Harmony Protocol Hackers Now Moving Stolen Funds via Tornado Cash

  • Harmony Protocol is cooperating with the FBI and two blockchain tracking/analytical partners to investigate the theft.
  • Harmony Protocol plans to keep its users and partners updated while it investigates ways to maintain the ecosystem secure.
  • Harmony Protocol will share as much information as possible throughout the inquiry without affecting the incident response team.

Harmony Protocol has stated that it is aware that the recent hackers have been moving funds via Tornado Cash. The hackers in question are the ones responsible of the $100 million theft of alternative cryptocurrencies from Harmony Protocol’s Horizon Bridge.

As part of an investigation into this illegal conduct, its team said it is coordinating with the FBI and working in conjunction with two blockchain tracing and analysis partners that have an excellent reputation.

The statement went on to say that Harmony Protocol is looking into a number of different alternatives for its users and partners and that they plan to keep their consumers informed as they continue to investigate methods to keep the ecosystem safe.

Although they are unable to provide any details, they have said that the objective is to disseminate information in a timely way while maintaining the highest level of openness feasible.

The incident that occurred on Thursday resulted in the theft of $100 million worth of Wrapped Ethereum (WETH), AAVE, SUSHI, DAI, Tether (USDT), and USD Coin (USDC), which were then exchanged for Ethereum.

Even though it was first reported as an attack on the Harmony protocol, the firm has now announced on Medium that it has discovered no proof of any breaches of their smart contract codes or issues on the Horizon platform.

The incident response team has found no evidence in any breaches of our smart contract codes nor vulnerabilities on the Horizon platform. Our consensus layer of the Harmony blockchain remains secure.

Harmony Protocol has said that during the investigation, it will release as much information as feasible without harming the activities of the incident response team. They’re still open to talking to the hacker, but the investigation will go on until the matter is resolved or the stolen cash is returned.