Cover photo

$LIGHT TOKEN - Arkham Bounty Submission

Investigative Research by 0xHelena.eth

0xHelena

0xHelena

Bounty Details

  • POSTED BY ZION:

  • VALUE:

    • 9009.75 ARKM

  • DESCRIPTION:

    • The following token: 0xcc0d1b36d88fd8f5f26fd00e4e769e2dab4e3e07 and associated deployer + project is associated with intellectual property theft.

    • Can you find out the identities of the owners?


Onchain Findings

0x8c6e $LIGHT DEPLOYER

  • 0x8C6e02Dfe803a9E1c94B130dfc4902551B701147

  • On Jul-24-2023 at 02:17:23 PM +UTC, 3.99 ETH was deposited by 01121994.eth (0xCDe4) from Across Protocol to 0x8c6e

  • 0x8C6e created the Lightning Bot ($LIGHT) token contract (0xCC0D1b) on Jul-24-2023 at 02:20:59 PM +UTC

$LIGHT Team Wallets

In the following 5 hours of deploying the Lightning Bot contract, 0x8C6e supplied liquidity on Uni-V2 with 90M $LIGHT and then funded the following wallets with $LIGHT:

  • 0xa4B2 $LIGHT TEAM WALLET 1 received 1M $LIGHT

  • 0x0955 $LIGHT TEAM WALLET 2 received 1M $LIGHT

  • 0x3d7f $LIGHT TEAM WALLET 3 received 1M $LIGHT

  • 0xE73f @MasonDefi received 2M $LIGHT

These wallets proceeded to wash trade $LIGHT for ETH and send the profits to 0x937E.

post image

The wallet (01121994.eth) that first funded the $LIGHT DEPLOYER is connected to the Debank profile: MinhNguyen1994_, which is followed by a single wallet: 0xbbb8.

post image

On DeBank, 0xbbb8 follows a similar profile: MinhNguyen1994, which belongs to 0xa63f, aka ENS: 0946868.eth.

post image

It is likely that all three of these wallets (0xbbb8, 0xCDe4, 0xa63f) are owned by the same user who created separate DeBank profiles to monitor and follow their cross-chain activity. Over the last 18 months, 0xa63f has received funds from six wallets associated with $LIGHT team wallets across six chains. This further validates that the username MinhNguyen1994 is the primary user behind the $LIGHT team wallets.

post image

Additionally, the $LIGHT team wallets are highly correlated to 4 deployer wallets of the following projects:

  1. 0x0b41 ordindev.eth

  1. 0x9FA TweetN BSC Deployer

  • First funded by: 0x0b41 ordindev.eth

  • TweetN BSC ($TweetN) - Linktree: @tweetn

  1. 0x2265 TweetN ETH Deployer

  1. 0x0351 RAT 2.0 DEPLOYER

Social Media Findings

Twitter: @LightningBotERC

Telegram Forum: t.me/LightningBotPortal

The wallets with the most onchain interactions involving $LIGHT contracts lead to the primary wallet, 0xE73f. On Opensea, their profile is "MinnieTrade" and is connected to the Twitter account: @MasonDefi => Twitter ID: 1495496101981523972.

The account name for @MasonDefi was '01121994.eth.zk' at the beginning of September, but it was recently changed to '1994.eth.zk'. At this time (9/16/23), the NFT PFP 'Milady 3629' owned by @MasonDefi was purchased by 01121994.eth on Aug 28th and was sent to 0xE73f on Sep 11th.

post image

Based on an archive from July 2022, we know that @MasonDefi also had the username '0946868.eth', which connects the wallet to the DeBank Profile: MinhNguyen1994.

post image

Summary of Findings

Onchain evidence indicates that the user behind @MasonDefi is likely a person named Minh Nguyen, who was born in 1994. Identical usernames to those found on DeBank have previously been suspended on Twitter (@minhnguyen1994) and Reddit (@minhnguyen1994). This person is responsible for deploying the $LIGHT token and managing the onchain funds and contracts. The primary wallets of the $LIGHT Dev are connected to the deployer wallets of 6+ meme coins that are likely scams or used for wash trading.

  1. Debank profile: MinhNguyen1994_

  1. DeBank Profile: MinhNguyen1994

  1. Other Wallets of @MasonDefi (links redirect to Arkham Profiles)

    1. 0x8c6e $LIGHT DEPLOYER

    2. 0xB529 OS:MasonNFTStore

    3. 0x937E $LIGHT DEV WALLET 1

    4. 0x0b41 ordindev.eth

  2. Arkham Intel Custom Entity Profile

    1. $LIGHT DEV (31 wallets)

    2. $LIGHT CEX Wallets (4 wallets)

$LIGHT TOKEN - Arkham Bounty Submission