Gate Square “Creator Certification Incentive Program” — Recruiting Outstanding Creators!
Join now, share quality content, and compete for over $10,000 in monthly rewards.
How to Apply:
1️⃣ Open the App → Tap [Square] at the bottom → Click your [avatar] in the top right.
2️⃣ Tap [Get Certified], submit your application, and wait for approval.
Apply Now: https://www.gate.com/questionnaire/7159
Token rewards, exclusive Gate merch, and traffic exposure await you!
Details: https://www.gate.com/announcements/article/47889
$282M Lost in Crypto Scam Using THORChain & XMR Swap
Source: Coinomedia Original Title: $282M Lost in Crypto Scam Using THORChain & XMR Swap Original Link: https://coinomedia.com/282m-lost-in-crypto-scam-using-thorchain-xmr-swap/
Massive $282M Scam Exposes Crypto Security Risks
According to blockchain investigator zachxbt, a devastating $282 million crypto theft has rocked the community. The victim reportedly lost a massive amount of Bitcoin (BTC) and Litecoin (LTC) through a sophisticated social engineering attack tied to a hardware wallet scam.
This incident is one of the largest personal crypto thefts to date, and it raises fresh concerns about wallet safety, phishing tactics, and asset laundering across decentralized networks.
The attacker cleverly avoided detection by moving the stolen funds through privacy-centric and cross-chain platforms — making recovery and traceability difficult.
How the Attacker Laundered the Crypto
After draining the funds, the attacker began converting the assets to avoid tracking. A significant portion of the stolen BTC and LTC was converted into Monero (XMR) — a privacy-focused cryptocurrency. This triggered a sharp spike in XMR’s price, likely due to the large volume of buys.
The laundering didn’t stop there. The attacker leveraged THORChain, a decentralized cross-chain liquidity protocol, to execute the following swaps:
By using THORChain, which allows asset swaps without centralized exchanges, the attacker avoided traditional Know-Your-Customer (KYC) processes and increased the complexity of tracing the funds.
Security Takeaways for Crypto Holders
This incident highlights a chilling truth: even hardware wallets are not foolproof if users fall for phishing or social engineering attacks.
Key takeaways include:
As attackers become more sophisticated, the community must stay vigilant. This case also demonstrates how privacy coins and decentralized swapping protocols can be double-edged swords — empowering users, but also shielding bad actors.