How $330M BTC Hacker May Have Doubled Down on Monero Derivatives

There's something that stands out about Monday's suspicious transfer of more than 3,520 BTC ($330.7 million) to privacy coin monero (XMR), a conversion that blockchain sleuth ZachXBT said was probably linked to a hack: coordinated activity in the derivatives market.

Monero, which obscures the sender's and recipient's addresses to provide an untraceable currency, has limited liquidity on exchanges, which makes it harder for users to transact without affecting the market and exposes them to slippage, the chance of the price changing for the worse before the deal is finalized.

The decision to go through an illiquid cryptocurrency is unusual. Tether's USDT or ether (ETH) would have provided an easier, less-slippage-prone way of moving the funds about, and mixers such as Tornado Cash could help obscure the transaction path. Of course, stablecoins like USDT are also easier to intercept and freeze.

Trading data, however, suggests there was more going on than a simple case of someone trying to launder stolen funds.

The possible hacker very likely did encounter slippage during the transaction. Combined market depth, which measures order book liquidity over a given price range, was relatively low at around $1 million per 2% on both sides of the book. XRM surged by 45% due to the limited liquidity on exchanges, meaning they could have lost as much as 20% — $66 million — by purchasing XMR rather than a more-liquid token.

For a more complete picture, take a look at derivative markets. While monero was surging, open interest — the number of outstanding futures and options contracts — in XMR on the main centralized exchanges more than doubled to $35.1 million, according to Coinalyze.

A 45% rise in XMR's price should have boosted open interest only to $24.2 million instead of the figure it ended up at. Taking into account the $1 million in liquidations, someone, or some people, were already long on XMR to the tune of $11 million.

While the price increase on that holding wouldn't have compensated for the full amount of slippage, it would help soften the blow. Moreover the figure doesn't take into account any positions that might have existed in decentralized exchanges, and let's not forget the funds were probably stolen in the first place, so the (assumed) perpetrators are still a couple of million dollars ahead.

This is not the first time bad actors have flooded spot purchases to move the derivative needle. Last month a trader manipulated JELLY prices on decentralized exchange HyperLiquid. They bought JELLY on illiquid exchanges, tricking the pricing oracle to feed an inaccurate price to HyperLiquid and thus generating profit for holders of long positions.

Both cases draw similarities to the $114 million exploit on Mango Markets in 2022, which involved a trader named Avi Eisenberg manipulating MNGO prices by borrowing assets using ill-gotten gains as collateral. Eisenberg was found guilty by a jury in 2024 and faces 20 years in prison.

1.54萬
0
本頁面內容由第三方提供。除非另有說明,OKX 不是所引用文章的作者,也不對此類材料主張任何版權。該內容僅供參考,並不代表 OKX 觀點,不作為任何形式的認可,也不應被視為投資建議或購買或出售數字資產的招攬。在使用生成式人工智能提供摘要或其他信息的情況下,此類人工智能生成的內容可能不準確或不一致。請閱讀鏈接文章,瞭解更多詳情和信息。OKX 不對第三方網站上的內容負責。包含穩定幣、NFTs 等在內的數字資產涉及較高程度的風險,其價值可能會產生較大波動。請根據自身財務狀況,仔細考慮交易或持有數字資產是否適合您。