4 million USD worth of Ethereum stolen! Hacker money laundering exposed in full, multi-signature mechanism compromised

MarketWhisper
ETH-1,05%
IP4,97%
GNO-0,66%

以太坊洗錢

Unleash Protocol disclosed on Tuesday that it suffered a loss of 1,337 ETH worth approximately $4 million. Peckshield and CertiK tracking show that hackers laundered funds through Tornado Cash, sending multiple 100 ETH transactions to mixing services. The attackers gained unauthorized control of the multi-signature governance system, possibly executing unapproved contract upgrades via social engineering to bypass checks and withdraw funds.

Tornado Cash Laundering Tracking Report

According to on-chain activity and reports from multiple security firms, hackers are attempting to launder money using the Tornado Cash protocol on Ethereum. Tornado Cash is a cryptocurrency mixing service that pools user funds to break the traceable link between source and destination, making it difficult for law enforcement to track the flow of funds.

Peckshield notes that the attacker appears to have sent many 100 ETH blocks to this popular crypto mixing service. This batch transfer strategy is typical of money laundering, as transferring large sums at once is more likely to trigger monitoring systems. Splitting the 1,337 ETH into 13 to 14 transactions of 100 ETH each, spaced out over time, reduces the risk of immediate detection.

CertiK has begun flagging suspicious Wrapped ETH and IP token withdrawals, which are sent to an external account seemingly set up with SafeProxyFactory. This technical detail reveals the attacker’s expertise; SafeProxyFactory is a contract factory used to deploy new multi-signature wallets in Gnosis Safe (now Safe). The hacker used this tool to create temporary wallets to receive stolen funds, demonstrating a deep understanding of the Ethereum ecosystem.

Affected assets include WIP, USDC, WETH, stIP, and vIP, most of which have been bridged to Ethereum and sent to Tornado Cash. The bridging process itself complicates tracking, as assets cross multiple contracts and addresses, diluting traceability with each transfer. Once in Tornado Cash, funds are mixed with other users’ deposits, forming a “black box,” making it impossible to link input and output funds.

It’s noteworthy that Tornado Cash has been sanctioned by the U.S. Treasury since 2022; using the service itself is illegal. However, sanctions have not fully halted its operation because Tornado Cash is a decentralized smart contract protocol that cannot be shut down like centralized services. The fact that hackers are willing to risk legal repercussions by using Tornado Cash indicates their awareness of tracking techniques.

How Multi-Signature Governance Systems Can Be Compromised

Earlier Tuesday, Unleash disclosed a security breach. The project has suspended operations and begun forensic analysis. The attack appears to have originated from a breach of the multi-signature mechanism. Unleash posted on X: “Our preliminary investigation indicates that an externally owned address gained control through Unleash’s multi-signature governance and performed an unauthorized contract upgrade.”

In other words, the attacker gained management control over Unleash Protocol’s governance system without authorization, possibly through social engineering phishing or other security vulnerabilities, enabling them to execute upgrades bypassing normal checks and extract user funds. Such attack patterns are not uncommon in DeFi, but successfully breaching multi-signature mechanisms raises serious concerns.

Multi-signature wallets are a common asset protection mechanism in DeFi protocols. They require multiple private keys to sign transactions, theoretically preventing a single compromised key from stealing funds. However, this attack shows that multi-signature systems are not foolproof.

Three Possible Failures of Multi-Signature Mechanisms

Social Engineering Attacks: Hackers trick multiple signers via phishing emails or fake messages to leak private keys

Insider Malfeasance: Internal personnel holding multi-signature keys collude or are bribed to cooperate with hackers

Contract Exploits: Vulnerabilities in the multi-signature contract code itself allow attackers to bypass signing requirements

Unleash’s statement emphasizes that the “externally owned address” gained control, implying this may not be an insider threat but an external attacker who obtained sufficient signing authority through technical or social engineering means. The unauthorized upgrade allowed asset extraction outside of Unleash’s governance and operational procedures, indicating the attacker had full administrative control.

Story Protocol Ecosystem Security Warning

Unleash states: “This incident stems from the governance and permission framework of the Unleash protocol,” adding that “the impact appears limited to specific Unleash contracts and management controls,” and “there is no evidence that the Story Protocol contracts, validators, or underlying infrastructure have been compromised.” This statement aims to confine the damage scope to Unleash itself, avoiding broader implications for the entire Story Protocol ecosystem.

Unleash is one of many prominent applications built on Story Protocol. Story Protocol is a relatively new Layer 1 protocol focused on tokenizing intellectual property rights. The project’s backer, PIP Labs, has raised $140 million from top-tier investors. If this laundering incident raises concerns about the security of the Story Protocol ecosystem, it could impact other applications built on the protocol and the overall valuation.

The Unleash team has warned users not to interact with the protocol and promised to share updates once reliable information is available regarding the attack and potential remedies. Pausing protocol operations is a standard response to prevent further exploitation, but it also temporarily restricts legitimate users from accessing their assets.

From a broader perspective, this laundering event exposes the governance risks inherent in DeFi protocols. While multi-signature mechanisms are safer than single signatures, they still rely on human operation, which is the most vulnerable link. As DeFi’s locked value continues to grow, attacks targeting governance systems may become more frequent and sophisticated.

View Original
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

鏈上熱到爆、以太幣卻漲不動?專家揭「致命死穴」:恐下探 1,500 美元

CryptoQuant 報告指出,以太坊面臨「採用悖論」,雖然網路活躍度創新高,但幣價卻下滑。若熊市持續,到第三季末以太幣可能跌至 1,500 美元。智能合約活躍度上升與以太幣價格脫鉤,交易所流入量更能反映價格動態。投資需求疲軟,資金持續流失是主要隱憂。

区块客1h ago

昨日美国以太坊现货 ETF 净流入 2670 万美元,ETHA 流入 3240 万美元

Gate News 消息,3 月 14 日,据 Farside 监测,昨日(3 月 13 日)美国以太坊现货 ETF 净流入 2670 万美元。具体数据显示:贝莱德 ETHA 净流入 3240 万美元,Bitwise ETHW 净流入 220 万美元,富达 FETH 净流出 790 万美元。

GateNews2h ago

麻吉大哥加仓以太坊多单至8500枚ETH,单月胜率达75%

Gate News消息,3月14日,Hyperbot数据显示,麻吉大哥黄立成今晨再次加仓其25倍杠杆以太坊多单,仓位现已增至8500枚ETH,当前浮盈约7万美元,清算价约2038美元,并已在2117-2300美元区间挂出31笔限价卖单。此外,麻吉大哥单月胜率达到75%,四次平仓中盈利3次,亏损1次。

GateNews2h ago

三只巨鲸从 CEX 累计提取 16,728 枚 ETH,总价值约 2,524 万美元

3月14日,Onchain Lens监测显示三只巨鲸从CEX提取总计16,728枚ETH。其中鲸鱼地址"0x46D"提取9,220枚,"0xb37"提取5,000枚,"0xC4F"提取2,508枚,价值分别约955万、1,041万和528万美元。

GateNews4h ago
Comment
0/400
No comments