A sniper used 1,000 wallets to acquire 70% of the tokens, but was exposed by on-chain data.

[BlockBeats] A recent major sniping incident was exposed by an on-chain data platform—someone used over 1,000 wallets to acquire 70% of the HumidiFi token supply, and is now demanding a refund from the project team.

This move was ruthless: during the presale, 1,530 addresses appeared, but at least 1,100 were found to belong to the same person. The sniper was highly professional, first transferring funds from an exchange to thousands of new addresses to launder the trail, with each wallet depositing exactly 1,000 USDC to participate in the presale.

But no matter how meticulous, a slip-up happened. One address didn’t follow the usual route, with funds coming from a personal wallet, 547Wwc. Tracing further, it was found that this wallet received $150,000 from AUG2N, and AUG2N was also funded by 547Wwc. Most fatally, 547Wwc was linked to the Twitter account @ramarxyz—revealing the identity completely.

The presale was supposed to distribute tokens widely, but a single person used a Sybil attack to control the supply. Now this Ramarxyz still has the nerve to demand a refund, truly treating on-chain transparency as just for show.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 4
  • Repost
  • Share
Comment
0/400
LiquiditySurfervip
· 14h ago
Ha, this guy really turned a Sybil attack into an art form... Over 1,000 wallets each precisely allocated 1,000U, but ended up getting exposed by a single Twitter account. The choice of "surfing point" for this liquidity pool was really not great. --- No matter how perfectly the money-laundering path is designed, in the end, you still have to trust on-chain data. That's the beauty of permissionless finance. --- The presale got sniped by a single person for 70%—if the project team’s liquidity depth is real, this has to be super awkward... By the way, even the most optimized strategy can't stop a Twitter account, huh? --- Pulling off such a massive Sybil attack shows the capital efficiency was definitely maxed out... But the way it got exposed is honestly kind of ridiculous. --- This act was played out pretty well, but that final private wallet was just a bit too greedy. Tracing it back was basically a textbook example of what not to do in market making.
View OriginalReply0
TokenSherpavip
· 12-05 11:34
lmao so basically dude tried to be slick with 1000 wallets and still got caught by one slip-up... the 547Wwc address is like the digital equivalent of leaving your ID at a crime scene ngl
Reply0
Blockwatcher9000vip
· 12-05 11:28
1,000 wallets covering everything, but one Twitter account gave it all away. This guy is really overconfident.
View OriginalReply0
SolidityNewbievip
· 12-05 11:28
Haha, this guy is really outrageous. He dares to play like this with over 1,000 wallets. There are no secrets in front of on-chain data.
View OriginalReply0
  • Pin
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)