Summary: How this millionaire crypto hacker continues to freely cash out a year later

Published: 1 month and 24 days ago
Based on article from CryptoSlate

The Radiant exploit serves as a critical case study in the evolving landscape of decentralized finance security, highlighting how even robust multi-signature schemes can be circumvented through operational compromises and social engineering. This incident not only resulted in tens of millions in losses but also demonstrated a methodical, patient approach to laundering funds that poses ongoing challenges for compliance and underscores fundamental lessons for the broader Web3 ecosystem.

The Genesis of a Sophisticated Breach

In October 2024, Radiant Capital suffered a significant breach, with its lending pools on Arbitrum and BNB Chain drained of approximately $50-58 million. Unlike many high-profile hacks stemming from smart contract vulnerabilities, the Radiant exploit was attributed to an operational compromise. Attackers managed to induce keyholders to approve malicious transactions through the project's three-out-of-eleven multi-signature scheme, leveraging device compromise and social engineering. Later reports even suggested the involvement of a state-backed group. This incident alone accounted for nearly half of the total crypto exploit losses that month, underscoring the outsized impact a single, well-orchestrated cross-chain attack can have on the market's risk profile.

The Patient Art of Laundering via Tornado Cash

Nearly a year after the initial exploit, in October 2025, the Radiant exploiter began methodically moving the stolen funds to Tornado Cash, a move valued at over $30 million across multiple tranches. This was not a hurried exit but a calculated "slow bleed" strategy. The process involved carefully staging funds across various chains, bridging them back to Ethereum mainnet for its deeper liquidity, and then swapping balances into ETH. Deposits into Tornado Cash were then parceled into standard denominations, a tactic designed to fragment the public transaction graph and make tracing more difficult for compliance teams. This unhurried, step-by-step approach reveals a sophisticated operator intent on obfuscation over spectacle, optimizing for blending and minimizing traceability.

Enduring Lessons for DeFi Security and Compliance

The Radiant exploit and subsequent laundering activity offer crucial insights for builders, users, and compliance professionals alike. While tools like Tornado Cash present challenges, compliance teams continue to adapt, clustering addresses based on gas patterns, timing, and "peel chains" to track illicit funds. The legal landscape for decentralized mixers remains a "gray zone," pushing exchanges towards behavior-driven controls rather than blanket bans. Critically, this incident reinforces that design choices, particularly those involving cross-chain bridges and multi-signature operations, carry significant cash outcomes and potential failure modes. The ongoing activity demands hardened keyholder procedures, narrower approval scopes, real-time bridge monitoring, and a cultural shift towards treating signer devices as paramount assets. Ultimately, patient exits like the Radiant exploiter's erode confidence in cross-chain abstractions and emphasize the need to audit not just code, but the entire operational security posture of DeFi projects.

Cookies Policy - Privacy Policy - Terms of Use - © 2025 Altfins, j. s. a.