Matt Furie and Favrr Hacked: Losses over $1M & DPRK Connection

Blockchain 2025-07-18 18:18

Matt Furie and Favrr hacked: losses over $1M & DPRK connection linked to Replicandy and Hedz attacks – ZachXBT investigation reveals complex scheme. On-chain analysis shows the attacker gained control over key contracts via pre-transferred ownership rights. The attacker also coordinated actions through a chain of addresses linked to previously identified wallets and developers using GitHub pseudonyms, VPNs, and inconsistencies in time zones and language settings.

ByBIt-logo-white@2x Score Up to $30,050 on Bybit — Just for Trading Start Trading

Attack on Replicandy and ChainSaw NFT Projects – Contract Takeover and Market Crash

1/ Multiple projects tied to Pepe creator Matt Furie & ChainSaw as well as another project Favrr were exploited in the past week which resulted in ~$1M stolen

My analysis links both attacks to the same cluster of DPRK IT workers who were likely accidentally hired as developers. pic.twitter.com/85JRm5kLQO

— ZachXBT (@zachxbt) June 27, 2025

Let’s start from the beginning – the incident on June 18, 2025, when the smart contract of the Replicandy NFT project, developed by Matt Furie in partnership with ChainSaw, was transferred to a new EOA address 0x9Fca. On the same day at 18:20 UTC, the contract’s minting proceeds were withdrawn, and already the next day, June 19 at 5:11, the same address unpaused the contract, initiating a second token issuance. The attacker exploited this as follows: they minted new NFTs and immediately dumped them into the liquidity pool, causing a sharp collapse in the floor price.

On June 23, a similar scenario was repeated: the same address 0x9Fca gained control over the contracts of the Replicator, Hedz, and Zogz projects. In all cases, ownership was transferred from ChainSaw’s technical deployer to the attacker. Then, the same actions were followed: minting, aggressive sell-off, and market liquidation. According to ZachXBT, the total damage across these four collections amounted to about $310,000. The main transactions passed through three addresses, one of which – 0x91bd – became a key node for consolidation and routing funds to centralized platforms.

Favrr and $FAVRR – Listing Exploit and $680K Withdrawn via MEXC and Gate

The largest incident was still ahead, specifically, the exploit session of the Favrr project, focused on a Web3 marketplace and the $FAVRR token. On June 25, at the moment of the token’s DEX listing, abnormal activity was detected, accompanied by a loss of contract control and the withdrawal of a significant amount of funds. According to ZachXBT, over $680,000. Token flow analysis showed that the funds were transferred to address 0x477, associated with the so-called “ITW consolidation” – a structure through which payments to potential DPRK IT specialists are routed.

Transaction tracing also revealed a second payroll address, which sent funds to a Gate exchange deposit address (0xab7). This formed the basis for the conclusion that at least two IT specialists involved in the attack were embedded in the Favrr team. One of them is believed to have operated under the pseudonym Alex Hong – the project’s CTO, whose LinkedIn profile was deleted shortly after the incident. According to ZachXBT, the workplaces he claimed could not be verified during due diligence, further reinforcing suspicions of his affiliation with the North Korean cluster.

On-Chain Links and the DPRK ITW Cluster: GitHub Accounts, VPN, Time Zones

This was a far-reaching investigation, and it also highlighted other aspects of the scheme. In particular, GitHub profiles devmad119 and sujitb2114 were identified, containing wallet addresses in public repositories that participated in the attacks. According to ZachXBT, these accounts were used to secure front-end and smart contract work through Web3 communities and likely belonged to DPRK IT specialists.

Internal logs and behavioral analysis confirm additional anomalies: system language set to Korean, active use of Astral VPN, and a mismatch between the stated location in the US and a time zone set to Asia/Seoul or Russia Standard Time.

Several addresses related to fund withdrawal led to a consolidation and cash-out scheme via centralized exchanges. For example, 2.05 ETH was sent to Exchange 1 (likely MEXC) on June 18, followed by a related receipt of 5,007 USDT at another address linked to the exchange. One of the key routes, 0xf87, made it possible to uncover additional payment flows ranging from $2K to $10K per month, indicating a persistent compensation system used to finance the ITW group across several projects.

Another strong investigation by ZachXBT, who once again played a vital role. Their earlier work on the Bybit exploit also revealed a vulnerability in a third-party provider and the likely involvement of North Korean hackers. Without the degree of investigative transparency provided by ZachXBT, it is unclear whether balances and even platform liquidity could have been restored so quickly.

ByBIt-logo-white@2x Score Up to $30,050 on Bybit — Just for Trading Start Trading

Conclusion

With more money flowing into Web3, it becomes an increasingly attractive target for attackers. We are also seeing rising activity from North Korean hackers and a systemic approach to infiltrating projects by posing as developers.

All of this requires extreme vigilance from Web3 builders when designing security architectures, and calls users to exercise maximum caution. Stay tuned for the latest updates in crypto, blockchain, and DeFi.

Share to:

This content is for informational purposes only and does not constitute investment advice.

Curated Series

XRP News and Research

XRP News and Research

This series focuses on XRP, covering the latest news, market dynamics, and in-depth research. Featured analysis includes price trends, regulatory developments, and ecosystem growth, providing a clear overview of XRP's position and potential in the cryptocurrency market.

SuperEx Popular Science Articles Column

SuperEx Popular Science Articles Column

This collection features informative articles about SuperEx, aiming to simplify complex cryptocurrency concepts for a wider audience. It covers the basics of trading, blockchain technology, and the features of the SuperEx platform. Through easy-to-understand content, it helps users navigate the world of digital assets with confidence and clarity.

How do beginners trade options?How does option trading work?

How do beginners trade options?How does option trading work?

This special feature introduces the fundamentals of options trading for beginners, explaining how options work, their main types, and the mechanics behind trading them. It also explores key strategies, potential risks, and practical tips, helping readers build a clear foundation to approach the options market with confidence.

What are the risks of investing in cryptocurrency?

What are the risks of investing in cryptocurrency?

This special feature covers the risks of investing in cryptocurrency, explaining common challenges such as market volatility, security vulnerabilities, regulatory uncertainties, and potential scams. It also provides analysis of risk management strategies and mitigation techniques, helping readers gain a clear understanding of how to navigate the crypto market safely.

Bitcoin historical price data and trends

Bitcoin historical price data and trends

This special feature gathers multiple articles on Bitcoin’s historical price data, analyzing past trends, market cycles, and key events that shaped its value. It also explores factors influencing price movements, providing readers with insights into Bitcoin’s long-term performance and market patterns.