Crypto mixers, or tumblers, are basically smart contracts used to hide the origin of crypto transactions. Hackers send their cryptocurrency to a mixer’s address. The mixer blends the crypto with coins sent by other users, thereby concealing the identity of each contributor. Subsequently, the mixer redistributes the coins, effectively obscuring their original source.
For example, if 10 users each mix 1 Ether (ETH), they each contribute and receive different ETH. The mixers’ ability to conceal funds has a dual nature: Hackers use them to hide stolen funds, while others enhance financial privacy, protecting against surveillance. Despite their controversial use, mixers remain a tool for those seeking greater crypto anonymity
Hackers frequently combine crypto mixing with other laundering techniques such as decentralized exchange (DEX) trading, peel chains and crypto bridging. DEX trading involves directly exchanging cryptocurrencies between users on a DEX, eliminating the need for a central authority. A peel chain is a type of multi-wallet transfer where the hackers send increasingly smaller amounts across each hop instead of large amounts.
In a brazen display of their sophisticated laundering capabilities, North Korea’s Lazarus Group executed a complex operation involving the theft and subsequent obfuscation of $1.46 billion in cryptocurrency mere days following the high-profile Bybit hack.
Using coin mixers and the decentralized crosschain protocol THORChain, North Korea’s Lazarus Group laundered the stolen funds just days after the hack.
This incident is not an isolated case. In 2024 alone, Pyongyang-based hackers have reportedly stolen $800 million in crypto. The stolen funds were rapidly funneled through crypto mixers, intermediary wallets, DEXs and crosschain bridges using advanced laundering tactics.
North Korean hackers have been responsible for over $5 billion in stolen crypto since 2017, utilizing platforms like Ren Bridge and Avalanche Bridge, often converting funds into Bitcoin (BTC) before employing mixers such as Tornado Cash, Sinbad, YoMix, Wasabi Wallet and CryptoMixer.
Notable crypto hacks by Lazarus Group include WazirX (July 2024), State.com (September 2023), CoinsPaid and Alphapo (July 2023), Harmony Horizon Bridge (June 2022) and Ronin Bridge (March 2022), among others.
Did you know? Fraudulent organizations like the Lazarus Group are suspected of running private mixers. Attributing wallets to these mixers requires careful consideration, as it carries a significant risk of wrongly identifying individuals who use them for legitimate privacy or are otherwise uninvolved.
What are crosschain bridges, and why do hackers use them to launder stolen funds?
Hackers leverage crosschain bridges to facilitate verifiable data transfers across networks, thereby enabling interoperability, often without reliance on a centralized intermediary. Through the lock-mint methodology, these crypto bridges secure the original token in a smart contract and subsequently mint a corresponding wrapped version on the target blockchain.
For instance, when transferring an asset from Ethereum to Solana, the asset is first sent to a bridge contract on Ethereum, where it is “locked.” The bridge then notifies Solana, which creates a “wrapped” version of the asset, allowing it to function on the Solana network as a native coin.
To reverse the process, the wrapped asset is “burned” on Solana. The bridge then notifies the Ethereum blockchain to unlock the original asset, maintaining supply balance across both chains.
Hackers exploit vulnerabilities within these bridge transactions. They identify weaknesses that allow the creation of wrapped assets on the target chain without the corresponding locking of original assets on the source chain.
They can also manipulate the system to unlock original assets without the required burning of wrapped versions. This allows for the theft of funds without a legitimate deposit. Here’s how it works:
Did you know? Often, crypto bridges are susceptible to attacks because of inadequate engineering. In the Harmony Horizon Bridge hack, the ease with which hackers compromised two out of five validator accounts, gaining access to funds, highlights this vulnerability.
Hackers’ playbook: Typical process of laundering stolen funds
Hackers use crypto bridges to hide the origin of funds, thereby increasing anonymity. The hackers use crypto bridges for money laundering in three key stages: placement, layering and integration.
Here is a brief description of how crypto hackers launder stolen funds:
Did you know? The inherent lack of interoperability between blockchains creates fragmented data, making it difficult to monitor crosschain activity. This lack of shared information hinders comprehensive activity tracking.
How did the Lazarus Group launder stolen crypto from Bybit?
Lazarus combined classic money-laundering tricks with modern DeFi and crosschain swaps, making this one of the most complex laundering cases in crypto history. Investigators have managed to freeze over $42 million, but the majority of the funds have already been hidden or converted into fiat via underground channels.
Total amount stolen and asset breakdownBybit’s losses in the hack totaled roughly $1.46 billion. The stolen assets were primarily Ether and Ethereum-based tokens, including:
In total, about 401,000 Ether (ETH) and 90,000 Lido Staked Ether (stETH) (plus smaller ETH-derivative tokens) were taken, which the hackers immediately consolidated and converted. According to Nansen’s analysis, the attackers swapped all non-ETH tokens (stETH, cmETH, mETH) into plain ETH soon after the breach. This gave the hackers full control over ETH, a native asset that cannot be easily frozen by any central issuer. The entire loot was then funneled into the attackers’ wallets for laundering.
