Two wallets 0x1209…e9C and 0xaac6…508 were stolen approximately 2.3 million USD USDT due to the leaked private key; the money was then exchanged for 757.6 ETH and laundered through TornadoCash.

The incident was recorded through on-chain monitoring by PeckShieldAlert, showing a typical chain of actions: wallet takeover, stable asset transfer, exchange for ETH, and then using a mixing tool to obscure the cash flow.

MAIN CONTENT

  • Approximately 2.3 million USD USDT was stolen due to a compromised private key.

  • USDT was exchanged for 757.6 ETH after being seized.

  • The funds were laundered through TornadoCash.

The developments of the theft and money laundering

PeckShieldAlert detected two wallet addresses 0x1209…e9C and 0xaac6…508 that lost approximately 2.3 million USD USDT due to the leaked private key; the attacker exchanged it for 757.6 ETH and sent it through TornadoCash.

According to the report on December 23, the point of origin was a compromised private key, allowing the attacker to sign transactions to withdraw USDT from the two mentioned wallets. After seizing the stablecoin, the attacker proceeded to convert it to ETH, with the amount obtained being 757.6 ETH, to increase the ability to move through multiple channels and prepare for anonymity.

The final stage is laundering through TornadoCash. Sending ETH to the mixing service reduces the traceability of the link between the source address (0x1209…e9C, 0xaac6…508) and the subsequent receiving addresses, making the recovery process and on-chain investigation more difficult.

Source: https://tintucbitcoin.com/pyshield-lo-khoa-rieng-mat-23-trieu-usdt/

Thank you all for reading this article!

Please Like, Comment, and Follow TinTucBitcoin to stay updated with the latest news about the cryptocurrency market and not miss any important information!

$BTC $ETH $BNB $XRP $SOL