Threat actor returns $19.3m to U.S. government wallets

Crypto hackers who exploited US government wallets returned most of the stolen funds within 24 hours of the initial attack.

Are you afraid of Uncle Sam or the good intentions of bad actors?

In a strange turn of events, attackers who stole nearly $20 million from US government addresses returned approximately 88% of the assets to authorities.

As crypto.news reported, hackers breached US government wallets on October 24, illegally moving digital assets such as Ethereum (ETH) seized from crypto crimes such as the $8 billion Bitfinex hack. Within 24 hours, hackers reversed the heist and returned $19.3 million, according to an Oct. 25 post from blockchain sleuths Arkham and ZachXBT.

On-chain data showed that exploiters mostly returned Aave (USDC) worth $13.19 million. The rest is spread across standard USDC tokens and ETH.

π—¨π—£π——π—”π—§π—˜: $πŸ­πŸ΅π—  𝗨𝗦 π—šπ—Όπ˜ƒπ—²π—Ώπ—»π—Ίπ—²π—»π˜ π—³π˜‚π—»π—±π˜€ π˜‚π—Ώπ—» 𝗲𝗱

$19.3 million was returned to the US Government address following yesterday’s reported attack, less than 24 hours after the initial address breach.

88% of the seized USD value is now… https://t.co/F8q6iikBrT pic.twitter.com/Vo7I7ZH9K1

β€” Arkham (@ArkhamIntel) October 25, 2024

This situation stunned many community members. Initially, users questioned why anyone would target the US government’s wallets, and the decision to return the funds only led to more speculation. Details on how the hack was carried out are still scant, and the identity of the hacker or possible suspects was unknown at the time of publication.

Some expect the US government to pursue those responsible, as authorities have recently intensified their crackdown on crypto financial crimes.

Federal prosecutors have already filed indictments and charges against Bitfinex hackers, and FBI agents arrested an Alabama man linked to the Securities and Exchange Commission’s fake spot Bitcoin (BTC) ETF announcement.

Leave a Reply

Your email address will not be published. Required fields are marked *