Fed Recovers $30 million in Stolen Crypto Thanks to Chain Analysis

A joint effort by the US government and blockchain firm Chainalysis has resulted in the recovery of around $30 million in stolen cryptocurrencies. The effort showcases that crypto can and will be subject to greater scrutiny and concerted investigative efforts between the government and private institutions. Advancements in blockchain analysis are key to increasing security in a field that has already seen $1.3 billion hacked away by bad actors in 2022 alone.

According to Chainalysis, 30$ million was recovered from the prominent hacking squad Lazarus, which is thought to operate with the North Korean government's blessing (the US specifically says the group acts under North Korea's Reconnaissance General Bureau). The recovered funds were part of the $625 million siphoned from popular NFT game Axie Infinity, whose Ronin sidechain was hacked earlier this year. Adjusting for the cryptocurrency price downtrend since the hack, the recovered $30 million only amounts to 12% of the stolen crypto assets. 

Chainalysis infographic on crypto laundering

Chainalysis-provided infographic on the cryptocurrency laundering scheme used by Lazarus. (Image credit: Chainalysis)

The partial recovery is, of course, less than ideal. But even so, the increasing numbers of government and law enforcement cryptocurrency and NFT seizures show that even decentralized technologies are subject to centralized choke points. This is where checks and balances can be put into effect.

Sky Mavis, developers of Axis Infinity and the Ronin sidechain, took to Twitter to announce the seizure, expecting the stolen funds to be returned to the treasury "after some time." The company recently partnered with Google Cloud as a validator node for its Ronin sidechain, with Google becoming an independent enterprise validator for Ronin in a node pool. The firm will take on the role of monitoring validator uptimes and contribute to the collective security of the network. It's an interesting take — Sky Mavis thus takes advantage of Google's cybersecurity expertise, adding a (hopefully) incorruptible node to its relatively limited pool of validators, which was the principal reason why the initial attack ever took place.

TOPICS
Francisco Pires
Freelance News Writer

Francisco Pires is a freelance news writer for Tom's Hardware with a soft side for quantum computing.