Atomic wallet heist: hackers utilize THORChain to mask $35 million stolen funds

TL;DR Breakdown

  • MistTrack uncovers THORChain’s role in obfuscating $35M stolen funds from Atomic Wallet.
  • Hackers utilize the Swft network to complicate tracking stolen funds in the Atomic Wallet heist.
  • Audacious perpetrators defy regulations by funneling stolen funds into blacklisted exchanges.

Description

In a shocking revelation, blockchain detective MistTrack has unveiled the masterminds behind the audacious $35 million theft from Atomic Wallet. The perpetrators, exhibiting unparalleled expertise in the field, cunningly employed the cross-chain liquidity protocol THORChain to obfuscate their illicit activities and launder the stolen funds. MistTrack’s meticulous analysis uncovered a series of intriguing transactions that … Read more

In a shocking revelation, blockchain detective MistTrack has unveiled the masterminds behind the audacious $35 million theft from Atomic Wallet. The perpetrators, exhibiting unparalleled expertise in the field, cunningly employed the cross-chain liquidity protocol THORChain to obfuscate their illicit activities and launder the stolen funds.

MistTrack’s meticulous analysis uncovered a series of intriguing transactions that transpired in the last two days, painting a vivid picture of the hackers’ tactics. Astoundingly, approximately $870,000 worth of ether (ETH) swiftly traversed THORChain’s domain, only to be seamlessly converted into bitcoin (BTC), further deepening the mystery surrounding the audacious hack.

The investigation took an unforeseen turn when MistTrack discovered that the hackers ingeniously utilized the Swft network to transfer portions of the stolen ether to multiple Bitcoin addresses. This clever maneuver significantly complicated the efforts of law enforcement agencies to trace the illicit flow of funds.

Despite the hackers’ astonishingly sophisticated methods, a seemingly paradoxical twist emerged in the heist narrative. Last week, the audacious perpetrators daringly funneled a portion of their ill-gotten gains into the cryptocurrency exchange Garantex. This action, however, defied the regulations enforced by the Office of Foreign Assets Control (OFAC) at the U.S. Treasury, as the blacklisting of Garantex had been executed back in April.

As the investigation intensified, the blockchain security company Elliptic, renowned for its astute insights, shed light on the possible identity of the culprits. Armed with their comprehensive expertise, Elliptic’s experts firmly believe that the audacious assault can be attributed to none other than the notorious North Korean hacker outfit Lazarus.

The ongoing investigation into the Atomic Wallet heist continues to uncover fresh angles and unexpected connections, underscoring the increasing sophistication of cybercriminals in cryptocurrency. Consequently, the need for robust security measures and heightened vigilance within the blockchain ecosystem has never been more vital.

Hence, the world watches with bated breath as the enigmatic hackers continue to push the boundaries of technological prowess, leaving the cybersecurity community with an urgent task to fortify defenses against their relentless ingenuity.

Moreover, this incident is a stark reminder that the intersection of finance and technology remains an ever-evolving battlefield where adaptability and resilience are the keys to survival.

The information provided is not trading advice. Cryptopolitan.com holds no liability for any investments made based on the information provided on this page. We strongly recommend independent research and/or consultation with a qualified professional before making any investment decision.

文章来源于互联网:Atomic wallet heist: hackers utilize THORChain to mask $35 million stolen funds

Disclaimers:

1. You are solely responsible for your investment decisions and this info is not liable for any losses you may incur.

2. The copyright of this article belongs to the writer, it represents the writer's opinions only, not represents the site's ones. Not financial advice.

Previous 2023年6月22日 14:06
Next 2023年6月22日 16:08

Related articles

  • Hong Kong and UAE set to transform cryptocurrency landscape

    TL;DR Breakdown The Hong Kong Monetary Authority and the Central Bank of the United Arab Emirates have announced their plans to collaborate on crypto regulations and financial technology development. Key topics discussed included financial infrastructure, financial market connectivity, and enhancing trade settlement across borders. This collaboration comes as the Securities and Futures Commission (SFC) of Hong Kong plans to allow virtual asset service providers (VASPs) to cater to retail investors starting from June 1. The Hong Kong Monetary Authority (HKMA) and the Central Bank of the United Arab Emirates (CBUAE) have announced their plans to collaborate on cryptocurrency regulations and financial technology development. In a meeting held on May 30, the two central banks agreed to strengthen cooperation in the areas of virtual asset regulations and advancements. The collaboration aims to facilitate discussions on joint fintech development initiatives and knowledge sharing between the respective innovation hubs of Hong Kong and the UAE. Key topics discussed included financial infrastructure, financial market connectivity, and enhancing trade settlement across borders. CBUAE Governor H.E. Khaled Mohamed Balama expressed his anticipation for an ongoing and…

