The co-founder of Web3 metaverse game engine “Webaverse” has revealed they were victims of a $4 million crypto hack after meeting with scammers posing as investors in a hotel lobby in Rome.

The bizarre aspect of the story, according to co-founder Ahad Shams, is that the crypto was stolen from a newly set up Trust Wallet and that the hack took place during the meeting at some point.

He claims the thieves could not have possibly seen the private key, nor was he connected to a public WiFi network at the time.

The thieves were somehow able to gain access while taking a photo of the wallet’s balance, believes Shams.

The letter which was shared on Twitter on Feb. 7, contains statements from Webarverse and Shams, explaining that they met with a man named “Mr. Safra” on Nov. 26 after several weeks of discussions about potential funding.

Shams explained:

“We connected with Mr. Safra over email and video calls and he explained that he wanted to invest in exciting Web3 companies,”

he added:

“He explained that he had been scammed by people in crypto before and so he collected our IDs for KYC and stipulated as a requirement that we fly into Rome to meet him because it was important to meet IRL to ‘get comfortable’ with who we were each doing business with,”

While initially skeptical, Sham agreed to meet Mr. Safra and his banker in person in a hotel lobby in Rome, where he would later show the project’s proof of funds — who Mr. Safra claimed was his requirement to begin the paperwork.

“Though we grudgingly agreed to the Trust Wallet proof, we created a fresh Trust Wallet account at home using a device we didn’t primarily use to interact with them. Our thinking was that without our private keys or seed phrases, the funds would be safe anyway,"

However, turns out Sham was thoroughly mistaken:

“When we met, we sat across from these three men and transferred 4m USDC into the Trust Wallet. Mr. Safra asked to see the balances on the Trust Wallet app and took out his phone to take some pictures”.

Shams explained that he thought it was okay because no private keys or seed phrases were revealed to Mr. Safra.

But after Mr. Safra took a photo and stepped out of the meeting room to consult his banking colleagues, the crew vanished and Shams saw the funds siphoned out.

"We never saw him again. Minutes later the funds left the wallet."

Almost immediately after, Shams reported the theft to a local police station in Rome and then filed an Internet Crime Complaint (IC3) form to the U.S. Federal Bureau of Investigation (FBI) a few days later.

Shams said he still has no idea how Mr. Safra and his scam crew committed the exploit:

“The interim update from the ongoing investigations is that we are still unable to confidently establish the attack vector. The investigators have reviewed the available evidence and engaged in lengthy interviews with the relevant persons but further technical information is necessary for them to come to confidently establish conclusions.”
“Specifically, we need more information from Trust Wallet regarding activity on the wallet that was drained to reach a technical conclusion and we are actively pursuing them for their records. This will likely provide us with a better picture of how this has transpired,”

The Webaverse co-founder believes the exploit was carried out in a similar fashion to an NFT scam story shared by NFT entrepreneur Jacob Riglin on Jul. 21, 2021.

There, Riglin explained that he met with potential business partners in Barcelona, proved that he had sufficient funds on his laptop, and then within 30-40 minutes the funds were drained.

Shams has since shared the Ethereum-based transaction where his Trust Wallet was exploited, noting that the funds were quickly split into six transactions and sent to six new addresses, none of which had any prior activity.

The $4 million worth of USDC was then almost entirely converted into Ether (ETH), wrapped-Bitcoin (wBTC), and Tether (USDT) via 1inch’s swap address feature.

Shams admitted that the event haunts me to this day and that the $4 million exploit is undoubtedly a setback for Webaverse.

However, he stressed that the $4 million exploit and pending investigation will have no impact on the firm’s short-term commitments and plans:

“We have a sufficient runway of 12-16 months based on our current forecasts and we are well underway to deliver on our plans.”

What do you think about this recent hack? Let us know your thoughts by sharing this article on social media.


Feb 7, 2023
Crypto News

More from 

Crypto News


View All

Join Our Newsletter and Get the Latest
Posts to Your Inbox

No spam ever. Read our Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.