Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesCopyBotsEarn

Atomic Wallet Hackers Use THORChain to Conceal Stolen $35M Funds

CoindeskCoindesk2023/06/20 12:21
By:Oliver Knight

The hackers, believed to be North Korean hacking group Lazarus, have been using cross-chain bridges and liquidity protocols to mix stolen funds.

Hackers that targeted crypto wallet Atomic Wallet in a $35 million heist earlier this month have used cross-chain liquidity protocol THORChain to conceal their ill-gotten gains, according to blockchain sleuth .

MistTrack states that 503.08 ether (ETH), or around $870,000, connected to the hack was transferred to THORChain in the last two days before being swapped for bitcoin (BTC).

Some of the stolen ether was also bridged to multiple bitcoin addresses using the Swft blockchain, MistTrack said.

Last week, the hackers to crypto exchange Garantex, which was sanctioned by the Office of Foreign Assets Control (OFAC) of the U.S. Treasury .

Blockchain security firm Elliptic said that it believes North Korean hacking group Lazarus are behind the attack.

THORChain's native token (RUNE) remains stable following the string of hack-related transactions, it trades at 84 cents having risen slightly in the past 24-hours, according to .

Edited by Parikshit Mishra.



91

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Stake to earn
CEC, QTLX, GDV and other popular new coins are in hot progress!
Stake now!

You may also like

July 2024: Optimizing Balanced Through New Development

In July, ICON advanced its integration efforts and optimized system performance. Key achievements including completion of audits for Stellar, and contracts for Solana. Looking ahead to August we anticipate the deployment of Sui contracts to mainnet.|

Icon Foundation Blog2024/08/06 11:15