Sillytuna: 24 Million Stolen with Address Poisoning
  • Home
  • Hack
  • Sillytuna: 24 Million Stolen with Address Poisoning
By Hamza Ahmed profile image Hamza Ahmed
2 min read

Sillytuna: 24 Million Stolen with Address Poisoning

A combined digital and physical attack emptied Sillytuna's wallet: 24 million in aEthUSDC disappeared through address poisoning, real violence and laundered funds in Monero.

The cryptocurrency ecosystem is again in shock after the news of an unprecedented attack on a well-known digital asset holder, identified as Sillytuna. The incident, which resulted in the loss of approximately $24 million in aEthUSDC, not only represents a massive financial loss, but marks a disturbing turning point due to the involvement of physical violence and direct threats.

The Mechanics of Theft: Address Poisoning

The attack began through a sophisticated technique known as address poisoning. In this type of scam, criminals create a 'look-alike' address that almost perfectly mimics that of a victim's usual recipient. By sending a transaction of insignificant value, the malicious address appears in the wallet's activity history.

The scam exploits a common habit among users: copying addresses from recent transactions without checking each individual character. In Sillytuna's case, the compromised address (0xd2e8...ca41) was emptied of aEthUSDC, transferring the fortune into the hands of the attackers in a matter of moments.

Violence and seizures : The Dark Side of 2025

What makes this case particularly serious is the coercive component. Sillytuna has confirmed via the X platform that the attack was not just digital. The incident involved weapons, physical violence and kidnapping threats. Police authorities have already been alerted and are investigating the dynamics of the events.

This incident is part of an alarming trend documented by blockchain security company CertiK. According to their data, 2025 was the most violent year in cryptocurrency history, with as many as 72 incidents recorded. Physical attacks against crypto holders increased by 75 per cent over the previous year, with kidnapping emerging as the most prevalent method of attack.

The Money Path and Use of Monero

The on-chain analysis provided by PeckShieldAlert and Lookonchain show that the attacker acted extremely quickly to launder funds. Most of the stolen assets were converted into 20.34 million DAI.

Subsequently, a smaller part of the funds was moved over the Arbitrum network and deposited on Hyperliquid. The ultimate goal seems to be the purchase of Monero (XMR), a privacy coin that makes transaction tracking and asset recovery extremely difficult, if not impossible. This strategic pivot to anonymous coins highlights the criminals' willingness to obstruct any on-chain investigation efforts.

Cut and recovery efforts

Despite the seriousness of the situation and the criminals' attempt at concealment, Sillytuna did not give up. The investor has officially offered a 10% bounty on any money that individuals or security platforms manage to recover.

The incident raises crucial questions about the personal security of large holders of digital assets. The combination of technical vulnerabilities, such as address poisoning, and the rise of physical crime suggests that the protection of private keys is no longer sufficient unless accompanied by strict personal security measures and anonymity in real life.

By Hamza Ahmed profile image Hamza Ahmed
Updated on
Hack Blockchain
Consent Preferences

Crypto Nations: The Battle for Money, Power, and Code

Documentary on Bitcoin, blockchain and global geopolitics.