Scan to download
BTC $78,235.27 -1.08%
ETH $2,180.94 -1.76%
BNB $656.39 -2.43%
XRP $1.41 -1.42%
SOL $86.65 -2.91%
TRX $0.3543 +0.76%
DOGE $0.1095 -3.21%
ADA $0.2549 -2.34%
BCH $417.49 -1.84%
LINK $9.74 -3.08%
HYPE $41.94 -5.07%
AAVE $90.32 -2.63%
SUI $1.06 -2.81%
XLM $0.1516 -1.74%
ZEC $510.50 -1.23%
BTC $78,235.27 -1.08%
ETH $2,180.94 -1.76%
BNB $656.39 -2.43%
XRP $1.41 -1.42%
SOL $86.65 -2.91%
TRX $0.3543 +0.76%
DOGE $0.1095 -3.21%
ADA $0.2549 -2.34%
BCH $417.49 -1.84%
LINK $9.74 -3.08%
HYPE $41.94 -5.07%
AAVE $90.32 -2.63%
SUI $1.06 -2.81%
XLM $0.1516 -1.74%
ZEC $510.50 -1.23%

cross-chain

Chainalysis tracks the source of the THORChain attack: skilled in money laundering, the attack was carried out weeks after cross-chain fund movements

Chainalysis posted on the X platform that before the theft of THORChain, wallets suspected to be associated with the attacker had been transferring funds through Monero, Hyperliquid, and THORChain for several weeks. The attacker-associated wallets had already deposited into Hyperliquid positions via the Hyperliquid and Monero privacy bridge as early as the end of April. The funds were then exchanged for USDC and transferred to Arbitrum, and later bridged to Ethereum, with some ETH subsequently transferred to THORChain to become staked RUNE for newly added nodes, which are believed to be the source of the attack.Afterward, the attacker bridged some RUNE back to Ethereum and split it into four pathways, one of which went directly to the attacker. After being transferred through intermediate wallets, 8 ETH was sent to the final wallet receiving the stolen funds 43 minutes before the attack. The funds from the other three pathways flowed in the opposite direction. These wallets bridged ETH back to Arbitrum, deposited it into Hyperliquid, and transferred it into Monero through the same privacy bridge, with the last transaction occurring less than 5 hours before the attack began.As of Friday afternoon, the stolen funds have not yet been used, but the attacker has demonstrated their skilled cross-chain money laundering capabilities, and the Hyperliquid to Monero path may become the next move.

ZachXBT: $150 million DSJ Ponzi scheme collapses, $92 million in cross-chain money laundering, $41.5 million frozen

"On-chain detective" ZachXBT disclosed that the DSJ Exchange (DSJEX) / BG Wealth Sharing Ponzi scheme, involving over $150 million, collapsed last week.Under its leadership, actions were taken in collaboration with Tether, Binance security teams, OKX, and U.S. law enforcement agencies, resulting in approximately $41.5 million in funds being frozen, including $38.4 million frozen by Tether on May 4, and about $3.1 million frozen by other platforms.It is reported that the project has been operating since 2025, using "1.3%--2.6% daily returns" as a gimmick to attract users through referral commissions and tiered rewards. DSJ has been identified as a fraudulent trading platform, BG as a supporting investment organization, and the so-called CEO "Stephen Beard" is also a fictional character. Investigations show that the project team evaded regulation by frequently changing domain names and hot wallets, and promoted false trading signals through messaging applications. Before the collapse, the platform had suspended withdrawals and demanded users pay a 12% "tax" under the pretext of "upcoming IPO."In terms of fund flow, the involved addresses transferred assets through Tokenlon exchanges, cross-chain bridges (such as Bridgers, Butter Network), and stablecoin wrapping/unwrapping, ultimately flowing into addresses of multiple exchanges. Currently, 13 regulatory agencies from five continents have issued risk warnings regarding this project. Analysts believe that this incident once again highlights the critical role of cross-chain tracking and multi-party collaboration in combating cryptocurrency fraud.
app_icon
ChainCatcher Building the Web3 world with innovations.