<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>stolen funds Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/stolen-funds/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/stolen-funds/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Tue, 04 Nov 2025 07:26:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>stolen funds Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/stolen-funds/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Balancer Hack: Stolen Millions Moved Into This Coin!</title>
		<link>https://coinengineer.net/blog/balancer-hack-stolen-funds-moved-to-unknown-asset/</link>
					<comments>https://coinengineer.net/blog/balancer-hack-stolen-funds-moved-to-unknown-asset/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Tue, 04 Nov 2025 07:26:24 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Balancer hack]]></category>
		<category><![CDATA[crypto security breach]]></category>
		<category><![CDATA[DeFi exploit]]></category>
		<category><![CDATA[hacked liquidity pools]]></category>
		<category><![CDATA[On-Chain Analysis]]></category>
		<category><![CDATA[stolen funds]]></category>
		<category><![CDATA[V2 Balancer attack]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=55912</guid>

					<description><![CDATA[<p>Balancer, one of the leading protocols in the DeFi ecosystem, has faced one of the largest attacks in recent years. In the exploit targeting Balancer’s V2 pools, the total amount drained from the platform exceeded $116.6 million. Some analyses even estimate the losses to be as high as $128 million. This incident has sparked widespread</p>
<p>The post <a href="https://coinengineer.net/blog/balancer-hack-stolen-funds-moved-to-unknown-asset/">Balancer Hack: Stolen Millions Moved Into This Coin!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="177" data-end="587"><strong>Balancer</strong>, one of the leading protocols in the DeFi ecosystem, has faced one of the largest attacks in recent years. In the exploit targeting Balancer’s V2 pools, the total amount drained from the platform exceeded $116.6 million. Some analyses even estimate the losses to be as high as $128 million. This incident has sparked widespread discussions around the question: “What is the Balancer <a href="https://coinengineer.net/blog/defi-protocol-balancer-has-been-hacked/">hack</a>?”</p>
<h3 data-start="594" data-end="631">Main Components of the Attack</h3>
<p data-start="633" data-end="738">According to Arkham and other on-chain analysts, the stolen assets primarily consisted of two categories:</p>
<ul data-start="740" data-end="858">
<li data-start="740" data-end="830">
<p data-start="742" data-end="830">Liquid Staked Ethereum (LSETH) derivatives, particularly wstETH and osETH,</p>
</li>
<li data-start="831" data-end="858">
<p data-start="833" data-end="858">WETH (Wrapped Ether).</p>
</li>
</ul>
<p data-start="860" data-end="996">The high liquidity of these assets enabled the attacker to quickly convert them into other forms without attracting immediate attention.</p>
<h3 data-start="1003" data-end="1055">How the Hacker Moved and Laundered the Funds</h3>
<p data-start="1057" data-end="1107">On-chain tracking revealed a three-stage strategy:</p>
<ol data-start="1109" data-end="1772">
<li data-start="1109" data-end="1261">
<p data-start="1112" data-end="1261">Consolidation of Funds<br data-start="1138" data-end="1141" />The stolen wstETH, osETH and WETH were first gathered into several primary collection wallets linked to the attacker.</p>
</li>
<li data-start="1263" data-end="1503">
<p data-start="1266" data-end="1503">Asset Swaps via DEXs<br data-start="1290" data-end="1293" />The attacker then swapped these LSETH derivatives and WETH into ETH using decentralized exchanges. This move helped consolidate value into a single asset type, making it easier to manage and harder to trace.</p>
</li>
<li data-start="1505" data-end="1772">
<p data-start="1508" data-end="1772">Distribution Across New Wallets<br data-start="1543" data-end="1546" />The converted ETH was transferred into a large number of newly created wallets. This “distribution network” is a common laundering technique designed to make tracking harder for investigators and blockchain analytics firms.</p>
</li>
</ol>
<h3 data-start="1779" data-end="1816">A Multi-Chain Security Breach</h3>
<p data-start="1818" data-end="2087">The attack was not limited to the Ethereum network. Balancer pools across Arbitrum, Base, Optimism, and Polygon were also affected. Liquidity providers saw sudden drops in pool balances, and many users rushed to revoke token approvals from Balancer smart contracts.</p>
<h3 data-start="2094" data-end="2121">Balancer’s Response</h3>
<p data-start="2123" data-end="2196">In response to the exploit, the Balancer team took the following actions:</p>
<ul data-start="2198" data-end="2573">
<li data-start="2198" data-end="2280">
<p data-start="2200" data-end="2280">Paused all affected V2 pools that could be secured via emergency controls,</p>
</li>
<li data-start="2281" data-end="2362">
<p data-start="2283" data-end="2362">Advised liquidity providers to revoke token approvals and withdraw funds,</p>
</li>
<li data-start="2363" data-end="2439">
<p data-start="2365" data-end="2439">Offered up to 20% white-hat bounty if the stolen funds are returned,</p>
</li>
<li data-start="2440" data-end="2573">
<p data-start="2442" data-end="2573">Initiated a comprehensive post-mortem investigation and legal action alongside blockchain forensic experts and law enforcement.</p>
