Analysis: The money laundering route for Drift stolen funds involves Backpack accounts, with KYC information potentially serving as a key clue

robot
Abstract generation in progress

ME News Report, April 2nd (UTC+8), according to on-chain analyst aryan’s disclosure on the X platform, in the Drift protocol vault attack incident, the attacker’s address obtained funds via NEAR Intents 8 days ago but remained inactive until receiving a large amount of assets from the Drift vault. The attacker transferred the funds to multiple money-laundering addresses. Notably, these money-laundering addresses all received funds yesterday through Backpack, which should have conducted KYC verification on these accounts. Subsequently, the money-laundering addresses transferred the funds via Wormhole to an Ethereum address that had previously received funds through Tornado Cash. (Source: ChainCatcher)

DRIFT11.2%
ETH2.3%
W0.68%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin