Following up on our last investigation, The Lazarus Group, a North Korean hacker organization, is suspected of being responsible for the Harmony bridge attack and had transferred funds to multiple exchanges.
In an effort to aid in the investigation of the @harmonyprotocol Bridge attack, our team has compiled 350 malicious addresses associated with this attack into a Google Sheet and a Dune dashboard, now accessible to the public.
1⃣ Harmony Bridge Hacked-> 6/23/22
2⃣ Hacker deposits 85,700 #ETH to TC 6/26/22 to 7/02/22
3⃣ Funds were mixed via Railgun 🔄-> 1/13/23 to 1/14/23
4⃣ Funds were deposited to exchanges 💸-> 1/13/23 to 1/14/23
On June 23, 2022, the Harmony Bridge suffered a devastating hack.
The attacker was able to steal a significant amount of funds, which were subsequently swapped for ETH on the Ethereum network.
Wanna know how MistTrack can "demix" Tornado Cash Withdrawals?
We designed a dashboard on @DuneAnalytics to filter out potential Tornado cash withdrawals addresses, and then used our #MistTrack AML platform to validate our findings.
Here's how it works 🧵👇
For our analysis, we will be investigating a hacking incident. One of the addresses is 0x34a17418cEC67B82D08Cf77A987941F99DC87c6b.
According to MistTrack, it has deposited 11500 $ETH to the @TornadoCash 100 ETH contract address.