📢 Gate Square Exclusive: #PUBLIC Creative Contest# Is Now Live!
Join Gate Launchpool Round 297 — PublicAI (PUBLIC) and share your post on Gate Square for a chance to win from a 4,000 $PUBLIC prize pool
🎨 Event Period
Aug 18, 2025, 10:00 – Aug 22, 2025, 16:00 (UTC)
📌 How to Participate
Post original content on Gate Square related to PublicAI (PUBLIC) or the ongoing Launchpool event
Content must be at least 100 words (analysis, tutorials, creative graphics, reviews, etc.)
Add hashtag: #PUBLIC Creative Contest#
Include screenshots of your Launchpool participation (e.g., staking record, reward
$1.5 billion ETH stolen, the industry faces severe security challenges.
Major Hacker Incidents Reveal Security Challenges Facing the Crypto Assets Industry
On February 21, 2025, a shocking security incident occurred at a well-known Crypto Assets trading platform, resulting in the theft of approximately $1.5 billion in assets from its Ethereum cold wallet. This incident is considered the largest single theft in the history of Crypto Assets, far exceeding other major security events that occurred previously, and has caused a tremendous impact on the entire industry.
This article will provide a detailed account of the hacker incident and the methods of fund laundering, while reminding readers that over the next few months, over-the-counter trading groups and crypto payment companies may face a large-scale risk of fund freezing.
Details of the Theft Incident
According to the description from the executives of the trading platform and the preliminary investigation by the blockchain analysis company, the process of this theft incident is as follows:
Attack Preparation: The hacker deployed a malicious smart contract at least three days prior to the incident, laying the groundwork for the subsequent attack.
Invasion of Multi-Signature System: The Ethereum cold wallet of the victim platform employs a multi-signature mechanism. The Hacker infiltrated the computer managing the multi-signature wallet through unknown means, possibly using a disguised interface or malware.
Cloaked Transactions: Hackers take advantage of the timing of normal fund transfers on the platform, disguising the transaction interface as a routine operation, and inducing signers to confirm a seemingly legitimate instruction that actually alters the logic of the cold wallet smart contract.
Fund Transfer: After the instruction took effect, the Hacker swiftly took control of the cold wallet, transferring approximately $1.5 billion worth of ETH and ETH staking certificates to an unknown address. Subsequently, the funds were dispersed to multiple wallets and began the money laundering process.
Money Laundering Techniques
The money laundering process of a Hacker mainly consists of two stages:
The first phase is the early capital split. The attacker quickly exchanged the ETH staking certificate for ETH, rather than opting for stablecoins that could potentially be frozen. The ETH is then strictly split and transferred to subordinate addresses in preparation for laundering.
It is worth noting that at this stage, the attacker's attempt to exchange 15,000 mETH for ETH was promptly halted, preventing greater losses for the industry.
The second phase is the specific money laundering work. The attacker uses centralized and decentralized industry infrastructure for fund transfers, including various cross-chain protocols and decentralized exchanges. Some protocols are used for currency exchange, while others are used for cross-chain transfers.
As of now, a large amount of stolen funds has been converted into mainstream Crypto Assets such as BTC, DOGE, and SOL for transfer, and some of the funds have even been used to issue meme coins or transferred to exchange addresses for obfuscation.
Blockchain analysis companies are monitoring and tracking relevant addresses, and related threat information will be synchronized and pushed on their professional platform to prevent users from mistakenly receiving stolen funds.
Hacker Organization Background Analysis
By analyzing the flow of funds, researchers found a connection between this incident and two exchange hacking events that occurred in October 2024 and January 2025, indicating that these three attacks may have been orchestrated by the same entity.
Considering its highly industrialized money laundering techniques and attack methods, some blockchain security experts attribute this incident to a notorious Hacker organization. This organization has launched cyber attacks on institutions and infrastructure in the crypto assets industry multiple times over the past few years, illegally obtaining crypto assets worth billions of dollars.
Potential Freezing Risk
Security researchers have found in investigations over the past few years that, in addition to using decentralized platforms for money laundering, the hacker organization has also heavily utilized centralized platforms for cashing out funds. This has directly led to many exchange users' accounts, which inadvertently received illicit funds, being flagged for risk control, and the business addresses of over-the-counter traders and payment institutions being frozen.
For example, in 2024, a Japanese crypto assets exchange was attacked, and $600 million worth of Bitcoin was stolen. Some of the funds were transferred to crypto payment institutions in Southeast Asia, resulting in the freezing of the institution's hot wallet address, with nearly $30 million in funds locked.
In 2023, another trading platform was attacked by a suspected hacker organization, and over $100 million in funds was stolen. Some of the stolen funds were laundered through over-the-counter trading, resulting in the freezing of business addresses of a large number of over-the-counter traders, or their exchange accounts being subject to risk control, severely impacting normal business activities.
Conclusion
Frequent hacker attacks not only cause huge losses to the industry, but the subsequent money laundering activities also pollute the addresses of more innocent individuals and institutions. For these potential victims, it is crucial to closely monitor these threat funds in their daily operations to prevent their own interests from being affected. The crypto assets industry needs to further strengthen security measures, raise awareness, and jointly address the increasingly complex challenges of cybersecurity.