Thunder Terminal Secures User Funds After Foiling Exploit, Hacker Demands Ransom for Data

The on-chain trading platform Thunder Terminal recently experienced a significant security breach, which put user funds at risk. However, the platform promptly responded to the exploit, reassuring users that their private keys and wallets had not been compromised. Despite this, the hacker disputes these claims and has demanded an additional ransom for user data. In this article, we will delve into the incident, examining Thunder Terminal’s response, the hacker’s assertions, the breach of Thunder’s data, the refund plan, the hacker’s activities, and providing an overview of Thunder Terminal’s features and functionality.

Incident Report: User Funds Secured

In the aftermath of the exploit, Thunder Terminal has released an incident report, assuring users that their private keys and wallets have not been compromised. The platform reiterates that only 114 out of 14,000 wallets were affected. Thunder Terminal further guarantees that all affected users will be fully refunded, in addition to receiving 0% fees and $100,000 in platform credits as a gesture of goodwill.

Hacker’s Claims and Ransom Demand

Despite Thunder Terminal’s assurances, the hacker vehemently claims that the platform’s statements are false. The attacker issued a demand for a 50 ETH ($110,000) ransom for the allegedly affected user data. The attacker left a memo on Etherscan, asserting that Thunder Terminal’s assurances were nothing but lies.

Exploitation of MongoDB and Breach of Thunder’s Data

The incident report revealed that the exploitation of the MongoDB company eight days prior resulted in the breach of Thunder Terminal’s data. This breach exposed vulnerabilities in Thunder Terminal’s security protocols and allowed unauthorized access to user information. The extent of the compromised data remains uncertain.

Thunder’s Response and Refund Plan

While Thunder Terminal did not explicitly address the hacker’s ransom demand, it stated that the platform does not have access to users’ private keys, eliminating the possibility of the attacker gaining access to them. To ensure heightened security, Thunder Terminal pledged to implement extra measures. The platform also expressed a willingness to negotiate with the hacker in hopes of recovering the stolen funds.

Hacker’s Activities and Use of Stolen Funds

Etherscan data shed light on the hacker’s actions, revealing that the attacker’s wallet address sent a total of 86.3 ETH to the Railgun protocol, which enables users to anonymize their transactions. This move aims to obfuscate the origin of the stolen funds, making it challenging to trace their final destination.

Thunder Terminal’s Features and Functionality

Thunder Terminal is an innovative trading platform designed for seamless trading across various blockchain networks such as Ethereum, Solana, Avalanche, and Arbitrum. It provides users with efficient and quick trade execution, supporting their investment strategies across multiple networks. The platform’s compatibility with these networks allows users to explore diverse investment opportunities and capitalize on market movements.

The security breach experienced by Thunder Terminal underlines the persistent threat faced by cryptocurrency platforms. However, Thunder Terminal’s prompt and transparent response demonstrates its commitment to safeguarding user funds. The platform has taken immediate steps to enhance security and is actively engaging with the hacker in a bid to retrieve the stolen funds. Moving forward, Thunder Terminal emphasizes its determination to protect user assets and strengthen its security infrastructure, pledging to implement further measures to ensure the safety and trust of its users.

Explore more

Why Are Big Data Engineers Vital to the Digital Economy?

In a world where every click, swipe, and sensor reading generates a data point, businesses are drowning in an ocean of information—yet only a fraction can harness its power, and the stakes are incredibly high. Consider this staggering reality: companies can lose up to 20% of their annual revenue due to inefficient data practices, a financial hit that serves as

How Will AI and 5G Transform Africa’s Mobile Startups?

Imagine a continent where mobile technology isn’t just a convenience but the very backbone of economic growth, connecting millions to opportunities previously out of reach, and setting the stage for a transformative era. Africa, with its vibrant and rapidly expanding mobile economy, stands at the threshold of a technological revolution driven by the powerful synergy of artificial intelligence (AI) and

Saudi Arabia Cuts Foreign Worker Salary Premiums Under Vision 2030

What happens when a nation known for its generous pay packages for foreign talent suddenly tightens the purse strings? In Saudi Arabia, a seismic shift is underway as salary premiums for expatriate workers, once a hallmark of the kingdom’s appeal, are being slashed. This dramatic change, set to unfold in 2025, signals a new era of fiscal caution and strategic

DevSecOps Evolution: From Shift Left to Shift Smart

Introduction to DevSecOps Transformation In today’s fast-paced digital landscape, where software releases happen in hours rather than months, the integration of security into the software development lifecycle (SDLC) has become a cornerstone of organizational success, especially as cyber threats escalate and the demand for speed remains relentless. DevSecOps, the practice of embedding security practices throughout the development process, stands as

AI Agent Testing: Revolutionizing DevOps Reliability

In an era where software deployment cycles are shrinking to mere hours, the integration of AI agents into DevOps pipelines has emerged as a game-changer, promising unparalleled efficiency but also introducing complex challenges that must be addressed. Picture a critical production system crashing at midnight due to an AI agent’s unchecked token consumption, costing thousands in API overuse before anyone