Skip to content

Team Response After the Incident

What a team does in the hours, days, and weeks after a major security incident tells you everything about their character. Here is the documented record.


Official Acknowledgment — January 28, 2022

Section titled “Official Acknowledgment — January 28, 2022”

The Qubit Finance team posted to Twitter acknowledging the hack:

“The protocol was exploited by; 0xd01ae1a708614948b2b5e0b7ab5be6afa01325c7. The hacker minted unlimited xETH to borrow on BSC. The team is currently working with security and network partners on next steps. We will share further updates when available.” — @QubitFin, 9:14 AM, January 28, 2022

Qubit Finance official tweet acknowledging the hack


The hacker’s transactions — labeled “QubitFin Exploiter” by BSCScan — show repeated Borrow calls in rapid succession on the same day:

BSCScan showing QubitFin Exploiter borrow transactions

Key transactions visible:

  • 0x4c32d6b8... — Borrow, Block 14742193
  • 0xeed8cb88... — Borrow, Block 14742163
  • 0xa39e7323... — Borrow, Block 14742157
  • 0xcfa4379a... — Borrow, Block 14742046
  • 0x4d2112f7... — Borrow, Block 14742004

All directed to the same contract: 0xf70314eb9c7fe7d88e6...


Offered the hacker $250,000 to return $80M

Section titled “Offered the hacker $250,000 to return $80M”

The team’s public response was to offer the attacker a “bug bounty” of $250,000 — asking them to keep $250K and return the remaining $79.75M. The hacker did not respond.

Claimed to file police reports (unverified)

Section titled “Claimed to file police reports (unverified)”

The team stated they reported the hack to police in two jurisdictions. No case numbers, no filing confirmations, and no law enforcement updates have ever been provided publicly.

The team deployed one representative — moderator @moleh — to handle victim communications.


✗ CTO deleted LinkedIn — February 1, 2022

Section titled “✗ CTO deleted LinkedIn — February 1, 2022”

iShot 2022-02-01 — CTO LinkedIn deletion

Four days after the hack, CTO Aaron Yooshin Kim deleted his LinkedIn profile (linkedin.com/in/aaromkimys). The community noticed and documented it immediately.

iShot 2022-02-01 — LinkedIn deletion evidence

iShot 2022-02-01 — LinkedIn deletion evidence 2

iShot 2022-02-01 — LinkedIn deletion evidence 3

✗ Victims removed from official Telegram

Section titled “✗ Victims removed from official Telegram”

The moderator @moleh systematically removed victims from the official Telegram group. Rather than keeping communication channels open for the people who had lost their savings, the team silenced them.

iShot 2022-02-13 — Screenshot showing victims being removed from Telegram / team behavior

✗ No response to community members with hacker information

Section titled “✗ No response to community members with hacker information”

A Reddit user posted they had contacted the team with information about the hacker’s identity — and received no response:

Reddit post — user had hacker info, team never responded

“I have the identity of the ‘developer’ who drained qubit pools. I have everything — the places he went, the hotels he stayed and the experiences he lived. EVERYTHING. I am here for the bounty they offer but it seems the bounty is fake.” — u/Helpful-Ad8004, r/PancakeBunny

✗ Did not contact Binance or major exchanges to blacklist the hacker

Section titled “✗ Did not contact Binance or major exchanges to blacklist the hacker”

No prompt action was taken to blacklist 0xd01ae1a708614948b2b5e0b7ab5be6afa01325c7 across exchanges, bridges, and swap protocols — standard practice after a DeFi exploit.

✗ Did not respond to people who came forward

Section titled “✗ Did not respond to people who came forward”

Despite publicly asking for community help to identify the hacker, the team went silent when members reached out via Tox and other channels.


February 6–7, 2022 — Continued Silence

Section titled “February 6–7, 2022 — Continued Silence”

iShot 2022-02-06

iShot 2022-02-06 detail

iShot 2022-02-07


Qubit Finance was a Binance-endorsed project and Mound Inc. received $1.6M from Binance Labs in April 2021. When victims appealed to Binance and CZ for help — to blacklist the hacker’s wallet, to apply pressure — they were ignored.


As of 2026:

  • Mound Inc.’s website (mound.finance) is offline
  • No public updates from the team
  • No compensation mechanism established
  • No funds returned
  • The victims are still waiting