CZ Confirms $200K of $1.7M Seedify SFUND Bridge Exploit Blacklisted in Major Security Move
Binance freezes stolen funds as bridge exploit fallout continues.
SECURITY CRACKDOWN
CZ's team blacklists $200K from the $1.7M Seedify SFUND bridge hack—showing exchanges can act faster than regulators when real money's on the line. The swift action prevents further laundering through Binance's channels, though the remaining $1.5M still haunts the ecosystem.
BRIDGE VULNERABILITIES PERSIST
Cross-chain bridges remain crypto's weakest link—this time costing Seedify investors dearly. The exploit highlights how decentralized infrastructure creates centralized points of failure. Yet another reminder that in crypto, sometimes the 'trustless' system requires trusting someone's code.
Market watches closely as blacklisting sets precedent for future exploit responses. Because nothing makes traditional finance guys more nervous than watching exchanges police themselves—unless it's seeing them do it effectively.
Seedify’s security response and audit concerns
Seedify acknowledged the exploit was from compromised developer keys. At around 12:05 UTC, the attackers unlocked the Avalanche bridge contract and changed permissions to be able to mint unauthorized SFUND tokens.
The project highlighted that the contract was submitted to an audit by a well-known company, further highlighting the breach’s sophistication. In spite of this, billions of fake tokens were minted and exchanged for assets such as BNB and ETH.
To mitigate the loss, Seedify hacked down all of the cross-chain bridges, revoked permissions, and liaised with centralized exchanges to freeze associated trading. The team guaranteed that the liquidity on BNB Chain is no longer at stake.
The SFUND token dropped to almost 60%, briefly touching $0.05 before returning to $0.245. After the rebound, the token realized a 42% loss per day, and monthly and year-to-year losses have now increased to 50% and 80%, respectively.
The fall in prices left numerous holders with huge financial losses. Other residents in the community were lamenting, and others tagged blockchain investigators like ZachXBT to trace the stolen money. The co-founder of Seedify promised a bounty to encourage investigators to monitor the hackers.
North Korea’s ongoing cyber footprint
Analysts and blockchain investigators have increasingly linked state-sponsored activities of North Korean groups to major hacks. The Lazarus Group is the infamous cyber unit of the DPRK, reportedly involved in attacks like the Ronin bridge exploit worth over $620 million in 2022.
The SFUND hack evidence indicates that addresses intersect with wallets belonging to Serenity Shield and other historical attacks, which were described as organized by DPRK groups. On-chain data shows stolen funds are transferred using addresses that had been used in previous cybercrime incidents.
Reportedly, hackers had stolen as much as $8.8 million, seemingly an exaggeration. Subsequently, it was established that the stolen amount of SFUND tokens reached $1.2 million, significantly impacting the BNB Chain customers.
Seedify recognized the difficulty but reiterated that it WOULD carry on with the construction. In its most recent announcement, the group indicated that the incident would not hijack its long-term objectives in Web3 development.
KEY Difference Wire helps crypto brands break through and dominate headlines fast