Kyrgyzstan-based CEX Halts Trading After $15M USDT Cyberattack and Wallet Breach

TRX-0,19%
ETH3,27%

Gate News message, April 17 — A Kyrgyzstan-based cryptocurrency exchange halted all trading activity after hackers stole more than $15 million USDT from its wallets. The exchange confirmed the attack publicly, and British blockchain analytics firm Elliptic tracked the stolen funds, identifying how attackers moved them across multiple addresses to evade detection.

According to Elliptic, the attackers rapidly transferred the stolen USDT across Tron and Ethereum blockchains, then converted the funds into TRX and ETH to avoid Tether’s ability to freeze USDT-linked addresses. The hackers ultimately consolidated approximately 45.9 million TRX (valued at roughly $15 million) into a single wallet. The exchange froze all platform activity, including withdrawals, preventing users from accessing their funds. The incident reflects broader vulnerabilities in centralized exchanges, particularly those operating in jurisdictions with limited regulatory oversight, where hot-wallet compromises and signing-flow weaknesses remain common attack vectors.

The exchange is viewed as a successor to a major CEX that shut down in 2025 following sanctions from the United States, European Union, and United Kingdom over money-laundering allegations. The migration of users and liquidity to this platform made it a key trading hub for ruble-to-crypto transactions and a center for stablecoin activity, including ruble-backed stablecoins. This concentration of activity and exposure to sanctioned jurisdictions has increased the platform’s risk profile, making it an attractive target for sophisticated attackers.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Scallop’s abandoned V2 contract was exploited; after 150k SUI were stolen, it announced full reimbursement

Sui Network decentralized lending protocol Scallop posted an official announcement on the X platform on April 26 (Sunday), confirming that it was hit by a vulnerability attack. The attacker extracted approximately 150,000 SUI from an abandoned rewards contract associated with sSUI spool. According to the official statement, the core liquidity pool and users’ deposits were not affected. The protocol has restored deposits and withdrawals, confirming that the company will fully reimburse all losses with company funds.

MarketWhisper59m ago

Scallop Protocol on Sui Hit by Flash Loan Attack, $142K Drained via Oracle Manipulation

Gate News message, April 26 — Scallop Protocol, a lending platform on the Sui blockchain, suffered a flash loan exploit targeting a deprecated side contract linked to its sSUI rewards pool, resulting in a loss of approximately $142,000 (150,000 SUI). The attack exploited oracle price feed

GateNews4h ago

22-Year-Old Sentenced to 70 Months for $263M Crypto Theft Laundering

## Sentencing and Charges California resident Evan Tangeman, 22, was sentenced on Friday to 70 months in federal prison for his role laundering proceeds from a multi-state cryptocurrency theft ring that stole around $263 million in digital assets from victims, according to the U.S. Department of Ju

CryptoFrontier5h ago

Litecoin Suffers Deep Chain Reorganization After MWEB Privacy Layer Zero-Day Exploit

Gate News message, April 26 — Litecoin underwent a deep chain reorganization on Saturday afternoon after attackers exploited a zero-day vulnerability in its MimbleWimble Extension Block (MWEB) privacy layer, according

GateNews6h ago

Address Linked to Avi Eisenberg Shows New On-Chain Activity, Raising Security Concerns

Gate News message, April 26 — Blockchain analytics platform Arkham has identified renewed on-chain activity from an address believed to be connected to Avi Eisenberg, the attacker who profited approximately $110 million from the 2022 Mango Markets exploit. Eisenberg was previously sentenced to

GateNews8h ago

Sui DeFi lending protocol Scallop is hacked, with a vulnerability in the old contract leading to 150k SUI stolen

Scallop was attacked on the Sui chain, and the side contract involved led to the sSUI rewards pool being exploited. Approximately 150k SUI were stolen. The core contract is secure, and deposits and withdrawals have been restored. The official statement applies only to the deprecated rewards contract; users’ funds were not affected. Former NEAR developer Vadim said the vulnerability originated from an outdated V2 package from 17 months ago, where not initializing last_index caused rewards to accumulate starting in 2023. The fix requires adding a version field to the shared object and strengthening version checks to prevent risks caused by outdated packages.

ChainNewsAbmedia8h ago
Comment
0/400
No comments