#ArkhamIntel

๐—จ๐—ฆ ๐—š๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐—ป๐—บ๐—ฒ๐—ป๐˜ ๐—น๐—ถ๐—ป๐—ธ๐—ฒ๐—ฑ ๐—ฎ๐—ฑ๐—ฑ๐—ฟ๐—ฒ๐˜€๐˜€ ๐—ฎ๐—ฝ๐—ฝ๐—ฒ๐—ฎ๐—ฟ๐˜€ ๐˜๐—ผ ๐—ต๐—ฎ๐˜ƒ๐—ฒ ๐—ฏ๐—ฒ๐—ฒ๐—ป ๐—ฐ๐—ผ๐—บ๐—ฝ๐—ฟ๐—ผ๐—บ๐—ถ๐˜€๐—ฒ๐—ฑ ๐—ณ๐—ผ๐—ฟ $๐Ÿฎ๐Ÿฌ๐— .

$20M in $USDC , USDT, aUSDC and $ETH has been suspiciously moved from a USG-linked address 0xc9E6E51C7dA9FF1198fdC5b3369EfeDA9b19C34c to an attacker 0x3486eE700CcaF3E2F9C5eC9730a2e916a4740A9f.

0xc9E received USG seized funds linked to the #Bitfinex hackers from 9 separate USG seizure addresses, including 0xE2F699AB099e97Db1CF0b13993c31C7ee42FB2ac, an address named in the court documents relating to the Bitfinex seizure.

The funds were moved to wallet 0x348 which has begun selling the funds to ETH. We believe the attacker has already begun laundering the proceeds through suspicious addresses linked to a money laundering service.