A hacker returned after two years of inactivity and deposited $5.4M in stolen funds into Tornado Cash after swapping DAI for ETH.
An attacker linked to a previous theft has resumed onchain activity after nearly two years of dormancy.
Blockchain data shows stolen funds are now being deposited into Tornado Cash, with movements accelerating over recent days.
Dormant Theft Address Becomes Active Again
The theft address, identified as 0xFe7e039cC5034436C534d5E21A8619A574e206F8, showed no notable activity for almost two years.
This period of inactivity ended when funds began moving again onchain.
Blockchain records indicate the address transferred assets without warning. Observers noted the timing suggested a planned return rather than random movement.
The renewed activity drew attention due to the size of the funds involved. The address had previously been linked to stolen assets.
Funds Shifted From DAI to ETH
According to Specter, before interacting with Tornado Cash, the theft address moved about $5.8 million in DAI.
The transfer went to a newly created wallet. The fresh wallet then swapped the DAI for ETH, changing the asset type before further movement.
The attacker has resumed activity after nearly two years of dormancy and is now depositing stolen funds into Tornado Cash.
A total of $5.4M has been deposited so far.
Prior to this, the theft address transferred $5.8M DAI to a fresh wallet, which was subsequently swapped for… https://t.co/6hZWByeuRQ pic.twitter.com/67vx2CLk6U
— Specter (@SpecterAnalyst) January 26, 2026
Such swaps are often used to prepare funds for privacy tools. ETH is commonly used for Tornado Cash deposits.
After the swap, the ETH balance was broken into smaller portions. These portions were then sent to Tornado Cash contracts.
$5.4M Deposited Into Tornado Cash
Blockchain data shows that about $5.4 million has been deposited into Tornado Cash so far. The deposits followed a clear and repeated pattern.
The attacker sent 100 ETH in twenty separate transactions. Additional deposits included three transfers of 10 ETH.
Smaller deposits were also made. These included eight transfers of 1 ETH and nine transfers of 0.1 ETH.
This pattern is consistent with prior Tornado Cash usage. Such behavior is often meant to blend deposits with others.
The deposits occurred over multiple transactions instead of one large transfer. This approach can complicate transaction analysis.
Related Reading: Hacker Who Stole $282 million Last Week, Launders $63M Via Tornado Cash: CertiK
Onchain Tracking and Current Status
Despite the use of Tornado Cash, parts of the transaction trail remain visible. Analysts can still track deposits and timing patterns.
No withdrawal transactions linked to the attacker have been confirmed yet. The funds remain inside Tornado Cash pools.
The activity suggests a careful and delayed strategy. The long dormancy may have been intended to reduce attention.
Security observers continue to monitor related addresses. Any future withdrawals could reveal additional links.
The case adds to recent examples of delayed fund movements. It shows how stolen assets can resurface years later.
As of now, $5.4 million has been deposited. Further movements may follow if the attacker continues the activity.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
U.S. sanctions Cambodian officials’ billion-dollar scam resort! Tether freezes more than $344 million in USDT
The U.S. Treasury Department and the Department of Justice have recently launched a joint law enforcement action targeting “pig butchering” romance scams involving cryptocurrencies that have become increasingly rampant in Southeast Asia. In an official announcement, the government has imposed sanctions on Cambodian Senator Kok An and 28 individuals and entities within his criminal network, accusing them of using political influence and their network of casino compounds to shelter large-scale fraud and human trafficking activities. Estimates indicate that these scam operations have led to losses for U.S. residents of as much as $10 billion in a single year. In conjunction with this crackdown, the stablecoin issuer Rether has also frozen more than $344 million in digital assets involved in the case.
Romance “Pig Butchering” scams: U.S. residents lose over $10 billion in a single year
In recent years, multinational criminal organizations based in Southeast Asia have made extensive use of the scam method known as “Pig Butchering.” Scammers will, through social media or messaging apps, spend months
ChainNewsAbmedia2m ago
U.S. Army Soldier Arrested for Using Classified Intel to Bet on Maduro's Capture on Polymarket
Gate News message, April 24 — The U.S. Department of Justice has arrested active-duty Army soldier Gannon Ken Van Dyke, 38, on charges of using confidential information to place bets on Polymarket, a prediction market, regarding former Venezuelan President Nicolás Maduro's capture. Van Dyke particip
GateNews8m ago
Zondacrypto Exchange Faces Allegations of Misappropriating $350 Million, CEO Publicly Denies
One of Poland’s largest cryptocurrency exchanges, Zondacrypto, announced on April 16 via social media that its CEO, Przemysław Kral, said the exchange could not access a wallet holding 4,503 bitcoins, worth more than $350 million in current value. Kral published the address of the wallet in question to rebut allegations of misappropriation, but this disclosure immediately triggered a large-scale withdrawal.
MarketWhisper2h ago
Bitwarden CLI malicious npm package exposed, encrypted wallets face risk of theft
Misty Fog Chief Information Security Officer 23pds forwards a warning from the Bitwarden security team. The Bitwarden CLI 2026.4.0 version had an npm version that had been tampered with—where a malicious package was distributed through npm—within a 1.5-hour window from 5:57 PM to 7:30 PM Eastern Time on April 22, and that version has been withdrawn. Bitwarden has officially confirmed that password vault data and production systems were not affected.
MarketWhisper2h ago
JPMorgan Chase: KelpDAO bug wipes out $20 billion in DeFi TVL, institutional appeal damaged
A J.P. Morgan research team led by analyst Nikolaos Panigirtzoglou released a report on April 23 stating that persistent security vulnerabilities and stagnant total locked value (TVL) are weakening DeFi’s appeal to institutional investors. The report emphasized that the KelpDAO vulnerability wiped out roughly $20 billion worth of DeFi TVL within days, exposing structural risks.
MarketWhisper2h ago
Slow Mist Alert: North Korean hacker group recruits and tricks Web3 developers, stealing 12 million in 3 months
SlowMist, a security organization, has issued an emergency alert. North Korea’s Lazarus organization’s subsidiary, HexagonalRodent, is launching attacks against Web3 developers, using social engineering tactics such as high-paying remote positions to lure developers into executing skill assessment code that includes malicious software backdoors, ultimately stealing crypto assets. According to an Expel investigation report, in the first three months of 2026, the loss amount reached $12 million.
MarketWhisper2h ago