Things have gotten complicated for altcoins, which recently suffered significant losses due to a hack. Continue Reading: Things Turned Out to Be Much More ComplicatedThings have gotten complicated for altcoins, which recently suffered significant losses due to a hack. Continue Reading: Things Turned Out to Be Much More Complicated

Things Turned Out to Be Much More Complicated Behind the Scenes at the Altcoin That Was Recently Hacked

2026/05/17 04:38
2분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 [email protected]으로 연락주시기 바랍니다

Blockchain analytics company Chainalysis has shared new findings regarding the addresses behind the THORChain attack. According to the analysis published on the company’s X platform, the attackers used sophisticated money laundering methods, carrying out complex cross-chain fund transfers weeks before the attack.

According to Chainalysis data, wallets linked to the attack have been moving funds between Monero, Hyperliquid, and THORChain since late April. It appears the attackers’ wallets deposited funds into positions on Hyperliquid via Hyperliquid and Monero privacy bridges, then converted these assets to USDC and transferred them to the Arbitrum network. Subsequently, some of the funds were moved to the Ethereum network and then sent to THORChain to stake RUNE for a newly joined node, which is believed to be the source of the attack.

Related News: The Next Spot ETF Jackpot in the US Will Likely Hit This Altcoin

The analysis stated that the attackers later bridged a portion of the RUNE assets back to the Ethereum network and divided them into four different connections. One of these connections went directly to the attackers, passing through an intermediary wallet and transferring 8 ETH to an address that would receive the stolen funds just 43 minutes before the attack. In the other three connections, the fund flow occurred in the opposite direction.

Chainalysis also stated that between May 14-15, the wallets in question moved their ETH assets back to the Arbitrum network, then deposited them into Hyperliquid, and finally transferred them to Monero via the same privacy bridge. The last transfer reportedly occurred less than five hours before the attack began.

The company added that as of Friday afternoon, the stolen funds had not yet been moved, but the attackers possessed sophisticated cross-chain money laundering capabilities.

*This is not investment advice.

Continue Reading: Things Turned Out to Be Much More Complicated Behind the Scenes at the Altcoin That Was Recently Hacked

면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, [email protected]으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

No Chart Skills? Still Profit

No Chart Skills? Still ProfitNo Chart Skills? Still Profit

Copy top traders in 3s with auto trading!