Laundering methods usedLazarus Group used a multi-layered strategy to hide and cash out the $1.46 billion stolen from Bybit. Their methods included:
Did you know? Of the stolen crypto, exchanges have frozen $42.8 million worth of funds, but the North Korean threat actor has laundered all of the stolen 499,395 ETH, primarily through THORChain.
How do investigators uncover crosschain crypto fraud?
To address crosschain fraud involving coin mixing, investigators follow a holistic approach and use specialized tools to track illicit transactions. This is different from legacy explorers that only focus on single-chain analytics.
The following example will help you understand how crosschain crypto fraud tools help investigators. Suppose a spyware group extorts funds in Bitcoin and moves them to Ethereum via a crosschain bridge. Instead of cashing out, they swap the funds for a privacy coin using a DEX. Traditional tools require law enforcement to track each step manually, causing delays and errors.
With automated crosschain tracking, investigators can trace transactions in one interface, identify the DEX used, and contact exchanges quickly. This accelerates investigations and improves the chances of recovering stolen assets.
Notable features of such crosschain investigative tools, such as those offered by Elliptic and Chainalysis:
Now, let’s find out how investigators attempt to catch perpetrators using such tools. Several ways they use include:
Here are two real-world examples of crypto laundering. The DMM hack demonstrates the use of crypto mixers for hiding the origin of funds, while the XT.com hack shows how hackers used crypto bridges for laundering funds.
DMM hackThe DMM hack in May 2024 demonstrated how hackers use several obfuscation techniques to disguise their act. In May 2024, Japanese crypto exchange DMM suffered a massive hack, losing 4,502 BTC, worth $305 million at the time. The hackers used sophisticated laundering methods, including peel chains and coin mixers, to hide the transaction trail.
The hackers also manipulated withdrawal timing to further disrupt blockchain analysis. They deliberately delayed withdrawals to add another layer of obfuscation, hindering attempts by investigators to match deposits and withdrawals by their time stamps.
In November 2024, crypto exchange XT.com experienced a security breach resulting in the loss of $1.7 million. Attackers initially targeted assets on the Optimism and Polygon networks, subsequently utilizing crosschain bridges to transfer the stolen funds to Ethereum.
This tactic of moving assets across multiple blockchains exploited the complexities inherent in tracking funds across diverse networks, thereby hindering investigative efforts. Such crosschain maneuvers underscore the challenges faced by security teams in tracking and recovering illicitly obtained digital assets.
Crypto mixers, designed to obscure transaction trails, have increasingly drawn regulatory scrutiny due to their role in laundering illicit funds. The Office of Foreign Assets Control (OFAC) has sanctioned multiple mixers linked to cybercrime and national security threats in the US.
Blender.io became the first-ever sanctioned mixer in 2022 after laundering $20.5 million from the Axie Infinity hack. Despite its shutdown, it resurfaced as Sinbad.io, which was sanctioned within a year for facilitating money laundering in high-profile hacks, including the Atomic Wallet and Horizon Bridge breaches.
Tornado Cash, a non-custodial Ethereum-based mixer launched in 2019 by Alexey Pertsev and Roman Storm, was sanctioned by the US Treasury in 2022. However, a court overturned the sanctions in a January 2022 ruling. Pertsev was sentenced to five years and four months in prison for laundering by Dutch judges.
The Financial Crimes Enforcement Network (FinCEN) classifies mixers as money transmitters, requiring compliance with AML laws. The US Department of Justice has aggressively pursued offenders, notably sanctioning Tornado Cash for laundering over $7 billion. Despite such measures, the evolving nature of crypto mixers continues to challenge regulators and law enforcement agencies worldwide.
The Financial Action Task Force (FATF), an intergovernmental body to deter money laundering activities, has marked mixer usage as a red flag for illicit activities. The European Banking Authority and the Australian Transaction Reports and Analysis Centre have set up rules for reporting requirements. The Joint Money Laundering Steering Group, a private body of financial sector organizations, also issues guidelines for members for the prevention of money laundering.
However, enforcement faces challenges in holding developers accountable. Legal debates persist on whether developers should be liable if they did not directly aid laundering post-sanctioning.
The future of privacy vs. security in crypto
Crypto will need to find a delicate balance between privacy and security. While technologies like zero-knowledge (ZK) proofs will enable users to transact privately without compromising the blockchain’s integrity, they must also align with stricter AML regulations to ensure compliance while maintaining user anonymity.
While privacy advocates champion financial sovereignty and protection from surveillance, security proponents emphasize the need for transparency and regulatory compliance to maintain market integrity.
This tension is likely to be navigated through technological advancements such as ZK-proofs, differential privacy and federated learning, which offer potential solutions for enhancing privacy without compromising security. Simultaneously, governments will continue to develop regulatory frameworks that seek to strike a balance, potentially through tiered approaches that offer varying levels of privacy.
Ultimately, the path forward requires collaboration between developers, regulators and users to create a sustainable ecosystem that safeguards individual privacy while preventing illicit activities and fostering trust.
All Rights Reserved. Copyright , Central Coast Communications, Inc.