</li>
</ul>
<p><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</a> channels for the latest <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/balancer-hack-stolen-funds-moved-to-unknown-asset/">Balancer Hack: Stolen Millions Moved Into This Coin!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/balancer-hack-stolen-funds-moved-to-unknown-asset/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/Coinmukendisi-14.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/Coinmukendisi-14.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Big Bet from ZachXBT on Whale in Hyperliquid!</title>
		<link>https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/</link>
					<comments>https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Tue, 18 Mar 2025 14:00:07 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin short]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[Chainlink short]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[Crypto Investigation]]></category>
		<category><![CDATA[crypto market]]></category>
		<category><![CDATA[crypto whale]]></category>
		<category><![CDATA[cybercriminal]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[decentralized finance]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[Ethereum short]]></category>
		<category><![CDATA[GMX]]></category>
		<category><![CDATA[Hyperliquid]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[leverage trading]]></category>
		<category><![CDATA[Leveraged Trading]]></category>
		<category><![CDATA[Lookonchain]]></category>
		<category><![CDATA[stolen funds]]></category>
		<category><![CDATA[ZachXBT]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=38634</guid>

					<description><![CDATA[<p>The famous on-chain investigator has exposed the much-discussed Hyperliquid whale. Allegedly, the whale has made $9 million in profits using stolen funds. A major development has shaken the crypto investment world. Well-known on-chain investigator ZachXBT has claimed that the so-called &#8220;Hyperliquid whale,&#8221; who trades with 50x leverage on the Hyperliquid exchange, is in fact a</p>
<p>The post <a href="https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/">Big Bet from ZachXBT on Whale in Hyperliquid!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="203" data-end="365">The famous on-chain investigator has exposed the much-discussed Hyperliquid whale. Allegedly, the whale has made $9 million in profits using stolen funds.</p>
<p data-start="367" data-end="640">A major development has shaken the crypto investment world. Well-known on-chain investigator <strong data-start="460" data-end="471">ZachXBT</strong> has claimed that the so-called &#8220;Hyperliquid whale,&#8221; who trades with 50x leverage on the Hyperliquid exchange, is in fact <strong data-start="593" data-end="639">a cybercriminal gambling with stolen funds</strong>.</p>
<p data-start="642" data-end="1043">This whale managed to survive liquidation attempts by crypto investors and secured an impressive <strong data-start="739" data-end="753">$9 million</strong> in net profit. <strong data-start="769" data-end="780">ZachXBT</strong> emphasized that this whale <strong data-start="808" data-end="869">has no connection to the North Korea-backed Lazarus Group</strong>. Earlier this year, in February 2025, ZachXBT had linked the <strong data-start="931" data-end="958">$1.5 billion Bybit hack</strong> to that hacker collective. Now, he has followed the trail to this Hyperliquid whale.</p>
<h2 data-start="1050" data-end="1121">&#8220;Crypto Twitter Is Speculating, But the Truth Is More Sinister&#8221;</h2>
<p data-start="1123" data-end="1309">ZachXBT made the following statement on X (Twitter):</p>
<p data-start="1123" data-end="1309"><em>“It’s funny watching CT speculate on the ‘Hyperliquid whale’ when in reality it’s just a cybercriminal gambling with stolen funds.”</em></p>
<p data-start="1311" data-end="1452">Responding to a follower&#8217;s question regarding potential ties to the Lazarus Group, ZachXBT replied:</p>
<p data-start="1311" data-end="1452"><em>“No, there’s no connection to Lazarus.”</em></p>
<p data-start="1454" data-end="1627">Some users asked ZachXBT to reveal the whale’s identity. However, he responded by saying:</p>
<p data-start="1454" data-end="1627"><em>“We’ll see, it’s just not enjoyable posting investigations on X/Twitter anymore.”</em></p>
<p data-start="1454" data-end="1627"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-151335 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/zachxbt.png" alt="zachxbt" width="882" height="822" /></p>
<h2 data-start="1634" data-end="1680">Failed Attempts to Liquidate the Whale</h2>
<p data-start="1682" data-end="1912">For weeks, the crypto market has speculated about <strong data-start="1732" data-end="1794">who the Hyperliquid whale is and how they could be stopped</strong>. The whale had opened <strong data-start="1817" data-end="1884">40x and 50x short positions on Bitcoin (BTC) and Ethereum (ETH)</strong>, drawing massive attention.</p>
<hr />
<p data-start="1914" data-end="2287"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="1914" data-end="2287">The whale notably opened a <strong data-start="1941" data-end="1979">$450 million short position on BTC</strong>, which triggered a major reaction across the market. Traders attempted to counter this by aggressively buying up BTC, trying to force a liquidation. However, they ultimately failed. According to <strong data-start="2175" data-end="2190">Lookonchain</strong>, the whale deposited an additional <strong data-start="2226" data-end="2245">$5 million USDC</strong> to increase margin and avoid liquidation.</p>
