This breach and subsequent laundering activity show the continued vulnerabilities faced by centralized exchanges, even those with strong security measures.
The hacker responsible for the recent attack on the Rain crypto exchange has begun laundering stolen Ether through Tornado Cash, a popular mixing service.
A blockchain security firm, PeckShield, has closely monitored the situation and identified the action.
The most recent update from PeckShield indicates that the attacker transferred 1,155 Ether, estimated to be worth $2.9 million, to Tornado Cash.
This transaction appears to be part of a bigger effort to hide the funds’ origins and make them more difficult to track.
The Rain Exchange Breach
Rain is a Bahrain-based cryptocurrency exchange that specializes in providing services to users from the Middle East and Southwest Asia.
On April 29, the exchange was exploited, transferring approximately $14.1 million worth of various cryptocurrencies, such as Bitcoin, Ether, Solana, and XRP, to a new wallet under suspicious circumstances.
Onchain investigator ZachXBT initially reported the exploit on May 13 and provided a detailed account of the suspicious transactions that had occurred two weeks prior.
The report exposed the attack’s scope and method, which prompted concern within the crypto community.
In an X post, AJ Nelson, the co-founder of Rain, verified the breach.
Nelson assured users in his statement that the exchange had compensated for the stolen assets from its funds, guaranteeing that the platform would continue functioning as intended.
This prompt response aimed to maintain user trust and showcase the exchange’s commitment to transparency and security.
The Role of Tornado Cash
Tornado Cash is a decentralized, non-custodial privacy solution based on Ethereum.
It employs zero-knowledge proofs to allow users to disrupt the onchain link between the source and destination of funds.
However, malicious actors have also exploited this technology to launder stolen cryptocurrencies despite its value to privacy-conscious users.
In this case, the Rain hacker’s use of Tornado Cash highlights the difficulties exchanges and law enforcement agencies face in identifying and recovering stolen assets.
The crypto mixer service makes it far more difficult to trace the flow of funds, providing a big challenge in the pursuit of cybercriminals.
Meanwhile, the Nexera protocol was exploited to obtain $1.5 million in digital assets in a separate smart contract security incident on Aug. 6.
Furthermore, a suspected white-hat hacker exploited a vulnerability in the Ronin network to get $9.8 million in ETH tokens, but the funds were later returned on Aug. 6.