In order to achieve any of these goals, the person responsible must sever the connection between the funds and the hacked wallet before converting it into cash. This is a difficult task, as it seems. Normally, services such as Samourai Wallet or Tornado Cash, where the exploit originated, would have offered a convenient way to conceal the origin of the funds. Unfortunately for criminals, these services are no longer a feasible choice due to increased scrutiny from US regulators.
Finance Hacker Transfers Stolen Funds After One Year of Inactivity
Related Posts
Add A Comment