Hello eXch mod - please refer to this post. I’ve had $211,000 of my funds stolen yesterday and the scammers sent it to your exchange
Hey everyone,
Yesterday I had my entire life savings of $211,000 stolen from me and the scammers sent it to a crypto exchange platform eXch.cx It was a total of 62 eth. This was literally all the money that I been working with to help my mom who is dying right now from heart disease. I know the whole point of crypto is to be anonymous but please I really need your help, this was everything that I had and it was for my family and to survive. I never clicked on any airdrop scam or link so I’m pretty sure I was hacked in some sophisticated manner. I already got a police report which I can show and also I hired someone to do an investigative report log showing the exact trace from my trust wallet account into the final destination which is the scammers wallet and exchange he sent it to. I am a new user here and can not direct message the moderator for the
https://exch.cx which he posted on this forum and his username is eXch. Please if somebody can reach out to him and ask to freeze the assets that would mean the world. I am in a very bad place right now in my life
Link:
https://bitcointalk.org/index.php?topic=577207.0The scammer's addresses are 0x73f8a08aadcfd850e1a0ff18c0ea12f634775813 and 0xfaa7a4e434a33289c2f257876bc7e1bafd328577which were made on the eXch platform, then the scammers exchanged the ETH and send them to the main eXch 0xf1da173228fcf015f43f3ea15abbb51f0d8f1123 wallet
————- below is the investigative report —————
On-chain investigation report
0x32d502fdf445a7d76b16a65d83bbdfa796628ce6 (my trust wallet)
On 04/03/24 hackers 0xed4dcc6bcbc850db680061ab28c5280cc93a9374 sent 0.15 ETH
(0x6389e5f2fbc06039e7778e9908d5ad81a50a761ace6fdfd08efee152a8ea5acd) to
0x32d502fdf445a7d76b16a65d83bbdfa796628ce6 presumably to use that amount for transaction
fees.
0xeD4DCC6BcBC850db680061Ab28c5280CC93A9374 had the last transfer
(0x744c3225cb3b7d8d676e6a5300dac7c5f7978a7f4821d53f844b039217b41e6b) to a MEXC
Global 0x8aa62b26c934af89d4e91b36fb7b5e329f53c5f2 personal address and then cashed out
(0xa75d082b41941c945e58242d8f83c5c739f234b921f59c9f8b0c94da0805d521) to
0x75e89d5979e4f6fba9f97c104c2f0afb3f1dcb88 MEXC Global main address of the exchange.
From the victim’s 0x32d502fdf445a7d76b16a65d83bbdfa796628ce6 address the hackers
transferred crypto tokens:
• 0xb7310125fcdf002089aff053f1a62b99eaa9c3ac6df6145c9a06cc612359e05b
• 0x94abf156a49d27898d115527c9a484c4712cc6230d715bcd8b981daffc5fed06
• 0x1b4ffb10b7186b4dfba2061321c3a0245f79ac0812251dc06e40518b56286fea
• 0x2786e3f48ce88df1c7504c3605235d0d6e6859e57042fdc8db5e8748f7c5ff91
• 0x147c1d9d295d2548d055373333118ab57bdf025338d667b7fba3ad7cdb8113b5
On the same day they also transferred 0.15 ETH
0x0edfd4402cf10d3e1f566609ddc783dc461bc42f69919acd75119fdfde7e4100 to
0x9987baf72097277efc52fb5307b9d2b98255142c address.
All the stolen from 0x32d502fdf445a7d76b16a65d83bbdfa796628ce6 crypto went to that
address.
Then the hacker swapped the stolen tokens to ETH:
• 0xffb52caa42fd8c7a0f1733227089339ee5d302173f8c4dec2550fa72132b8bcc
• 0x63d51fba10a001f6a9871d12ee3ea15273828ca48f376819ccbe1572d7cbe581
• 0x1b4ffb10b7186b4dfba2061321c3a0245f79ac0812251dc06e40518b56286fea
• 0x2786e3f48ce88df1c7504c3605235d0d6e6859e57042fdc8db5e8748f7c5ff91
• 0x147c1d9d295d2548d055373333118ab57bdf025338d667b7fba3ad7cdb8113b5
• 0xa1c290774dafe5dad8c2db41dd44d0ed87ecf02acf2073d35a207304ca369b57
• 0xcd2aebe8b87c4d300f56aa3272404b0e9e4114ccb8e4d9e139de0d36c18e1982
• 0xaf1e1710a69aacc6d51fe03326d4bdb2f76caaafeabd618348399de5b19e347f
• 0x2b40d0edc6d42c2ba41ba148830fa7016da3bbb7649395518bab1387ccb067ef
And transferred them
(0x07d7eed9dabe1c2f10dd447b43d3faf272d22146686bc3c25bfa3a719c659a43,
0x36bae030cccae8be6239962f88eab31badfcbcaf7c9f8c0ce9985b1432a81b68) to disposable
eXch exchange addresses (0x73f8a08aadcfd850e1a0ff18c0ea12f634775813 and
0xfaa7a4e434a33289c2f257876bc7e1bafd328577 respectively) for the purpose of 1 transaction
(0xa4d2cb52205a3f679a8cc64538f1d55af1be8b79f3c6d38d860788feb47dc43e and
0x7973f8bcdca8473a3d5c6ef11f4e96bb7d1d7030d36005b74a0fecd817ae022b respectively) on
the main eXch exchange address 0xf1da173228fcf015f43f3ea15abbb51f0d8f1123 (with
thousands of transactions).
eXch exchange can be contacted to freeze the operation and continue the investigation
https://exch.cx/support .