In the Last Week, Ronin Exploiter Transferred 21,000 Ether to Tornado Cash

At the time of writing, the cache is valued at more over $65 million.

The individual responsible for Ronin’s record-breaking $655 million hack in March appears to have moved tens of millions of dollars’ worth of stolen ether (ETH) using privacy protocol Tornado Cash over the last week, blockchain data from addresses associated with the exploiter indicates.
The exploiter’s main address – dubbed Ronin Bridge Exploiter on tracking service Etherscan – appears to have moved over 21,000 ether in many transactions to various wallets over the last week.

These monies were then transferred to Tornado Cash, a privacy exchange. According to statistics, the exploiter seems to have made many trades of 100 ether each from each of those wallets.

56JA3U5W75DQVB5NSGUA4XMQJI

At current values, the monies transferred to Tornado Cash are valued upwards of $65 million.

Tornado promotes transaction privacy by severing the on-chain connection between the source and destination addresses. This enables exploiters and hackers to conceal their identities while taking monies obtained illegally.

Transfers out of the main wallet range between 1,000 and 3,202 ether this morning, the biggest so far.

Multiple ether deposits were made to some wallets, including 0xdf225C84A0eAEAaAC20E6C1d369e94EE13B9dF2A. Others, such as 0x429a66e7bD829F9453CEE5239Bfeaf5657A11A3e, have only witnessed a single deposit.

At the time of writing, the main wallet held upwards of 151,055 ether, which is worth $461 million at current pricing.

In March, the Ronin Network was compromised by a $625 million hack that targeted validator nodes for Sky Mavis, the publisher of the popular Axie Infinity game, and the Axie DAO.

According to Ronin, the attacker “used hacked private keys to generate bogus withdrawals” from the Ronin bridge spanning two transactions, as shown on Etherscan.

 

Disclaimer: These are the writer’s opinions and should not be considered investment advice. Readers should do their own research.

Leave a Comment

Your email address will not be published. Required fields are marked *

Facebook
Twitter
Telegram

Recent Posts

Follow Us