BanklessTimes
Home Articles Hacker Steals $27.3M Using Multi-Signature Wallet

Hacker Steals $27.3M Using Multi-Signature Wallet

Simon Simba
Simon Simba
Simon is a writer with five years experience in crypto and iGaming. He currently works as a freelance writer at BanklessTimes where he focuses on simplifying daily crypto developments for readers. He discovered crypto in 2022 while writing news about NFTs for a news website in the US, and has since written for two other international NFT projects, and a Web3 gaming agency.
Updated: January 6th, 2026
Editor:
Joseph Alalade
Joseph Alalade
Editor:
Joseph Alalade
News Lead and Editor
Joseph is a content writer and editor who has actively participated in crypto for over 6 years. He enjoys educating others about Web3 and covering its updates, regulatory developments, and exciting stories.

A hacker has stolen about $27.3 million in digital assets by exploiting a multi-signature wallet setup intended to add extra protection for extensive on-chain holdings.

According to PeckShieldAlert, the attacker initially unwound a leveraged position on Aave, releasing 1,000 ether placed as collateral, per on-chain data. The withdrawal signaled a change from aggressively cycling cash into more difficult-to-track channels to using decentralized finance infrastructure as a parking space.

Soon after the withdrawal, the hacker started dividing the 1,000 ether into smaller transactions sent to Tornado Cash. The platform pools deposits before transferring them to different addresses. This pattern is similar to strategies used in earlier attacks, where mixers play a crucial role in isolating stolen items from their original source.

How Mixers Like Tornado Cash Obscure Fund Flows

Attackers commonly deposit stolen cash on Aave to generate income or manage exposure while investigations are ongoing.

Aave enables users to borrow and lend cryptocurrency assets by providing collateral. The hacker indicated that they were prepared to switch from passive holding to active laundering by closing the position.

Tornado Cash has long been a preferred tool for obfuscation because it breaks the direct transaction link between sender and recipient, despite public visibility on Ethereum.

Authorities in several jurisdictions have sanctioned the protocol’s use in certain contexts, citing its role in laundering proceeds from major hacks.

Obstacles Facing Investigators and Compliance Teams

The hacker’s shift to Tornado Cash complicates recovery efforts, since individual withdrawals are sent to new addresses that lack an obvious connection to the compromised wallet. Investigators must now rely more heavily on pattern analysis, timing correlations, and potential slipups when the attacker interacts with centralized venues.

Exchanges and compliance teams are likely stepping up monitoring of deposits that mimic the volume and timing of Tornado Cash withdrawals associated with the 1,000 ether batch. Any effort by the hacker to use regulated platforms to transfer significant amounts into fiat or stablecoins may still result in freezes or referrals to criminal authorities.

READ MORE: SEI Price Tests Key Resistance as Volume Jumps

Follow Bankless Times on Google News

We`ve got crypto covered – every trend, every insight, every move that matters. Add us to your feed and stay ahead of the market.

Contributors

Simon Simba
Simon is a writer with five years experience in crypto and iGaming. He currently works as a freelance writer at BanklessTimes where he focuses on simplifying daily crypto developments for readers. He discovered crypto in 2022 while writing news about NFTs for a news website in the US, and has since written for two other international NFT projects, and a Web3 gaming agency.