Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

Transit attack funds flow into Tornado: Can they still be traced?

CN
链上雷达
Follow
1 hour ago
AI summarizes in 5 seconds.

The cross-chain aggregation protocol Transit Finance was previously attacked due to security issues with its smart contracts, with some stolen assets transferred to multiple addresses controlled by the attacker. One key location is the Ethereum address 0x9db82d911328196d50C36450B1Ef5985DF15732B. On May 21, 2026, this address suddenly took action: it deposited a total of 832.9 ETH (approximately 1.8 million dollars at the time) in one lump sum into the Tornado Cash contract. Multiple security agencies and media outlets cited monitoring data from CertiK, linking this large deposit transaction back to the Transit Finance attack incident, bringing the previously calm attack case back into the spotlight. Tornado Cash, as a decentralized mixing protocol deployed on Ethereum, obscures the source of funds by mixing deposits and withdrawals from different users. This step signifies that the attacker has entered a new phase of "laundering stolen funds," and the difficulty of subsequent tracking is sure to increase. However, mixing does not equate to "disappearing" from the chain: interactions between the attacker's address and Tornado Cash are fully recorded in the public ledger, allowing security teams to conduct long-term modeling and attribution analysis around the inflow time of this 832.9 ETH, the interacting parties, and subsequent fund exits. The attempts made by the attacker to erase traces at this moment leave new clues on the blockchain.

832.9 ETH Removed: The Start of the Stolen Funds' On-Chain Escape

In the brief calm following the attack, the Ethereum address controlled by the attacker, 0x9db82d911328196d50C36450B1Ef5985DF15732B, remained like a stone yet to be turned over. Until May 21, 2026, when this stone was turned: the address began frequent interactions with the Tornado Cash contract, accumulating a total deposit of 832.9 ETH that day, worth about 1.8 million dollars at the time. This was not a scattered test but a clearly intended large transfer—multiple security institutions and media outlets, citing CertiK's monitoring, provided nearly the same indication at the same time: the stolen funds related to the Transit Finance attack were being pushed into a deeper mixing black box from an obvious address.

Among the funds that can currently be directly linked to this attack on the blockchain, the 832.9 ETH is clearly not insignificant scrap but a key "escape" during the money laundering phase following the attack. Previously, the stolen funds had concentrated on only a few addresses, allowing security teams to sort through them based on clear coordinates; as this fund was injected into Tornado Cash, these previously concentrated and visible chips began to be scattered and mixed with countless legitimate and unknown sources of deposits and withdrawals, deliberately weakening the intuitive correspondence between a single address and specific stolen funds. For the attacker, this is a step towards concealment; for tracers, it means that subsequent analysis must shift from "keeping an eye on a few addresses" to modeling around this mixing entrance and fund exit in order to redraw the true direction of the funds.

Sanctioned Tornado Cash Becomes a Money Laundering Hub Again

Tornado Cash is essentially a decentralized mixing protocol deployed on Ethereum: users deposit ETH into the same contract pool, and after waiting for a period, withdraw collateral from a new address. Due to the presence of numerous deposits and withdrawals from various origins in the same pool, there is no longer a clear one-to-one correspondence between a single deposit and a single withdrawal, and the originally clear funding path is dispersed into an unrecognizable "noise." It is precisely because of this mechanism that Tornado Cash was sanctioned by relevant regulatory bodies for being used in money laundering, but it continues to frequently appear in paths of stolen fund transfers during multiple on-chain attacks and hacker incidents, becoming a customary tool for risk capital to maneuver around public scrutiny.

This time, the path also points to Tornado. On May 21, 2026, the Ethereum address controlled by the attacker, 0x9db82d911328196d50C36450B1Ef5985DF15732B, directly deposited 832.9 ETH (approximately 1.8 million dollars) into the Tornado Cash contract address. Transit Finance, as a cross-chain aggregation protocol, enables the stolen assets previously taken to move back and forth across multiple chains, ultimately flowing back into Ethereum at this mixing entry point for "convergence." For the attacker, on a public chain where all transfers will be permanently recorded, Tornado provides relatively higher anonymity and a space for attempting to disengage; for the trackers, even if the funds are mixed into a large pool, the action of this 832.9 ETH entering the pool itself remains an identifiable on-chain anchor point and a critical starting point that cannot be overlooked when trying to reconstruct the direction of stolen funds and assess the attacker’s next intentions.

Security Firms Watching: Mixing Can't Completely Erase Footprints

Grabbing onto this "entry into the pool" action, security firms quickly identified the attacker’s new move. On May 21, 2026, according to AiCoin data, the address 0x9db82d911328196d50C36450B1Ef5985DF15732B deposited 832.9 ETH into the Tornado Cash contract in one transaction, about 1.8 million dollars. CertiK immediately marked this transaction as a suspicious transfer related to the Transit Finance attack, disclosing details such as the address and transaction hash; subsequently, various media outlets including Rhythm, Planet Daily, TechFlow, and Golden Finance reported based on the same monitoring source, bringing this transaction, which was originally just one among many on-chain, into the spotlight for repeated examination.

