Scan to download
BTC $78,219.92 -1.06%
ETH $2,180.91 -1.78%
BNB $656.90 -2.32%
XRP $1.41 -1.22%
SOL $86.60 -2.85%
TRX $0.3550 +0.96%
DOGE $0.1095 -3.41%
ADA $0.2550 -2.45%
BCH $416.11 -2.14%
LINK $9.73 -3.27%
HYPE $41.94 -4.66%
AAVE $90.15 -2.77%
SUI $1.06 -2.78%
XLM $0.1519 -1.53%
ZEC $510.52 -0.78%
BTC $78,219.92 -1.06%
ETH $2,180.91 -1.78%
BNB $656.90 -2.32%
XRP $1.41 -1.22%
SOL $86.60 -2.85%
TRX $0.3550 +0.96%
DOGE $0.1095 -3.41%
ADA $0.2550 -2.45%
BCH $416.11 -2.14%
LINK $9.73 -3.27%
HYPE $41.94 -4.66%
AAVE $90.15 -2.77%
SUI $1.06 -2.78%
XLM $0.1519 -1.53%
ZEC $510.52 -0.78%

ter

Chainalysis tracks the source of the THORChain attack: skilled in money laundering, the attack was carried out weeks after cross-chain fund movements

Chainalysis posted on the X platform that before the theft of THORChain, wallets suspected to be associated with the attacker had been transferring funds through Monero, Hyperliquid, and THORChain for several weeks. The attacker-associated wallets had already deposited into Hyperliquid positions via the Hyperliquid and Monero privacy bridge as early as the end of April. The funds were then exchanged for USDC and transferred to Arbitrum, and later bridged to Ethereum, with some ETH subsequently transferred to THORChain to become staked RUNE for newly added nodes, which are believed to be the source of the attack.Afterward, the attacker bridged some RUNE back to Ethereum and split it into four pathways, one of which went directly to the attacker. After being transferred through intermediate wallets, 8 ETH was sent to the final wallet receiving the stolen funds 43 minutes before the attack. The funds from the other three pathways flowed in the opposite direction. These wallets bridged ETH back to Arbitrum, deposited it into Hyperliquid, and transferred it into Monero through the same privacy bridge, with the last transaction occurring less than 5 hours before the attack began.As of Friday afternoon, the stolen funds have not yet been used, but the attacker has demonstrated their skilled cross-chain money laundering capabilities, and the Hyperliquid to Monero path may become the next move.

After the attack on KelpDAO, multiple protocols have abandoned LayerZero, with $4 billion in assets migrated to Chainlink CCIP

According to CoinDesk, after KelpDAO was attacked resulting in a loss of $292 million, the industry's scrutiny of the security of cross-chain infrastructure continues to heat up, with approximately $4 billion in assets having completed or currently migrating from LayerZero to Chainlink's Cross-Chain Interoperability Protocol (CCIP).The DeFi protocol Lombard is the latest project to join this migration trend. The protocol announced it would abandon LayerZero and migrate over $1 billion in Bitcoin-backed assets to Chainlink CCIP, stating that this decision stemmed from a comprehensive internal security review following the April attack incident.Lombard issues two types of Bitcoin-backed tokens—LBTC and BTC.b—and will prioritize the migration of assets on chains such as Solana, Etherlink, Berachain, Corn, and TAC, while terminating the use of LayerZero on Morph and Swell. Lombard stated that the reason for choosing CCIP is its independent node operators, built-in rate limiting mechanisms, and audited infrastructure. Additionally, the protocol will adopt Chainlink's cross-chain token standard to achieve asset cross-chain circulation through a burn-and-mint model.Previously, Kelp DAO, Solv Protocol, Re, and the cryptocurrency exchange Kraken have all completed similar migrations, with these projects collectively transferring approximately $4 billion in assets. Chainlink Labs Chief Business Officer Johann Eid stated, "We are witnessing a continued wave of risk-averse migration within the industry."
app_icon
ChainCatcher Building the Web3 world with innovations.