Chainalysis has revealed intricate money laundering tactics used in the recent THORChain hack. The blockchain analytics firm reported that attackers executed complex cross-chain fund transfers weeks before the attack, involving Monero, Hyperliquid, and THORChain. Funds were moved to Hyperliquid via privacy bridges, converted to USDC, and transferred to the Arbitrum network. Some assets were then moved to Ethereum and staked in THORChain, believed to be the attack's origin.
The analysis detailed that attackers later bridged RUNE assets back to Ethereum, splitting them into four connections, with one transferring 8 ETH to an address receiving stolen funds shortly before the attack. Between May 14-15, the attackers moved ETH back to Arbitrum, deposited into Hyperliquid, and transferred to Monero. As of Friday, the stolen funds remained unmoved, highlighting the attackers' sophisticated laundering capabilities.
Chainalysis Uncovers Complex Money Laundering in THORChain Hack
면책 조항: Phemex 뉴스에서 제공하는 콘텐츠는 정보 제공 목적으로만 제공됩니다. 제3자 기사에서 출처를 얻은 정보의 품질, 정확성 또는 완전성을 보장하지 않습니다.이 페이지의 콘텐츠는 재무 또는 투자 조언이 아닙니다.투자 결정을 내리기 전에 반드시 스스로 조사하고 자격을 갖춘 재무 전문가와 상담하시기 바랍니다.
