparrow (Gonjeshke Darande) publicly released Nobitex's source code.

    Image

(https://x.com/GonjeshkeDarand/status/1935593397156270534)

Source Code Information

According to the source code information released by the attackers, the folder information is as follows:

Image

Specifically, it involves the following content:

Image

Nobitex's core system is primarily written in Python and uses K8s for deployment and management. Based on known information, we speculate that the attackers may have breached operational boundaries to enter the internal network, which will not be analyzed further here.

MistTrack Analysis

The attackers used multiple seemingly legitimate but actually uncontrollable "burn addresses" to receive assets. Most of these addresses comply with on-chain address format validation rules and can successfully receive assets, but once funds are transferred in, they are effectively permanently destroyed. Additionally, these addresses contain emotional and provocative language, indicating an attack intent. Some of the "burn addresses" used by the attackers are as follows:

  • TKFuckiRGCTerroristsNoBiTEXy2r7mNX
  • 0xffFFfFFffFFffFfFffFFfFfFfFFFFfFfFFFFDead
  • 1FuckiRGCTerroristsNoBiTEXXXaAovLX
  • DFuckiRGCTerroristsNoBiTEXXXWLW65t
  • FuckiRGCTerroristsNoBiTEXXXXXXXXXXXXXXXXXXX
  • UQABFuckIRGCTerroristsNOBITEX1111111111111111_jT
  • one19fuckterr0rfuckterr0rfuckterr0rxn7kj7u
  • rFuckiRGCTerroristsNoBiTEXypBrmUM

We used the on-chain anti-money laundering and tracking tool MistTrack for analysis, and Nobitex's losses are partially summarized as follows: Image

According to MistTrack analysis, the attackers completed 110,641 USDT transactions and 2,889 TRX transactions on TRON:

Image

The assets stolen by the attackers on EVM chains mainly include BSC, Ethereum, Arbitrum, Polygon, and Avalanche, covering not only mainstream coins in each ecosystem but also various tokens such as UNI, LINK, and SHIB.

Image

On Bitcoin, the attackers stole a total of 18.4716 BTC, approximately 2,086 transactions.

Image

On Dogechain, the attackers stole a total of 39,409,954.5439 DOGE, approximately 34,081 transactions.

Image

On Solana, the attackers stole SOL, WIF, and RENDER:

Image

On TON, Harmony, and Ripple, the attackers stole 3,374.4 TON, 35,098,851.74 ONE, and 373,852.87 XRP, respectively:

Image

MistTrack has added the relevant addresses to the malicious address database and will continue to monitor related on-chain movements.

Conclusion

The Nobitex incident serves as a reminder to the industry: security is a whole, and platforms need to further strengthen security protections, adopting more advanced defense mechanisms, especially for platforms that use hot wallets for daily operations. SlowMist recommends:

  • Strictly isolate the permissions and access paths of hot and cold wallets, and regularly audit hot wallet access permissions;
  • Use on-chain real-time monitoring systems (such as MistEye) to obtain comprehensive threat intelligence and dynamic security monitoring in a timely manner;
  • Collaborate with on-chain anti-money laundering systems (such as MistTrack) to promptly detect abnormal fund flows;

  • Strengthen emergency response mechanisms to ensure effective responses within the golden window after an attack occurs.

The investigation into the incident is still ongoing, and the SlowMist security team will continue to follow up and provide timely updates on the progress.

warnning Risk warning
app_icon
ChainCatcher Building the Web3 world with innovations.