Things have gotten complicated for altcoins, which recently suffered significant losses due to a hack. Continue Reading: Things Turned Out to Be Much More ComplicatedThings have gotten complicated for altcoins, which recently suffered significant losses due to a hack. Continue Reading: Things Turned Out to Be Much More Complicated

Things Turned Out to Be Much More Complicated Behind the Scenes at the Altcoin That Was Recently Hacked

2026/05/17 04:38
Okuma süresi: 2 dk
Bu içerikle ilgili geri bildirim veya endişeleriniz için lütfen crypto.news@mexc.com üzerinden bizimle iletişime geçin.

Blockchain analytics company Chainalysis has shared new findings regarding the addresses behind the THORChain attack. According to the analysis published on the company’s X platform, the attackers used sophisticated money laundering methods, carrying out complex cross-chain fund transfers weeks before the attack.

According to Chainalysis data, wallets linked to the attack have been moving funds between Monero, Hyperliquid, and THORChain since late April. It appears the attackers’ wallets deposited funds into positions on Hyperliquid via Hyperliquid and Monero privacy bridges, then converted these assets to USDC and transferred them to the Arbitrum network. Subsequently, some of the funds were moved to the Ethereum network and then sent to THORChain to stake RUNE for a newly joined node, which is believed to be the source of the attack.

Related News: The Next Spot ETF Jackpot in the US Will Likely Hit This Altcoin

The analysis stated that the attackers later bridged a portion of the RUNE assets back to the Ethereum network and divided them into four different connections. One of these connections went directly to the attackers, passing through an intermediary wallet and transferring 8 ETH to an address that would receive the stolen funds just 43 minutes before the attack. In the other three connections, the fund flow occurred in the opposite direction.

Chainalysis also stated that between May 14-15, the wallets in question moved their ETH assets back to the Arbitrum network, then deposited them into Hyperliquid, and finally transferred them to Monero via the same privacy bridge. The last transfer reportedly occurred less than five hours before the attack began.

The company added that as of Friday afternoon, the stolen funds had not yet been moved, but the attackers possessed sophisticated cross-chain money laundering capabilities.

*This is not investment advice.

Continue Reading: Things Turned Out to Be Much More Complicated Behind the Scenes at the Altcoin That Was Recently Hacked

Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen crypto.news@mexc.com ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

No Chart Skills? Still Profit

No Chart Skills? Still ProfitNo Chart Skills? Still Profit

Copy top traders in 3s with auto trading!