    Article 2023年6月3日
  • Chinese hackers are spying on U.S. infrastructure secrets

    TL;DR Breakdown Chinese hackers are reportedly conducting cyber espionage against U.S. critical infrastructure, including telecommunications and transportation hubs. The hacking group, dubbed ‘Volt Typhoon’, is developing capabilities to disrupt key communication infrastructures between the U.S. and Asia. China has denounced these allegations as a “collective disinformation campaign” by the Five Eyes intelligence-sharing countries. Under the veil of anonymity, a sophisticated cadre of Chinese cyber warriors has been accused of prying into a broad array of U.S. critical infrastructure organizations. These alleged espionage activities span across telecommunications, and transportation hubs, and even reach as far as the strategic American military bases located in the U.S. island territory of Guam, according to reports from Western intelligence agencies and Microsoft. Cyber espionage hits strategic nerve points These revelations emerge against a backdrop of routine electronic espionage between the two superpowers. However, this current wave of cyber-espionage is gaining notoriety as one of the largest known Chinese-sponsored incursions against American critical infrastructure. The alleged cyber assailants, operating under the moniker ‘Volt Typhoon’, are feared to be cultivating capabilities that could interrupt pivotal communications infrastructure…

    Article 2023年5月27日
  • Binance.US challenges SEC’s proposed restraining order, citing potential closure

    TL;DR Breakdown Binance.US has requested the U.S. District Court to reject the SEC’s proposed restraining order, warning that it would lead to the closure of its business. The crypto exchange argues that the SEC’s claims fail to identify any securities traded on its platform and questions the regulator’s assumption that all cryptocurrencies are securities. Binance.US has proposed an alternative solution to address the SEC’s concerns and suggests transferring assets to BAM’s control, ensuring customer funds remain secure while addressing registration irregularities. Binance.US has filed a request with the U.S. District Court to deny the proposed temporary restraining order by the Securities and Exchange Commission (SEC). Binance.US argues that implementing the order would effectively lead to the closure of BAM Trading Services Inc., the entity behind Binance. US. The SEC’s emergency motion for the restraining order is scheduled for a hearing on June 13. Binance.US strongly criticized the SEC’s approach to the legal action, calling it “draconian and unduly burdensome.” The crypto exchange pointed out that the SEC still needs to identify a single security trading on BAM’s platform, countering the…

    Article 2023年6月16日
  • Bitcoin halving 2024: JPMorgan predicts struggles for high-cost miners

    TL;DR Breakdown The 2024 Bitcoin halving event is set to challenge miners due to reduced rewards and higher costs, JP Morgan predicts Rising Bitcoin prices after past halvings may not offset increased production costs this time. Miners grappling with debt and competition need to boost efficiency to remain profitable after 2024. Description As Bitcoin prepares to undergo its next halving event in April 2024, a cycle that occurs roughly every four years and slashes the rewards for mining Bitcoin by 50%, concerns surrounding the profitability for miners are becoming increasingly pronounced. Industry analysts argue that the outcome of the halving event will be a litmus test for … Read more As Bitcoin prepares to undergo its next halving event in April 2024, a cycle that occurs roughly every four years and slashes the rewards for mining Bitcoin by 50%, concerns surrounding the profitability for miners are becoming increasingly pronounced. Industry analysts argue that the outcome of the halving event will be a litmus test for miners’ adaptability in a rapidly evolving environment. According to a report on July 13 by…

    Article 2023年7月15日
  • A16z introduces “Cicada”,: An Ethereum library enabling anonymous voting

    TL;DR Breakdown Andreessen Horowitz, also known as A16z, a venture capital firm, has released a Solidity library that can be used for anonymous voting on Ethereum called “Cicada.” Cicada uses time-lock puzzles, a sort of encryption that lets users encrypt secret values that can only be decoded after a certain amount of time. According to the A16z post, Cicada uses these homomorphic puzzles, allowing votes to be counted even if users go offline. Andreessen Horowitz unveils “Cicada,” a library that enables untraceable voting on Ethereum. An anonymous voting Solidity library for Ethereum has been made available by venture capital firm Andreessen Horowitz, popularly known as A16z. The library, under the name of “Cicada,” keeps polling place choices a secret until after the polls close.  Anonymous voting on Ethereum with A16z’s “Cicada” library According to a blog post by A16z engineer Michael Zhu on May 24, it can also render the voter’s identity eternally unknowable when paired with zero-knowledge group membership systems like Semaphore. According to Zhu, Cicada uses time-lock puzzles, a cryptography that enables users to encrypt personal values that…

    Article 2023年5月30日
TOP