• USD/CHF Price Forecast: Pair Holds Gains Below 0.7800 as USD Firms, But Bearish Bias Remains
  • South Korea’s Crypto Exchange Alliance Failed to Keep Records on VIP Benefit Rule Creation, Lawmaker Says
  • USD/CAD Flat Below 1.3700 as 100-Day EMA Caps Gains: Technical Outlook
  • S&P 500 Rally Extends on AI Strength and Solid Earnings: Deutsche Bank
  • British Pound Fills Weekly Bearish Gap Against Weaker Japanese Yen; GBP/JPY Steadies Below Mid-213.00s
2026-05-11
Coins by Cryptorank
  • Crypto News
  • AI News
  • Forex News
  • Sponsored
  • Press Release
  • Media Kit
  • Advertisement
  • More
    • About Us
    • Learn
    • Exclusive Article
    • Reviews
    • Events
    • Contact Us
    • Privacy Policy
  • Crypto News
  • AI News
  • Forex News
  • Sponsored
  • Press Release
  • Media Kit
  • Advertisement
  • More
    • About Us
    • Learn
    • Exclusive Article
    • Reviews
    • Events
    • Contact Us
    • Privacy Policy
Skip to content
Home Crypto News TrustedVolumes Hacker Moves $278K in Stolen Funds Through Mixers and Cross-Chain Swaps
Crypto News

TrustedVolumes Hacker Moves $278K in Stolen Funds Through Mixers and Cross-Chain Swaps

  • by Sofiya
  • 2026-05-11
  • 0 Comments
  • 2 minutes read
  • 1 View
  • 1 hour ago
Facebook Twitter Pinterest Whatsapp
Hacker's hand inserting USB drive into server in a dimly lit data center, representing the TrustedVolumes exploit and subsequent fund laundering.

Blockchain security firm PeckShield has reported that the hacker responsible for the recent TrustedVolumes exploit has successfully laundered approximately $278,000 worth of stolen cryptocurrency. The funds, part of a larger $6.7 million theft, have been moved through multiple privacy-focused protocols and cross-chain bridges.

How the Funds Were Moved

According to PeckShield’s on-chain analysis, the hacker executed two primary transactions. First, 10.2 ETH, valued at around $23,600, was deposited into Tornado Cash, a well-known cryptocurrency mixing service frequently used to obfuscate the trail of stolen assets. Second, a larger sum of 110 ETH, approximately $250,000, was swapped for Bitcoin through THORChain, a decentralized cross-chain liquidity protocol. This method allows the hacker to convert Ethereum into Bitcoin without relying on centralized exchanges, making it significantly harder for law enforcement to freeze or trace the funds.

Background on the TrustedVolumes Exploit

TrustedVolumes, a decentralized finance (DeFi) protocol, suffered a major security breach earlier this year, resulting in the loss of $6.7 million. The exploit targeted vulnerabilities in the platform’s smart contract code, allowing the attacker to drain funds from liquidity pools. The incident was part of a broader trend of DeFi hacks that have collectively cost the industry hundreds of millions of dollars in 2024 and 2025.

Why This Matters for the Crypto Ecosystem

The continued use of mixing services like Tornado Cash and cross-chain bridges like THORChain highlights a persistent challenge for regulators and blockchain forensic teams. While Tornado Cash has been sanctioned by the U.S. Treasury Department, its decentralized nature means it remains operational and accessible. Similarly, THORChain’s non-custodial, cross-chain architecture allows users to swap assets without KYC checks, making it an attractive tool for bad actors seeking to launder funds. This case underscores the ongoing cat-and-mouse game between security researchers and hackers, as well as the need for more robust on-chain surveillance and regulatory frameworks.

Conclusion

The laundering of $278,000 from the TrustedVolumes hack is a clear example of how sophisticated attackers use decentralized tools to evade detection. While the total sum moved so far represents only a fraction of the overall theft, it signals the hacker’s intent to gradually liquidate the stolen assets. The crypto community and law enforcement agencies will be watching closely for further movements, as any slip in operational security could lead to the identification of the perpetrator.

FAQs

Q1: What is Tornado Cash and why do hackers use it?
Tornado Cash is a decentralized privacy protocol that mixes cryptocurrencies from multiple users, making it difficult to trace the origin of funds. Hackers use it to break the on-chain link between stolen assets and their wallets.

Q2: How does THORChain help in laundering crypto?
THORChain is a decentralized cross-chain liquidity protocol that allows users to swap assets between different blockchains (e.g., Ethereum to Bitcoin) without KYC or centralized oversight. This makes it harder for authorities to freeze funds.

Q3: What is the current status of the TrustedVolumes hack investigation?
The investigation is ongoing. PeckShield and other blockchain security firms are monitoring the movement of funds. No arrests have been made, and the identity of the hacker remains unknown.

Disclaimer: The information provided is not trading advice, Bitcoinworld.co.in holds no liability for any investments made based on the information provided on this page. We strongly recommend independent research and/or consultation with a qualified professional before making any investment decisions.

Tags:

Crypto hackMoney LaunderingThorchainTornado CashTrustedVolumes

Share This Post:

Facebook Twitter Pinterest Whatsapp
Previous Post

Galaxy Digital: CLARITY Act’s Senate Fate Hinges on Seven Democratic Votes

Next Post

Saylor Doubles Down: MicroStrategy Will Buy 10-20 Bitcoin for Every One Sold

Categories

92

AI News

Crypto News

Bitcoin Treasury Ambition: The Blockchain Group Seeks Staggering €10 Billion

Events

97

Forex News

33

Learn

Press Release

Reviews

Google NewsGoogle News TwitterTwitter LinkedinLinkedin coinmarketcapcoinmarketcap BinanceBinance YouTubeYouTubes

Copyright © 2026 BitcoinWorld | Powered by BitcoinWorld