From a technical standpoint, Ethereum itself is a "never-forgetting" ledger, with every transaction from when the attack occurred until the Tornado deposit fully recorded on-chain, retrievable for a long time through block explorers and various on-chain analysis tools. The mixing mechanism of Tornado Cash does weaken the direct correspondence between a single fund and the original address, but the fact that the attacker interacts directly with the Tornado contract from a known attack-related address leaves a critical anchor point for subsequent analysis. Security teams can model around the time of this 832.9 ETH deposit, combining the rhythm of deposits and withdrawals in the Tornado pool during similar time periods, and attempt to narrow down the suspicious withdrawal address range probabilistically. Data platforms like AiCoin can continue to tag these addresses with risk labels based on public chain data, observing their new relations with other protocols and addresses over a longer time frame, making it difficult for attackers to truly vanish without a trace on this public ledger.

What an Attack on a Cross-Chain Aggregation Protocol Means for Ordinary Users

Structurally, protocols like Transit Finance that aggregate cross-chain assets gather users' assets from different chains into a few smart contracts for unified management, routing, and exchange. For individual users, they typically only see a simple authorization or a one-click cross-chain operation, but on the contract level, it often involves multiple chains, multiple assets, and complex routing layered atop the same fund pool. Once this contract is breached, the risk is not isolated to a single chain or pool, but rather concentrated exposure to the same attack surface, as an individual's small amount of money could also be caught up in the whole incident.

The Ethereum address that was highlighted in this instance, 0x9db8…732B, is not a normal user behavior pattern but rather a follow-up processing address controlled by the attacker. On May 21, 2026, this address deposited a total of 832.9 ETH into Tornado Cash, amounting to approximately 1.8 million dollars at that time according to AiCoin data. For users already caught up in the incident, the significance of this step is: funds are further split, scattered, and mixed into a larger anonymous pool from the original attack path, making the traditional notion of "project teams rolling back funds to pre-attack" or "concentrated recovery and proportional refunds" exceedingly difficult. Historical DeFi attacks have shown similar patterns of "rapid dispersal and transfer in the short term," and now that it is layered with a mixing protocol, even though public chain records are traceable in the long term, the difficulty of actually recovering the money has increased. From the perspective of the average user, the only thing they can do is selective screening beforehand: assess whether such cross-chain aggregation protocols have had security incidents, whether audits are continuously updated, and weigh whether they are willing to bear the risk of losses that may be difficult to recover if issues arise for that little convenience and yield.

The Tug of War Between Mixing and Tracking Is Far From Over

Returning to the on-chain reality of this Transit Finance attack: the address 0x9db82d911328196d50C36450B1Ef5985DF15732B deposited 832.9 ETH into the still sanctioned Tornado Cash on May 21, 2026, essentially representing a new "firefight" between hackers and risk control systems. For the attacker, it is a routine action to sever funding paths and erase traces through a mixing protocol; for security agencies, this interaction with Tornado will be permanently documented on the public chain, with CertiK having disclosed the relevant address and transaction to the public. Any new actions based on these funds will be continuously compared and analyzed against this anchor point. The real void lies in that we currently cannot determine from publicly available materials the exact scale of the losses from the Transit Finance attack, nor do we know how much of the stolen assets have been recovered or whether the project team has a clear refund or compensation plan, leaving the outcome of the incident filled with uncertainty. The following clues need to be closely monitored: whether more related addresses will initiate similar mixing or continue to transfer remaining assets through other protocols; whether security agencies can piece together a more complete funding puzzle from subsequent on-chain behaviors; and whether regulatory bodies will strengthen interventions due to the movement of this 832.9 ETH. The direction of these clues will directly determine whether this tug of war between mixing and tracking will eventually lead to recovering losses or sinking completely.

Join our community to discuss and become stronger together!
Official Telegram community: https://t.me/aicoincn
AiCoin Chinese Twitter: https://x.com/AiCoinzh
AiCoin on-chain: https://aicoin.com/hyperliquid
Exclusive Hyperliquid benefits for AiCoin: https://app.hyperliquid.xyz/join/AICOIN88
Exclusive Aster benefits for AiCoin: https://www.asterdex.com/zh-CN/referral/9C50e2

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by 链上雷达

3 hours ago
Galaxy wallet is crazily buying HYPE, is the bullish signal reliable?
5 hours ago
Hyperliquid asset direct connection launched, DeFi landscape rearranged?
5 hours ago
Triple negative factors occurred on the same day: Erosion of faith and a security black hole?
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatarAiCoin运营
6 minutes ago
How to use the OKX Web3 wallet?
avatar
avatarAiCoin运营
46 minutes ago
Don't believe that the US stock market equals betraying the future of technology? Aster launches 5 major RWA giants perpetually, with a 0.9bp fee rate undercutting traditional brokers!
avatar
avatarAiCoin运营
46 minutes ago
Airdrop Radar: XO Market public test mission begins, no cost.
avatar
avatar蚂蚁AT俱乐部
1 hour ago
The CLARITY Act faces a life-and-death vote, with ETF outflows under pressure. MicroStrategy provides support as bulls and bears patiently await regulatory developments. A comprehensive strategy for Bitcoin’s $78,000 volatility!
avatar
avatarAiCoin
1 hour ago
4 PM, Indicator Beginner Village Live: Start from zero to write your first indicator (membership giveaway)
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink