{"id":18595,"date":"2024-11-14T15:52:28","date_gmt":"2024-11-14T13:52:28","guid":{"rendered":"https:\/\/forklog.com\/en\/trader-loses-25-8-million-due-to-address-error\/"},"modified":"2024-11-14T15:52:28","modified_gmt":"2024-11-14T13:52:28","slug":"trader-loses-25-8-million-due-to-address-error","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/trader-loses-25-8-million-due-to-address-error\/","title":{"rendered":"Trader Loses $25.8 Million Due to Address Error"},"content":{"rendered":"<p>A user known by the pseudonym qklpjeth <a href=\"https:\/\/x.com\/qklpjeth\/status\/1855491535833608687\">lost<\/a> access to 7912 ezETH (valued at $25.8 million at the time of writing) by sending them to the wrong address.<\/p>\n<p><!--more--><\/p>\n<p>The affected individual stated that on June 19, he accidentally copied incorrect data and sent the tokens to a smart contract with no withdrawal option. qklpjeth attempted to resolve the issue with the help of Renzo developers, who could have updated the code to unlock the funds, but they were unable to assist, citing &#8220;regulatory constraints.&#8221;<\/p>\n<p>On November 10, the user sought help from the community, offering 10% of the amount (~$2.5 million) as a reward for the return of the funds.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Urgent Request for Help!<\/p>\n<p>To all skilled hackers and white hats out there: I\u2019ve lost a significant sum of funds in a contract and urgently need help recovering it. If you can successfully retrieve the funds, I\u2019ll immediately offer a 10% reward, which is approximately $2.5 million\u2026<\/p>\n<p>\u2014 \u6211\u6709\u4e00\u4e2a\u72d7\u738b\u68a6 (@qklpjeth) <a href=\"https:\/\/twitter.com\/qklpjeth\/status\/1855491535833608687?ref_src=twsrc%5Etfw\">November 10, 2024<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>One commentator <a href=\"https:\/\/x.com\/Dexaran\/status\/1856000084053524718\">linked<\/a> qklpjeth&#8217;s issues to flaws in the ERC-20 standard that have been overlooked since 2017. He noted that a similar transaction with ETH would simply result in an error, but this mechanism does not work with tokens.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">I&#8217;m a hacker, not whitehat btw (<a href=\"https:\/\/t.co\/g7nwrRVUBF\">https:\/\/t.co\/g7nwrRVUBF<\/a>)<\/p>\n<p>You suffered because of a security issue in <a href=\"https:\/\/twitter.com\/hashtag\/ERC20?src=hash&#038;ref_src=twsrc%5Etfw\">#ERC20<\/a> standard that I reported to <a href=\"https:\/\/twitter.com\/ethereum?ref_src=twsrc%5Etfw\">@ethereum<\/a> in 2017 and they didnt bother fixing it.<\/p>\n<p>I already wrote a thread about that here:<a href=\"https:\/\/t.co\/UIxuo5RA2S\">https:\/\/t.co\/UIxuo5RA2S<\/a><a href=\"https:\/\/twitter.com\/hashtag\/ERC223?src=hash&#038;ref_src=twsrc%5Etfw\">#ERC223<\/a><\/p>\n<p>\u2014 Dexaran (@Dexaran) <a href=\"https:\/\/twitter.com\/Dexaran\/status\/1856000084053524718?ref_src=twsrc%5Etfw\">November 11, 2024<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Harrison Seletsky, Director of Development at SPACE ID, <a href=\"https:\/\/cointelegraph.com\/news\/trader-loses-26-million-copy-paste-error-max-pain\">called<\/a> this situation a &#8220;wake-up call&#8221; and urged the industry to improve user experience.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\n<cite>\u201cIt\u2019s astonishing that simple copy-paste errors still cost people millions in cryptocurrency,\u201d the expert commented.<\/cite><\/p><\/blockquote>\n<p>Previously, an unnamed trader missed out on more than $1.6 million in profits due to a hasty sale of meme tokens.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A user known by the pseudonym qklpjeth lost access to 7912 ezETH (valued at $25.8 million at the time of writing) by sending them to the wrong address.<\/p>\n","protected":false},"author":1,"featured_media":18594,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1111,791],"class_list":["post-18595","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity","tag-erc-20"],"aioseo_notices":[],"amp_enabled":true,"views":"319","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/18595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=18595"}],"version-history":[{"count":0,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/18595\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/18594"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=18595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=18595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=18595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}