ZachXBT Alleges Axiom Employee Misused Internal Data - Unchained

Blockchain investigator ZachXBT has accused a senior employee at trading platform Axiom of abusing internal tools to access private user wallet data and potentially profit from it

In a detailed thread, he alleged that the employee used internal dashboards to look up wallet addresses tied to specific users and shared that information with a small group tracking high profile traders, particularly those active in memecoins.

According to the report, screenshots of internal data were circulated and several individuals named in the material confirmed that the wallet details were accurate. ZachXBT said he was retained to independently investigate the claims, though he did not disclose by whom. He cautioned that proving specific insider trades would require access to Axiom’s internal logs.


This story is an excerpt from the Unchained Daily newsletter.

Subscribe here to get these updates in your email for free


Axiom said it was surprised and disappointed by the allegations, removed employee access to the tools in question and pledged a full investigation.

The episode adds to growing scrutiny around data access and trading ethics in crypto, where transparency onchain does not always extend to internal platform controls.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Sillytuna Hackers Move Over $10M in Stolen Crypto Funds

The Sillytuna hackers have laundered over $10M in stolen funds, primarily using Bitcoin and DAI, through exchanges and mixers to obscure the origins. Despite these movements, they still hold $19M in stolen assets.

BlockChainReporter2h ago

Shiba Inu: Alert Issued as SHIB Participant Social Media Account Gets Hacked - U.Today

Ragnarshib warns the Shiba Inu community about a hacked account belonging to Vet Kusama, currently used by scammers to send fraudulent messages. Users are advised not to interact with the account or its links until it is recovered.

UToday4h ago

IoTeX Releases ioTube Security Incident Report: Actual Losses Approximately $4.4 Million, Pledges Full Compensation to Affected Users

IoTeX reports that the ioTube cross-chain bridge incident on March 6 resulted in approximately $4.4 million in losses. 99.5% of the stolen assets have been frozen, and the team has committed to fully compensate affected users. The mainnet has resumed operation, and the attacker’s address has been blacklisted. Meanwhile, efforts are underway to promote decentralized governance and security audits.

GateNews7h ago

Prince Group is laundering 10.7 billion NT dollars in Taiwan! Developing their own "OJBK Wallet" to connect with underground currency exchanges.

Taipei District Prosecutors Office is investigating the Cambodia "Prince Group" money laundering case, indicting 62 individuals and 13 companies. The involved amount of money laundering is 10.7 billion, and assets worth 5.5 billion have been seized. The group used USDT and their self-developed "OJBK Wallet" to conduct cross-border money laundering, conceal criminal proceeds, and withdraw cash in multiple countries.

区块客9h ago

HypurrFi reveals that early versions of Aave V3 had a rounding error vulnerability, and the addition of new lending markets for XAUT0 and UBTC has been suspended.

HyperEVM's custodial lending protocol HypurrFi disclosed that previous versions of Aave V3 had a "rounding error" vulnerability, allowing attackers to extract underlying tokens. HypurrFi guarantees the safety of user funds, has paused supply and borrowing operations in affected markets, and is working with relevant parties to address security issues.

GateNews10h ago

AI agents bypass Cloudflare protection, encrypting DeFi front-end security faces further tests

Recently, the autonomous AI agent OpenClaw successfully bypassed Cloudflare defenses using the Scrapling library, raising concerns about DeFi security. Although the tool can legally scrape content, the potential risks remind developers to establish multiple layers of defense and avoid over-reliance on traditional protection measures.

GateNews11h ago
Comment
0/400
No comments