MistTrack Profile picture
Jan 23 8 tweets 5 min read
🚨New Updates on the Harmony Bridge Hack 🚨

On June 23rd of 2022, the Harmony bridge fell victim to a devastating attack that resulted in a loss of approximately $100 million.

Following up on our last investigation, The Lazarus Group, a North Korean hacker organization, is suspected of being responsible for the Harmony bridge attack and had transferred funds to multiple exchanges.

The funds were quickly converted to #BTC and withdrawn from the exchanges.

After several multi-layer transfers, some funds were transferred again to exchanges. Image
While others were bridged to the #AVAX network and then through multiple cross-chain exchanges for #USDT/#USDD.

Shout out to @tayvano_ for their amazing dashboard:
dune.com/tayvano/btc-av…
Subsequently, the funds were transferred to the #ETH network and some to the #TRON network.

The recipient addresses are related to a USDT mixed network. Here are some addresses:

ETH: 0x51710b457852a08ea07404b9a61f2ab3e352197a
TRON:
TUGFg594mmCp2xiVDs4isqwHMup1uNxpMn Image
Here's what the cross-chain path looks like:

#Bitcoin network -[Avalanche Bridge]-> #Avalanche network -[Avalanche Bridge]-> #Ethereum Network -[@BitTorrent ]-> #Tron Network( partial)

Swapped via: @1inch - Limit order function
Follow us and stay up to date on the latest Lazarus Group's suspected involvement and the movement of funds through multiple exchanges and networks.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with MistTrack

MistTrack Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @MistTrack_io

Jan 16
In an effort to aid in the investigation of the @harmonyprotocol Bridge attack, our team has compiled 350 malicious addresses associated with this attack into a Google Sheet and a Dune dashboard, now accessible to the public.

But first, let's go over the sequence of events.
Timeline of @harmonyprotocol Bridge Attack:

1⃣ Harmony Bridge Hacked-> 6/23/22
2⃣ Hacker deposits 85,700 #ETH to TC 6/26/22 to 7/02/22
3⃣ Funds were mixed via Railgun 🔄-> 1/13/23 to 1/14/23
4⃣ Funds were deposited to exchanges 💸-> 1/13/23 to 1/14/23
On June 23, 2022, the Harmony Bridge suffered a devastating hack.

The attacker was able to steal a significant amount of funds, which were subsequently swapped for ETH on the Ethereum network.

Details of stolen funds shown below: Image
Read 10 tweets
Sep 27, 2022
Wanna know how MistTrack can "demix" Tornado Cash Withdrawals?

We designed a dashboard on @DuneAnalytics to filter out potential Tornado cash withdrawals addresses, and then used our #MistTrack AML platform to validate our findings.

Here's how it works 🧵👇
For our analysis, we will be investigating a hacking incident. One of the addresses is 0x34a17418cEC67B82D08Cf77A987941F99DC87c6b.

According to MistTrack, it has deposited 11500 $ETH to the @TornadoCash 100 ETH contract address.

misttrack.io/s/ZYfOo
To help reduce the size of possible addresses, all you have to do is enter the following parameters into our dashboard.

1⃣ block_number_range
2⃣ contract_address
3⃣ stolen_block_number
4⃣ withdrawl_number

dune.com/awesome/Tornad…
Read 15 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(