Grinex exchange blames "Western intelligence" for $13.7M crypto hack
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是Grinex交易所被黑客攻击,损失了1370万美元。这个交易所位于吉尔吉斯斯坦,但和俄罗斯有关系,可能是Garantex的翻版。Garantex之前因为涉嫌非法交易被制裁过。Grinex允许俄罗斯企业和个人进行加密卢布的兑换,这帮助俄罗斯绕过国际制裁。 美国财政部在2025年8月宣布制裁Grinex,认为它延续了Garantex的活动。Grinex声称这次攻击是西方情报机构所为,目的是破坏俄罗斯的金融主权。区块链分析公司Elliptic指出资金流向TRON和Ethereum地址,并通过SunSwap转换。TRM Labs发现70个攻击地址,并且还关联到另一个交易所TokenSpot。 不过,文章提到没有证据直接指向西方情报机构,也没有技术证据支持这个说法。BleepingComputer联系了Grinex但没有得到回应。 总结的时候要包括:Grinex暂停运营、损失金额、黑客攻击、与西方情报机构的关系、以及与俄罗斯金融主权的关系。同时还要提到区块链分析的结果和TokenSpot的情况。 控制在100字以内的话,可能需要简化一些细节,比如提到TokenSpot但不详细展开。确保涵盖主要事件:暂停运营、损失金额、攻击来源、与俄罗斯的关系以及区块链分析的结果。 </think> 吉尔吉斯斯坦加密货币交易所Grinex因遭受1370万美元黑客攻击暂停运营,据称由西方情报机构实施。该平台允许俄罗斯企业和个人进行加密卢布兑换,帮助其规避国际制裁。美国财政部此前对Grinex实施制裁,指控其延续涉嫌非法交易的Garantex活动。区块链分析显示被盗资金流向TRON和Ethereum地址,并通过SunSwap转换为TRX和ETH。 2026-4-17 15:16:39 Author: www.bleepingcomputer.com(查看原文) 阅读量:12 收藏

Grinex exchange blames "Western intelligence" for $13.7M crypto hack

Kyrgyzstan-based cryptocurrency exchange Grinex has suspended its operations after suffering a $13.7 million hack attributed to Western intelligence agencies.

The funds were stolen from cryptocurrency wallets belonging to Russian users, as the platform enables crypto-ruble exchange operations between Russian businesses and individuals.

Launched early last year, Grinex has Russian links and is believed to be a rebrand of Garantex, a Russian crypto exchange whose admin was arrested and whose domains were seized over allegations of processing more than $100 million in illicit transactions and enabling money laundering.

Wiz

In August 2025, the U.S. Department of the Treasury announced sanctions against Grinex, based on evidence that the exchange service was a continuation of Garantex activity, accepting the same actors, their funds, and facilitating an identical role as an illegal operations enabler.

Grinex continued to operate, providing Russia with some level of financial sovereignty and ability to bypass international sanctions that impacted banking and transactions, mainly through a Russian ruble-backed stablecoin named A7A5, which was directly adopted from Garantex.

The exchange says that the type of attack and the digital footprint indicate a threat actor associated with "foreign intelligence agencies" that have "an unprecedented level of resources and technology, accessible only to entities of hostile states."

"According to preliminary data, the attack was coordinated with the aim of directly harming Russia's financial sovereignty," Grinex states.

Blockchain analysis firm Elliptic reports that the theft occurred on Wednesday at 12:00 UTC, and the stolen funds were sent to TRON and Ethereum addresses, then converted into TRX and ETH through the SunSwap decentralized trading protocol.

TRM Labs identified 70 attacker addresses and also discovered a second hack at TokenSpot, another exchange based in Kyrgyzstan with ties to Grinex.

TRM Labs links TokenSpot to Houthi-linked laundering operations, weapons procurement, and the InfoLider influence operation in Moldova, all aligning with Russian strategic goals.

Neither Grinex’s announcement nor Elliptic’s or TRM Labs’ reports provides any evidence pointing to a specific perpetrator, and no technical evidence or indicators were provided to support the exchange’s attribution to Western intelligence services.

BleepingComputer has contacted Grinex about attribution of the attack, but we have not received a response by publishing time.

tines

99% of What Mythos Found Is Still Unpatched.

AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop.


文章来源: https://www.bleepingcomputer.com/news/security/grinex-exchange-blames-western-intelligence-for-137m-crypto-hack/
如有侵权请联系:admin#unsafe.sh