Ethereum Hackers Capitalize on Market Crash to Acquire Discounted ETH with Stolen Funds

  • Hackers seized the opportunity presented by a recent market downturn to purchase discounted Ether (ETH) using illicitly obtained funds.
  • They transferred the stolen ETH to Tornado Cash, a cryptocurrency mixer that obfuscates the source and destination of assets, complicating investigative efforts.
  • This incident underscores persistent vulnerabilities within the crypto sector, exacerbated by additional stolen fund movements from other hacks, such as Pancake Bunny.

Hackers leverage market crashes to capitalize on stolen crypto funds, underscoring the persistent vulnerabilities within the digital asset space.

Cybercriminals Acquire Cut-Rate Ethereum Amid Market Decline

In a strategic maneuver, a group of cryptocurrency hackers recently capitalized on a market crash to buy heavily discounted Ethereum (ETH) with stolen funds. On August 5, these bad actors, linked to the 2022 Nomad bridge hack, seized 16,892 ETH at a bargain. Blockchain analytics firm Lookonchain brought this event to light on X (formerly Twitter).

The purchase came as ETH’s value plummeted by more than 20%, dropping from around $2,760 to $2,172 within a 12-hour span. As of the latest update, ETH is trading at $2,335.94, boasting a market cap of $279,973,930,183 and a 24-hour trading volume of $52,423,416,726.

The Genesis of the Nomad Bridge Exploit

The Nomad bridge, a cross-chain digital asset transit, suffered a massive security breach in August 2022, resulting in the loss of nearly $200 million. The breach was caused by a flaw in the bridge’s smart contract that allowed unauthorized withdrawals. The hackers exploited this vulnerability to siphon off the assets.

Following the breach, the perpetrators utilized 39.75 million DAI of the stolen tokens to acquire 16,892 ETH. Lookonchain reported that shortly after the transaction, the stolen funds were moved to Tornado Cash. This mixer service is widely known for making on-chain fund traces exceedingly difficult.

Persistent Market Vulnerabilities and Additional Hacks

The landscape of ongoing market volatility has seen other instances of stolen funds being moved, including assets from the Pancake Bunny hack. This automated market maker on the BNB Smart Chain was compromised in 2021 through a flash loan attack, which resulted in substantial financial loss.

Blockchain investigator Officer CIA disclosed that, recently, 3.6 million DAI from the Pancake Bunny hack was inadvertently sent to a stablecoin address. Despite U.S. sanctions, Tornado Cash remains a favored tool for obfuscating crypto transactions among malicious actors.

Conclusion

The recent actions of cryptocurrency hackers once more spotlight the systemic vulnerabilities within the digital asset arena. By exploiting market downturns and moving stolen funds via mixers like Tornado Cash, these cybercriminals continue to evade justice. This ongoing saga serves as a stark reminder of the need for enhanced security measures within the crypto ecosystem.

Don't forget to enable notifications for our Twitter account and Telegram channel to stay informed about the latest cryptocurrency news.

BREAKING NEWS

Bitcoin-Backed USDa Partners with Ethena Labs to Revolutionize DeFi Arbitrage Strategies

On November 14th, COINOTAG reported a significant development in...

Grayscale BTC Sees Massive $61.3 Million Net Inflow Amid Growing Institutional Interest

In a recent analysis by COINOTAG, dated November 14th,...

Bybit Announces Support for Sei SEI v6.0.0 Network Upgrade | Coin SEI Reaches $0.4507

Bybit to Support Sei SEI v6.0.0 Network Upgrade --------------- 💰Coin: SEI (...

Pepe (PEPE) Now Available on Upbit’s KRW Market: Coin Price and Details

UPBIT LISTING: Pepe PEPE Added to KRW Market --------------- 💰Coin: PEPE (...

Ethereum Whale Accumulates 7,389.5 ETH Worth $23.44 Million in Just 3 Days

In a significant development within the crypto market, COINOTAG...
spot_imgspot_imgspot_img

Related Articles

spot_imgspot_imgspot_imgspot_img

Popular Categories

spot_imgspot_imgspot_img