<p data-start="2289" data-end="2441">Aside from BTC and ETH, the whale also opened a <strong data-start="2337" data-end="2387">$31 million short position on Chainlink (LINK)</strong> with 10x leverage and placed short orders on <strong data-start="2433" data-end="2440">GMX</strong>.</p>
<h2 data-start="2448" data-end="2530">A Major Threat in the Crypto Market: Stolen Funds and High-Leverage Trades</h2>
<p data-start="2532" data-end="2831">ZachXBT’s comments have reignited concerns about <strong data-start="2581" data-end="2668">stolen funds re-entering circulation through decentralized finance (DeFi) protocols</strong>. The situation also highlights how <strong data-start="2704" data-end="2781">cybercriminals exploit high-leverage trading to gamble with illicit funds</strong>, posing a significant risk to the overall market.</p>
<p data-start="2833" data-end="3040">While the true identity of this whale remains undisclosed, the broader question for the crypto ecosystem is how to address these <strong data-start="2962" data-end="3039">high-risk scenarios and prevent bad actors from destabilizing the markets</strong>.</p>
<hr />
<p data-start="2833" data-end="3040"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/">Big Bet from ZachXBT on Whale in Hyperliquid!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/11/ZachXBT.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/11/ZachXBT.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Monero (XMR) Community Funding Wallet Stolen!</title>
		<link>https://coinengineer.net/blog/monero-xmr-community-funding-wallet-stolen/</link>
					<comments>https://coinengineer.net/blog/monero-xmr-community-funding-wallet-stolen/#respond</comments>
		
		<dc:creator><![CDATA[Yunus Taşlı]]></dc:creator>
		<pubDate>Mon, 06 Nov 2023 21:03:40 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[monero]]></category>
		<category><![CDATA[Moonstone Research]]></category>
		<category><![CDATA[stolen funds]]></category>
		<category><![CDATA[wallet]]></category>
		<category><![CDATA[XMR]]></category>
		<guid isPermaLink="false">https://coinengineer.io/blog/?p=6614</guid>

					<description><![CDATA[<p>Monero (XMR) team announced that the Community Crowdfunding System (CCS) Wallet was attacked on September 1, 2023. The attacker managed to steal the entire balance of 2,675.73 XMR, which is approximately $384,000. The source of the security vulnerability has still not been identified, and cybersecurity firm SlowMist stated that this vulnerability did not originate from</p>
<p>The post <a href="https://coinengineer.net/blog/monero-xmr-community-funding-wallet-stolen/">Monero (XMR) Community Funding Wallet Stolen!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Monero</strong> (XMR) team announced that the Community Crowdfunding System (CCS) Wallet was attacked on September 1, 2023. The attacker managed to steal the entire balance of <strong>2,675.73 XMR</strong>, which is approximately $384,000. The source of the security vulnerability has still not been identified, and cybersecurity firm <strong>SlowMist</strong> stated that this vulnerability did not originate from <strong>Monero’s</strong> privacy model. The attack was announced only recently even though it took place at that time.</p>
<p>The attacker executed nine different transactions successful in zeroing the balance of the <strong>Monero CCS Wallet</strong>.</p>
<hr />
<blockquote><p>You might like: <a href="https://coinengineer.net/blog/charlie-munger-bitcoin-disrupts-financial-system/"><em><strong>Charlie Munger: Bitcoin Disrupts the Financial System!</strong></em></a></p></blockquote>
<hr />
<p><strong>Moonstone Research</strong> undertook the task of exploring how the attacker moved these funds. The security company&#8217;s analysis revealed some interesting results. Additionally they were able to track three of the attacker&#8217;s transfers with certainty. Also 2 months after the attack, <strong>XMR</strong> developer <strong>Luigi</strong>, one of the two people who had access to the wallet seed phrase, declared on <strong>GitHub</strong> that the wallet had been completely emptied. According to <strong>Luigi</strong>, he noticed this situation a month after the theft.</p>
<p>The other person with access was former Monero (XMR) developer, known as &#8220;fluffypony&#8221;, <strong>Ricardo Spagni</strong>. He surrendered to US authorities for extradition to South Africa in July 2023 and was accused here of invoice fraud against a biscuit company.</p>
<hr />
<p><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram</strong>,</a> <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</strong></a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</strong></a> channels for the latest news and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/monero-xmr-community-funding-wallet-stolen/">Monero (XMR) Community Funding Wallet Stolen!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/monero-xmr-community-funding-wallet-stolen/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2023/11/tempory-9.webp' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2023/11/tempory-9.webp' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
