WazirX crypto hacker moves $11.6m in Ethereum to Tornado cash

Onwubuke Melvin
Onwubuke Melvin

The hacker responsible for the $230 million exploit of India’s largest cryptocurrency exchange, Wazir X, has transferred an additional $11.6 million in Ethereum to the notorious crypto mixer Tornado Cash.

This latest transaction continues a pattern of using Tornado Cash to launder the stolen funds, making it increasingly difficult for authorities to track the assets.

Blockchain Security Firm CYVERS disclosed this current transaction by the hacker and shared details of the transaction via a post on its X account on Wednesday.

“UPDATE @WazirXIndia hacker just transferred 5K $ETH (~$11.6M) to a new address: https://etherscan.io/address/0x5990c7e24816bd103982b02e82ebf3adb49b6a6a… and already deposited $1.4M to @TornadoCash,” the post read.

After receiving 5,000 ETH, the hacker associated with the $230 million Wazir X exploit began transferring the funds in small increments to the crypto mixer Tornado Cash.

Each batch consisted of 100 ETH, valued at approximately $232,000, with a total of 36 batches—amounting to over 3,600 ETH—having been moved to the mixer.

The Wazir X hack on July 18 resulted in the loss of $230 million in customer funds, marking one of the largest exploits of the year.

The stolen assets were taken from the platform’s multi-signature wallet, which Wazir X co-owns with its security partner, Liminal Custody.

Initially, Wazir X’s team attributed the vulnerability that allowed the hack to Liminal Custody.

However, an independent audit conducted by Grant Thornton found that the exploit occurred outside of Liminal Custody’s control, shifting the focus back to the exchange’s own security practices.

The Wazir X team is incentivizing white hat hackers by offering a reward of 10% of the total stolen amount for any information that could lead to the recovery of the $230 million lost in the recent hack.

This initiative aims to leverage the expertise of ethical hackers to trace and reclaim the stolen funds.


TAGGED:
Share this Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *