Hacker Wakes After 2 Years, Deposits $5.4M Into Tornado Cash

DAI-0,01%
ETH-3,51%

A hacker returned after two years of inactivity and deposited $5.4M in stolen funds into Tornado Cash after swapping DAI for ETH.

An attacker linked to a previous theft has resumed onchain activity after nearly two years of dormancy.

Blockchain data shows stolen funds are now being deposited into Tornado Cash, with movements accelerating over recent days.

Dormant Theft Address Becomes Active Again

The theft address, identified as 0xFe7e039cC5034436C534d5E21A8619A574e206F8, showed no notable activity for almost two years.

This period of inactivity ended when funds began moving again onchain.

Blockchain records indicate the address transferred assets without warning. Observers noted the timing suggested a planned return rather than random movement.

The renewed activity drew attention due to the size of the funds involved. The address had previously been linked to stolen assets.

Funds Shifted From DAI to ETH

According to Specter, before interacting with Tornado Cash, the theft address moved about $5.8 million in DAI.

The transfer went to a newly created wallet. The fresh wallet then swapped the DAI for ETH, changing the asset type before further movement.

The attacker has resumed activity after nearly two years of dormancy and is now depositing stolen funds into Tornado Cash.

A total of $5.4M has been deposited so far.

Prior to this, the theft address transferred $5.8M DAI to a fresh wallet, which was subsequently swapped for… https://t.co/6hZWByeuRQ pic.twitter.com/67vx2CLk6U

— Specter (@SpecterAnalyst) January 26, 2026

Such swaps are often used to prepare funds for privacy tools. ETH is commonly used for Tornado Cash deposits.

After the swap, the ETH balance was broken into smaller portions. These portions were then sent to Tornado Cash contracts.

$5.4M Deposited Into Tornado Cash

Blockchain data shows that about $5.4 million has been deposited into Tornado Cash so far. The deposits followed a clear and repeated pattern.

The attacker sent 100 ETH in twenty separate transactions. Additional deposits included three transfers of 10 ETH.

Smaller deposits were also made. These included eight transfers of 1 ETH and nine transfers of 0.1 ETH.

This pattern is consistent with prior Tornado Cash usage. Such behavior is often meant to blend deposits with others.

The deposits occurred over multiple transactions instead of one large transfer. This approach can complicate transaction analysis.

Related Reading: Hacker Who Stole $282 million Last Week, Launders $63M Via Tornado Cash: CertiK

Onchain Tracking and Current Status

Despite the use of Tornado Cash, parts of the transaction trail remain visible. Analysts can still track deposits and timing patterns.

No withdrawal transactions linked to the attacker have been confirmed yet. The funds remain inside Tornado Cash pools.

The activity suggests a careful and delayed strategy. The long dormancy may have been intended to reduce attention.

Security observers continue to monitor related addresses. Any future withdrawals could reveal additional links.

The case adds to recent examples of delayed fund movements. It shows how stolen assets can resurface years later.

As of now, $5.4 million has been deposited. Further movements may follow if the attacker continues the activity.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Posting your first crypto post to verify! X rolls out new anti-fraud rules to prevent hackers from stealing accounts—cracking down on scam-coin spam promotion

The social media platform X is rolling out a mandatory verification mechanism for cryptocurrency-related content to address increasingly severe scam problems. The mechanism will lock an account when it is first mentioned in relation to cryptocurrency, requiring users to complete identity verification. According to data, in 2025, crypto scams are expected to reach $17.0 billion, and social media platforms have become an important source of scams. The new measure is intended to reduce the success rate of scams that rely on high-trust accounts used by hackers; however, scam activity is still expanding rapidly, and preventive measures face challenges.

CryptoCity1h ago

Nobel Prize in Physics laureate warns: quantum computing could crack Bitcoin private keys within minutes

Former Google quantum hardware head John Martinis warns that Bitcoin could become a target for quantum computing attacks. Quantum computers could derive Bitcoin private keys within minutes, posing a greater threat than traditional financial systems. He recommends that the community plan quantum-resistance upgrades as early as possible to address threats over the next 5 to 10 years.

GateNews2h ago

The Ministry of State Security warns: Token scams are occurring frequently; you may be involved in illegal financial activities or be exploited by overseas intelligence agencies

The Ministry of State Security has recently warned about various scams that use the slogan “accumulating Tokens can make you rich” and said these activities endanger the country’s economic security. It also urged the public to handle illegal cryptocurrency trading with caution.

GateNews2h ago

360 finds three major security vulnerabilities in OpenClaw, involving 1 high-severity and 2 medium-severity issues

Gate News message: On April 7, 360 vulnerability-hunting intelligence agents recently discovered and reported 1 high-risk and 2 medium-risk high-value vulnerabilities targeting OpenClaw. At present, all newly discovered vulnerabilities have been officially fixed and publicly disclosed. The three newly discovered vulnerabilities directly target the core operating mechanism of the AI intelligence agents, directly affecting the core security of users’ devices, data, and accounts.

GateNews2h ago

Solana Foundation unveils security overhaul days after $270 million Drift exploit

The Solana Foundation announced a suite of security initiatives on Monday, just five days after decentralized finance (DeFi) platform Drift Protocol suffered a $270 million exploit carried out by a North Korean state-affiliated group following a six-month social engineering campaign. The

CoinDesk2h ago

Risk management team Chaos Labs left Aave due to budget issues—v4 security is in question?

The risk management team, Chaos Labs, announced it is terminating its partnership with Aave due to long-term losses and irreconcilable differences in risk management. At this time, Aave V4 has just gone live; after upgrading, Chaos needs to rebuild its risk tools, and the budget requirements are higher than what Aave is willing to accept. In addition, Aave is facing the departure of multiple core team members, raising doubts about operational stability.

ChainNewsAbmedia5h ago
Comment
0/400
No comments