Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Poloniex Hacker Moves $3.4M to Tornado Cash

May 7, 2024
Reading Time: 3 mins read
in News
Poloniex Hacker Moves $3.4M to Tornado Cash

In a recent development in the cryptocurrency security landscape, a hacker responsible for the significant Poloniex exchange hack last year has been reported to launder approximately $3.4 million. According to on-chain data analyzed by security firm PeckShield, the hacker transferred 1,100 ETH to Tornado Cash, a cryptocurrency mixing service that was sanctioned by the U.S. This method is typically employed by cybercriminals to obscure the origins of illicitly obtained funds, making it difficult to trace them back to their source.

Poloniex, a well-known cryptocurrency exchange, suffered a substantial security breach in November of the previous year, resulting in the loss of $100 million from one of its hot wallets. This attack is suspected to be linked to the North Korean Lazarus Group, a notorious state-sponsored hacking collective. This group has been implicated in several other major cyber thefts, including the infamous $600 million hack on the Ronin sidechain, which underscores the advanced capabilities and persistent threat posed by this entity.

In an attempt to recover the stolen funds, Poloniex publicly offered a 5% bounty, which amounts to about $5 million, in exchange for the return of 95% of the stolen assets. This strategy highlights the desperate measures sometimes employed by entities victimized in the burgeoning field of cryptocurrency theft, where recovery of funds can be particularly challenging due to the anonymous nature of blockchain transactions.

Additionally, another separate incident noted by PeckShield involved a hacker associated with a $26 million theft from Kronos Research, who also used Tornado Cash to launder 200 ETH. Although this hack occurred around the same time as the Poloniex incident, it remains unclear if there is a direct connection between the two attacks. These incidents collectively underscore the ongoing challenges and vulnerabilities in cryptocurrency security, demonstrating the sophisticated strategies employed by cybercriminals to exploit and obfuscate illicit gains.

Reference:
  • Poloniex Hacker Launders $3.4M via Tornado Cash
Tags: CryptocurrencyCyber DomeCyber NewsCyber News 2024Cyber threatsCybersecurityMay 2024PeckShieldPoloniexTornado CashU.S.
ADVERTISEMENT

Related Posts

Russia Arrests Young Cybersecurity Leader

Russia Arrests Young Cybersecurity Leader

November 28, 2025
FBI Reports 262 Million In Fraud

Poland Detains Russian Hacking Suspect

November 28, 2025
Russia Arrests Young Cybersecurity Leader

UK Privacy Enforcement Activity Drops

November 28, 2025
FBI Reports 262 Million In Fraud

AI Security Firm Vijil Raises 17 Million

November 27, 2025
Openai User Data Exposed In Mixpanel Hack

Amazon Uses AI Agents For Bug Hunting

November 27, 2025
Openai User Data Exposed In Mixpanel Hack

Openai User Data Exposed In Mixpanel Hack

November 27, 2025

Latest Alerts

Bloody Wolf Widens Java RAT Campaign

Forge Library Patch Stops Signature Bypass

ShadowV2 Botnet Tests During AWS Outage

Toddycat Tools Steal Outlook And M365 Data

Hackers Use Blender Assets To Spread StealC

ASUS Flags Critical AiCloud Router Flaw

Subscribe to our newsletter

    Latest Incidents

    Mazda Reports No Impact From Oracle Hack

    Asahi Breach Hits Two Million Users

    Qilin Ransomware Hits Korean MSP

    Multiple London Councils Hit By Cyber Attacks

    Russian Hackers Target US Engineering Firm

    Situsamc Confirms Customer Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial