Hacker Wakes After 2 Years, Deposits $5.4M Into Tornado Cash

ETH-0,96%

A hacker returned after two years of inactivity and deposited $5.4M in stolen funds into Tornado Cash after swapping DAI for ETH.

An attacker linked to a previous theft has resumed onchain activity after nearly two years of dormancy.

Blockchain data shows stolen funds are now being deposited into Tornado Cash, with movements accelerating over recent days.

Dormant Theft Address Becomes Active Again

The theft address, identified as 0xFe7e039cC5034436C534d5E21A8619A574e206F8, showed no notable activity for almost two years.

This period of inactivity ended when funds began moving again onchain.

Blockchain records indicate the address transferred assets without warning. Observers noted the timing suggested a planned return rather than random movement.

The renewed activity drew attention due to the size of the funds involved. The address had previously been linked to stolen assets.

Funds Shifted From DAI to ETH

According to Specter, before interacting with Tornado Cash, the theft address moved about $5.8 million in DAI.

The transfer went to a newly created wallet. The fresh wallet then swapped the DAI for ETH, changing the asset type before further movement.

The attacker has resumed activity after nearly two years of dormancy and is now depositing stolen funds into Tornado Cash.

A total of $5.4M has been deposited so far.

Prior to this, the theft address transferred $5.8M DAI to a fresh wallet, which was subsequently swapped for… https://t.co/6hZWByeuRQ pic.twitter.com/67vx2CLk6U

— Specter (@SpecterAnalyst) January 26, 2026

Such swaps are often used to prepare funds for privacy tools. ETH is commonly used for Tornado Cash deposits.

After the swap, the ETH balance was broken into smaller portions. These portions were then sent to Tornado Cash contracts.

$5.4M Deposited Into Tornado Cash

Blockchain data shows that about $5.4 million has been deposited into Tornado Cash so far. The deposits followed a clear and repeated pattern.

The attacker sent 100 ETH in twenty separate transactions. Additional deposits included three transfers of 10 ETH.

Smaller deposits were also made. These included eight transfers of 1 ETH and nine transfers of 0.1 ETH.

This pattern is consistent with prior Tornado Cash usage. Such behavior is often meant to blend deposits with others.

The deposits occurred over multiple transactions instead of one large transfer. This approach can complicate transaction analysis.

Related Reading: Hacker Who Stole $282 million Last Week, Launders $63M Via Tornado Cash: CertiK

Onchain Tracking and Current Status

Despite the use of Tornado Cash, parts of the transaction trail remain visible. Analysts can still track deposits and timing patterns.

No withdrawal transactions linked to the attacker have been confirmed yet. The funds remain inside Tornado Cash pools.

The activity suggests a careful and delayed strategy. The long dormancy may have been intended to reduce attention.

Security observers continue to monitor related addresses. Any future withdrawals could reveal additional links.

The case adds to recent examples of delayed fund movements. It shows how stolen assets can resurface years later.

As of now, $5.4 million has been deposited. Further movements may follow if the attacker continues the activity.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Articoli correlati

North Korean Actors Extract $577M in Crypto Hacks Through April 2026, Accounting for 76% of Global Losses

According to TRM Labs, North Korean actors extracted approximately $577 million in the first four months of 2026, representing 76% of all global cryptocurrency hack losses during the period. The theft stems from two April incidents: the $292 million KelpDAO exploit and the $285 million Drift

GateNews2h fa

North Korea Accounted for 76% of 2026 Crypto Hack Losses in First Four Months, $577M Stolen: TRM Labs

According to TRM Labs, North Korean actors extracted approximately $577 million through the first four months of 2026, representing 76% of all global cryptocurrency hack losses during the period. The losses stem from two April incidents: the $292 million KelpDAO exploit and the $285 million Drift Pr

GateNews2h fa

Kelp 兩週後全面升級跨鏈橋、ether.fi 同步硬化 WeETH

4月18日 rsETH 跨鏈橋遭駭後兩週,Kelp 於4/29完成升級:驗證者4/4、區塊確認64、拓撲採 hub-and-spoke,跨鏈訊息必須經以太主網中轉。ether.fi 亦同步硬化 weETH,並加入 DeFi United 捐贈5,000 ETH。DeFi United動員逾70,000 ETH救援資金,Aave 等市場利率顯著下降;但攻擊者仍持有約107,000 rsETH待清算,需治理與委員會式流程回收。

ChainNewsAbmedia2h fa

Wasabi 遭駭 290 萬美元:管理員私鑰外洩、合約被改成惡意版本

DeFi 衍生品 Wasabi Protocol 4/30 遭管理員私鑰外洩,攻擊者透過 Deployer EOA 獲得 ADMIN_ROLE,再利用 UUPS 升級機制替換 perp vaults 與 LongPool 為惡意版本,直接提款。CertiK 初估損失約 290 萬美元,影響以太坊主網與 Base;Wasabi 已公告暫停互動,Virtuals Protocol 也凍結 Wasabi 相關保證金。此事件凸顯上游私鑰安全對下游生態的風險。

ChainNewsAbmedia4h fa

WasabiCard Clarifies No Association With Wasabi Protocol and Wasabi Wallet on April 30

According to BlockBeats, WasabiCard issued a security statement on April 30 clarifying that it has no affiliation with Wasabi Protocol, Wasabi Wallet, or related projects and institutions. The platform partners with Safeheron for custodial wallet services and collaborates with security auditor

GateNews5h fa
Commento
0/400
Nessun commento