- The hacker executed successful ETH trades, increasing total crypto holdings.
- Trailed by blockchain experts for trading prowess.
- Holdings neared $105M post-trade.
The Radiant Capital hacker generated an additional $2.76M profit through strategic swing trading of Ethereum (ETH). They purchased 4,913 ETH at $4,168 and sold 4,131 ETH at $4,726, monitored by blockchain analysts.
The Radiant Capital hackerโs actions highlight the vulnerability of crypto platforms to strategic exploits and trading. Recent trades reflect advanced market strategies, sparking industry scrutiny.
The Radiant Capital hacker capitalized on Ethereum (ETH) trading, making a $2.76M profit. The trades included buying 4,913 ETH and selling 4,131 ETH, increasing their holdings to over $105M. Analysts noted these actions align with professional trading tactics.
Trade Analysis
Blockchain analysts from X, including @lookonchain and @EmberCN, tracked the trades, noting the hacker bought at $4,168 and sold when ETH hit $4,726. This highlights their strategic market timing and high-level trading expertise.
The hackerโs actions increased crypto holdings significantly, showing potential impacts on affected assets, particularly Ethereum and DAI. Analysts noted the hackerโs trading could influence market volatility and present considerable risks for investors.
โ@lookonchain, Blockchain Analyst, X โ โThe Radiant Capital hacker bought 4,913 ETH at $4,168 three days ago and sold 4,131 ETH at $4,726, netting about $2.76M profit and increasing the haul to over $105M.'โ
There are concerns about the hackerโs use of advanced trading tactics reminiscent of professionals. Such actions could trigger market reactions, warranting regulatory attention and prompting platforms to enhance security measures.
Outcomes could include increased scrutiny on crypto exchanges and potential shifts in regulatory frameworks. Forms of digital surveillance might evolve as authorities adapt to counteract advanced hacking strategies. Future trading could see tighter audits to prevent similar exploits.