UXLINK Hacker Sells $11.8M in ETH for Zero Profit on Telegram

The hacker behind the UXLINK exploit reportedly sold roughly $11.8 million worth of ETH but ended up with no net profit, according to claims circulating on Telegram. The outcome highlights how exchange freezes, on-chain tracking, and even secondary scams can erase an attacker’s gains entirely.
What Happened in the UXLINK Hacker’s $11.8M ETH Sale
On September 23, 2025, a malicious actor carried out unauthorized minting of UXLINK tokens on the Arbitrum network. The UXLINK team confirmed the breach and pointed users to an Arbiscan transaction showing 1 billion UXLINK tokens minted and transferred to a wallet labeled “UXLINK Exploiter 3.”
The attacker then moved quickly to liquidate. Reports citing on-chain analyst Lookonchain indicate the exploiter swapped the stolen tokens across decentralized exchanges, accumulating approximately 6,732 ETH, valued at roughly $28.1 million at the time of the swaps.
A Telegram post later framed the final result more starkly: the hacker sold $11.8 million in ETH and walked away with zero gains. The exact $11.8 million figure and zero-profit claim have not been independently verified through on-chain records or official security-firm reports, though the broader exploit and its aftermath are well documented.
The incident drew immediate responses from centralized exchanges. KuCoin suspended UXLINK deposits, withdrawals, and spot trading on the same day at the project team’s request. Bitunix followed with its own suspension, citing the malicious minting activities.
Why the Hacker Ended Up With No Profit
A zero-gain outcome from a multi-million-dollar exploit may seem counterintuitive, but several factors worked against the attacker simultaneously.
First, UXLINK stated that major exchanges froze a majority of the hacker’s assets. The project engaged blockchain security firm PeckShield to support the investigation and coordinate with trading platforms. When centralized exchanges freeze funds, any tokens or proceeds sitting in those wallets become effectively inaccessible, similar to how law enforcement operations targeting crypto fraud can lock illicit assets before they are moved.
Second, and perhaps more notable, the attacker reportedly fell victim to a phishing scam after the initial exploit. According to CoinNess, citing Lookonchain data, the hacker lost approximately 542 million UXLINK tokens, worth about $48 million at the time, to a separate phishing incident. That loss alone would have more than offset any proceeds from the original exploit.
The combination of exchange-level asset freezes, security-firm tracking, and the phishing loss created a situation where the disposal costs and secondary losses erased the attacker’s gains. This distinction matters: the reported zero-profit result does not reduce the significance of the original $11.3 million breach itself. It simply means the attacker failed to retain value from the stolen funds.
UXLINK responded by initiating a token swap to restore the integrity of its token economy. The team also said it was preparing a comprehensive incident report with its security partners.
What the UXLINK ETH Move Means for Ethereum and Crypto Traders
When exploit-linked wallets move large amounts of ETH, the broader Ethereum market pays attention. Traders and analysts monitor these wallets because sudden large sales can create short-term price pressure on ETH, particularly if the attacker dumps tokens on decentralized exchanges with limited liquidity.
In this case, the reported 6,732 ETH obtained by the attacker represented a meaningful volume. Ethereum’s network has seen rising active address counts in recent months, and large exploit-related sell-offs can temporarily distort on-chain activity metrics that traders use for sentiment analysis.
The Telegram angle adds another layer. Social channels remain a primary distribution point for both breaking crypto news and misinformation. The “zero gains” framing circulated rapidly, but the full picture involves multiple stages: the initial mint, exchange freezes, DEX swaps, and a subsequent phishing loss. Traders who rely solely on headline figures risk missing critical context about how exploit proceeds actually flow through the ecosystem.
The incident also carries regulatory implications. UXLINK disclosed it was responding to an inquiry from DAXA, the Digital Asset Exchange Alliance in South Korea. The project had also applied for a MiCA white paper approved by BaFin, which could shape how it handles disclosure and recovery measures for European users going forward.
For Ethereum watchers, the UXLINK case reinforces a pattern visible across recent exploit events. Coordination between exchanges, on-chain investigators, and project teams has become faster and more effective at freezing stolen assets. Meanwhile, developments like new crypto ETF filings continue to expand institutional exposure to digital assets, making the security of the broader ecosystem an increasingly mainstream concern.
The UXLINK team has not released a final accounting of recovered funds. Until that report is published, the exact profit-and-loss breakdown for the attacker remains an estimate rather than a confirmed figure.
Disclaimer: This article is for informational purposes only and does not constitute financial or investment advice. Cryptocurrency and digital asset markets carry significant risk. Always do your own research before making decisions.

