Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • ADOPTION
  • TRADING
  • HACKING
  • SLOT
  • TRADE
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • ADOPTION
  • TRADING
  • HACKING
  • SLOT
  • TRADE
Crypto Flexs
Home»BLOCKCHAIN NEWS»Almost half of the stolen encryption remains unauthorized.
BLOCKCHAIN NEWS

Almost half of the stolen encryption remains unauthorized.

By Crypto FlexsMay 12, 20254 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Almost half of the stolen encryption remains unauthorized.
Share
Facebook Twitter LinkedIn Pinterest Email

Analysts of Global Ledger said about 46%of the hacked funds are idle and suggest a recovery after the accident.

The hacker is still fast, but the system is still followed. The new report of the blockchain Intelligence company, Global Ledger, is a new report based on hundreds of on -chain cases, and in many cases the stolen funds were stolen before the hacking was released before the land was stolen before the land was released.

According to a report shared with Crypto.news, it takes 43.83 hours from the initial chain violation on average until the victim project or the third -party investigator reports the case. Meanwhile, hackers tend to move the stolen funds to the first identification company, such as exchange, encryption mixers or distributed financial protocols.

But the longest delay is the window between public disclosure and the interaction of the attacker with the laundry service. This is an average of 78.55 hours, suggesting that funds are already well known before hacking is widely known.

‘There is no clear playbook here’

Overall, researchers at Global Ledger have measured four major timelines across hundreds of events. Time from violation, violations, reports, violations, first entity interactions, and public release to laundry activities. Each delay also talks on its own story.

How to change the fund movement according to the hacking target | Source: Global Director

For example, attacks on NFT projects show the slowest fund movement. On average, the funding of this abuse takes 563.63 hours or almost 24 days to move to the first known company of the laundry chain. This is more than twice the average delay in the centralized exchange -related hacking and records the clock in about 425 hours.

The co -founder and CEO Lex Fisun of Global Ledger says that in the NFT’s exclusive commentary on Crypto.news, the long delay says that these tokens are “uniquely and quietly off.”

“There is no clear playbook. Wash usually includes laundry or social engineering. The attacker has emitted $ 340,000 from Steth but remember the idol exploitation attached to the relevant NFT.”

LEX FISUN

This report emphasizes how the washing path changes depending on the exploited project type. The Defi platform and token generally see the money moving through the laundry channel within 230 hours, and the payment platform shows the fastest processing time, which is only 0.6 hours. Game and meta exploitation is one of the fast trends within 25 hours.

There are almost half of theft encryption. Data display -2
Theft encryption post hacking | Source: Global Director

Despite the speed and fragmentation of the fund flow, the amazing amount of amazing hacking assets did not touch. According to the data, almost 46%of theft funds are still unstable, suggesting that there are significant opportunities for long -standing tracking and potential recovery after the incident occurred.

Cross chain trace

While many funds are idle, they are slipping through cross chain lines, where more and more market share is difficult to track. This report shows that 42.23%of thefts crossed the chain and bypassed the monitoring system for each chain.

FISUN explained that the cross chain Bridge has already slipped the chain -star monitoring and has already become one of the best funds laundry tools. And repeated abuse can lead to AML investigations, but the tornado cash case is “sanctions shift tactics, not demand.”

There are almost half of theft encryption. Data Display -3
How to wash by frequent use | Source: Global Director

According to the data from Global Ledger, tornado cash remains a dominant laundry protocol used for more than 50% of the company’s traces. Despite the sanctions of the US Treasury in 2022 and the pressure of regulators around the world, the service continues to play a central role in post -laundry.

After the US court ruling, the use of the constitutional basis in 2024 reversed the use.

Other personal information protection tools are also gaining momentum. For example, Railgun was used in 20%and Wasabi wallets were 10%. According to the data, Chainflip, Coinjoin and Cryptomixer are involved in less than 7% of the laundry, respectively.

The attacker becomes smarter

FISUN does not only reflect better compliance with a slow flow through the centralized exchange (currently 425 hours or more).

The CEO of the Global Director added that the attacker divides assets and uses personal information protection protocols to move the stolen funds through the “attempt to delay the brilliant flow”, “the slow timeline is” not a defect but a design. “

Execution or compliance teams are only frozen. The report suggests that real -time response remains rarely despite the development of analysis and monitoring tools.

The number emphasizes a place where only the defender can take advantage of continuous challenge. Sometimes the time interval measured shows that there is still a space to act before the theft disappears completely.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Genius ACT specifies the House of Representatives, and Stablecoin Law can pass this week.

July 17, 2025

Tethers in September, completing USDT support for Omni, Bitcoin Cash SLP, KUSAMA, EOS and Algorand

July 12, 2025

From Wall Street to Wallet: Ark Defai redefines financial architecture.

July 7, 2025
Add A Comment

Comments are closed.

Recent Posts

Bitcoin Price $ 123K Explosion -Trader Brace for Brake Out

July 20, 2025

Ether Lee Rium breaks $ 3K with 7,200% of the virus L2 coin eyes.

July 20, 2025

XRP Breaks Through $3.5! DL Mining Launches AI Cloud Mining Contracts, Earning Steady Profits Every Day

July 20, 2025

AAVE gains strength as AAVE dominates defect loans with net deposits of $ 50B or more.

July 19, 2025

As XRP Surges, DLMining Platform Opens New High-yield Cloud Mining Opportunities For Holders

July 19, 2025

Missed Out On Bitcoin At $9999? SIM Mining Cloud Mining Brings You New Opportunities For Wealth!

July 19, 2025

NFT is a rebound -there is a teenage NFTS this week.

July 19, 2025

MultiBank Group To List $MBG Token On Gate.io And MEXC During Official Token Generation Event

July 18, 2025

Earn $4,777 Daily! PaxMining Leads 2025’s Record-Breaking Bitcoin Mining Boom

July 18, 2025

GSR Leads $100M Private Placement Into Nasdaq-listed MEI Pharma To Launch First Institutional Litecoin Treasury Strategy Alongside Charlie Lee

July 18, 2025

KuCoin Launches XStocks, Delivering A One-Stop Access Point To Top Global Tokenized Equities

July 18, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Bitcoin Price $ 123K Explosion -Trader Brace for Brake Out

July 20, 2025

Ether Lee Rium breaks $ 3K with 7,200% of the virus L2 coin eyes.

July 20, 2025

XRP Breaks Through $3.5! DL Mining Launches AI Cloud Mining Contracts, Earning Steady Profits Every Day

July 20, 2025
Most Popular

Bitcoin Price is stabilized in 83K for investors in the Eye Eye of S & P 500 Recovery.

March 4, 2025

14 years ago, someone bought pizza with Bitcoin.

May 23, 2024

Bitcoin (BTC) Price Prediction 2024, 2025, 2026, 2030

February 13, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.