Thunder Terminal Secures User Funds After Foiling Exploit, Hacker Demands Ransom for Data

The on-chain trading platform Thunder Terminal recently experienced a significant security breach, which put user funds at risk. However, the platform promptly responded to the exploit, reassuring users that their private keys and wallets had not been compromised. Despite this, the hacker disputes these claims and has demanded an additional ransom for user data. In this article, we will delve into the incident, examining Thunder Terminal’s response, the hacker’s assertions, the breach of Thunder’s data, the refund plan, the hacker’s activities, and providing an overview of Thunder Terminal’s features and functionality.

Incident Report: User Funds Secured

In the aftermath of the exploit, Thunder Terminal has released an incident report, assuring users that their private keys and wallets have not been compromised. The platform reiterates that only 114 out of 14,000 wallets were affected. Thunder Terminal further guarantees that all affected users will be fully refunded, in addition to receiving 0% fees and $100,000 in platform credits as a gesture of goodwill.

Hacker’s Claims and Ransom Demand

Despite Thunder Terminal’s assurances, the hacker vehemently claims that the platform’s statements are false. The attacker issued a demand for a 50 ETH ($110,000) ransom for the allegedly affected user data. The attacker left a memo on Etherscan, asserting that Thunder Terminal’s assurances were nothing but lies.

Exploitation of MongoDB and Breach of Thunder’s Data

The incident report revealed that the exploitation of the MongoDB company eight days prior resulted in the breach of Thunder Terminal’s data. This breach exposed vulnerabilities in Thunder Terminal’s security protocols and allowed unauthorized access to user information. The extent of the compromised data remains uncertain.

Thunder’s Response and Refund Plan

While Thunder Terminal did not explicitly address the hacker’s ransom demand, it stated that the platform does not have access to users’ private keys, eliminating the possibility of the attacker gaining access to them. To ensure heightened security, Thunder Terminal pledged to implement extra measures. The platform also expressed a willingness to negotiate with the hacker in hopes of recovering the stolen funds.

Hacker’s Activities and Use of Stolen Funds

Etherscan data shed light on the hacker’s actions, revealing that the attacker’s wallet address sent a total of 86.3 ETH to the Railgun protocol, which enables users to anonymize their transactions. This move aims to obfuscate the origin of the stolen funds, making it challenging to trace their final destination.

Thunder Terminal’s Features and Functionality

Thunder Terminal is an innovative trading platform designed for seamless trading across various blockchain networks such as Ethereum, Solana, Avalanche, and Arbitrum. It provides users with efficient and quick trade execution, supporting their investment strategies across multiple networks. The platform’s compatibility with these networks allows users to explore diverse investment opportunities and capitalize on market movements.

The security breach experienced by Thunder Terminal underlines the persistent threat faced by cryptocurrency platforms. However, Thunder Terminal’s prompt and transparent response demonstrates its commitment to safeguarding user funds. The platform has taken immediate steps to enhance security and is actively engaging with the hacker in a bid to retrieve the stolen funds. Moving forward, Thunder Terminal emphasizes its determination to protect user assets and strengthen its security infrastructure, pledging to implement further measures to ensure the safety and trust of its users.

Explore more

A Beginner’s Guide to Data Engineering and DataOps for 2026

While the public often celebrates the triumphs of artificial intelligence and predictive modeling, these high-level insights depend entirely on a hidden, gargantuan plumbing system that keeps data flowing, clean, and accessible. In the current landscape, the realization has settled across the corporate world that a data scientist without a data engineer is like a master chef in a kitchen with

Ethereum Adopts ERC-7730 to Replace Risky Blind Signing

For years, the experience of interacting with decentralized applications on the Ethereum blockchain has been fraught with a precarious and dangerous uncertainty known as blind signing. Every time a user attempted to swap tokens or provide liquidity, their hardware or software wallet would present them with a wall of incomprehensible hexadecimal code, essentially asking them to authorize a financial transaction

Germany Funds KDE to Boost Linux as Windows Alternative

The decision by the German government to allocate a 1.3 million euro grant to the KDE community marks a definitive shift in how European nations view the long-standing dominance of proprietary operating systems like Windows and macOS. This financial injection, facilitated by the Sovereign Tech Fund, serves as a high-stakes investment in the concept of digital sovereignty, aiming to provide

Why Is This $20 Windows 11 Pro and Training Bundle a Steal?

Navigating the complexities of modern computing requires more than just high-end hardware; it demands an operating system that integrates seamlessly with artificial intelligence while providing robust security for sensitive personal and professional data. As of 2026, many users still find themselves tethered to aging software environments that struggle to keep pace with the rapid advancements in cloud computing and data

Notion Launches Developer Platform for AI Agent Management

The modern enterprise currently grapples with an overwhelming explosion of disconnected software tools that fragment critical information and stall meaningful productivity across entire departments. While the shift toward artificial intelligence promised to streamline these disparate workflows, the reality has often resulted in a chaotic landscape where specialized agents lack the necessary context to perform high-stakes tasks autonomously. Organizations frequently find