James Edwards states that based on the code and the type of bugs used in the hack, we can say that the Wintermute hack was most likely the work of someone on the team.
On Sept. 20, a hacker managed to use a bug in Wintermute's smart contract to profit handsomely. This allowed him to steal about $160 million in the form of 70 different tokens, from staples to wrapped* tokens.
But here, James Edwards, having investigated, was able to draw the following conclusions: "The relevant transactions initiated by the EOA [externally owned address] clearly show that the hacker was most likely an internal member of the Wintermute team."
Another point he questions is the specific transfer that occurred during the hack, which "shows 13.48 million USDT sent from Wintermute's smart contract address to smart contract 0x0248.
"Why would the team send $13 million in funds to a smart contract they knew was hacked? From TWO different exchanges?" asked James via Twitter.
That's a pretty good question, I agree. After all, the project team, according to James' claims, already knew by then that this smart contract was controlled by a hacker. Assuming, of course, that the initial knowledge of the team members is correct.
So far, no comments from the development team, and James himself is, in fact, a rookie personality at the moment because this is his first post on the medium. Other experts have not confirmed this theory, but on the other hand, no one took the responsibility to refute it.
So all that remains, for now, is to wait and look at our Moni app to keep abreast of what's going on with your favorite coins.