close button

Hacker begins laundering funds from the $100 million Harmony bridge attack

Hacker begins laundering funds from the $100 million Harmony bridge attack.

The hacker responsible for stealing $100 million from Horizon, a cross-chain bridge tied to the Harmony blockchain protocol, has begun laundering the funds, according to reports by PeckShield.

Data from Etherscan show the wallet used by the hacker in the attack sent out about 18,000 ETH ($21 million) to another wallet.

The hacker used this other wallet to disburse the funds to three different addresses, sending about 6,000 ETH ($7 million each).

First intermediary address has already laundered the funds received via Tornado Cash, a coin mixing service.

The second wallet is doing so in batches of 100 ETH ($116,000), while the third wallet still has the 6,000 ETH in it as of the time of publishing.

These fund transfers come even as Harmony offered a $1 million bounty to return the stolen funds.

The blockchain project has even offered to waive any law enforcement action should the hacker return the stolen crypto assets.

The hacker’s wallet still holds over $80 million in ETH tokens and about $65,000 worth of other tickets stolen during the bridge exploit as press time.

USD

Hacker begins laundering funds

Thursday’s Horizon bridge attack saw the theft of more than 85,000 ETH worth $98 million at the time.

Security experts like Mudit Gupta, the chief information security officer at Polygon, say the hack happened because the bridge’s multi-signature wallet was compromised, as previously reported by The Block.

Muti-signature wallets work by having a smart contract with several private keys controlling the use of the wallet.

The smart contract usually includes a minimum number of keys required to approve a transaction.

As such, these keys are shared among different persons, with the logic being that the decentralized approval process will make it harder for malicious actors to break into the wallet.

There is, however, the problem of setting a low minimum number of keys to approve transactions.

This was reportedly the case in the Horizon attack. According to Gupta, the bridge was assigned to a “2 of 5 multi-sig.” This means the hacker only needed to compromise two keys to steal the funds.

A similar situation also led to the Ronin bridge hack in March, when the hackers stole about $600 million worth of crypto.

The Roin attacker — later identified by the US government as the North Korea-tied hacking group Lazarus — compromised five out of the nine validators used by the bridge protocol.



Paola Torrente Wiki Bio Age Height Weight Net Worth 2022

Emma Gretzky Wiki Bio Age Height Weight Net Worth 2022


Follow us or bookmark us for more Celeb Bio box office collection report celebrities trailers and promos

Join us on Facebook 

Join us on Twitter

Leave a Comment

Camila Mendes Showing Her Perfect Curves Famous Celebrities and their Doppelganger Australian model Shanina Shaik becomes mum for first time James Blunt and Sofia Wellesley joins the queue David Beckham Queues for 12 Hours