The hacker responsible for the $235 million crypto heist of WazirX allegedly converted approximately $150 million worth of the stolen altcoins into Ethereum (ETH). Analysts say this move was likely to prevent the funds from being frozen or blacklisted by authorities or token issuers.
Altcoins Converted to Ethereum
According to blockchain analysis firm Spot On Chain, the hacker converted $90.2 million worth of Shiba Inu (SHIB), $10.2 million worth of Polygon (MATIC), and approximately $7.5 million worth of Pepe (PEPE) into Ethereum between July 18-19. The hacker’s actions increased the total amount of stolen funds held in ETH from the initial $52 million to $201 million. Blockchain security experts noted that this conversion to ETH serves multiple purposes. Spot On Chain explained that while some ERC-20 tokens have contract functions allowing addresses to be blacklisted, Ethereum does not. This step means that once converted to ETH, the funds cannot be easily frozen.
Additionally, the transition to ETH could help the hacker secure the funds quickly before authorities take any preventive measures. Another blockchain security firm, PeckShield, emphasized that converting to Ethereum facilitates laundering through various cryptocurrency exchanges and mixer protocols due to its stability and liquidity.
The crypto heist had a noticeable impact on the market, particularly on the prices of the affected altcoins. For instance, the price of Shiba Inu (SHIB) reportedly dropped by approximately 7% following the incident, while the price of ETH remained relatively stable, experiencing only a 0.1% decrease.
Hacker’s Remaining Holdings
WazirX’s Response to the Crypto Heist
In response to the crypto heist, news sources report that WazirX halted all withdrawals on July 18, citing a force majeure event that compromised nearly half of its reserves. The exchange stated that it is doing everything possible to recover the stolen funds, including blocking deposits and contacting the relevant wallets. Additionally, WazirX is allegedly collaborating with international law enforcement agencies and cybersecurity firms to trace the stolen assets and apprehend the perpetrators.
Final Thoughts