According to Chainalysis, the THORChain attacker executed a sophisticated multi-week preparation involving cross-chain fund transfers through Monero, Hyperliquid, and THORChain. Beginning in late April, the attacker moved funds via privacy bridge to Hyperliquid, converted them to USDC, bridged to Arbitrum then Ethereum, and deployed ETH as staked RUNE on the targeted node. In the final stage, the attacker split RUNE across four chains, transferring 8 ETH to the final receiving wallet 43 minutes before the attack. Other pathways reversed through Arbitrum back into Hyperliquid, exiting via the same Monero privacy bridge within 5 hours of the attack. As of Friday, stolen funds remain unmoved, but the attacker has demonstrated sophisticated laundering capabilities; the Hyperliquid-to-Monero pathway may signal the next step.
Related News
On-chain analyst: Multicoin is suspected of closing its AAVE positions at a stop-loss, with losses of over $40.56 million
Gate Daily Report (May 14): TAC cross-chain layer attacked on the TON side; Polymarket monthly trading volume down nearly 9%
Circle Revenue Hits $694M as Arc Raises $222M