Xshell Ssh

2026-05-02 08:02:05

Crypto Exchange Grinex Blames Western Hackers for $15 Million Theft After Halting Operations

Grinex, a US-sanctioned crypto exchange, halts operations after a $15M heist, blaming western special services for targeting Russian users and threatening Russia's financial sovereignty.

Grinex, a US-sanctioned cryptocurrency exchange registered in Kyrgyzstan, recently announced it is suspending operations following a significant security breach. The company claims the attack, which resulted in the theft of between $13 million and $15 million, was orchestrated by hackers working for Western intelligence services. While Grinex reported 54 drained addresses, blockchain researchers from TRM Labs identified roughly 70 compromised wallets, putting the loss closer to $15 million. The exchange has been under near-constant attack since its launch 16 months ago, with the latest incidents specifically targeting Russian users. Grinex argues that the scale and sophistication of the attack indicate an effort to undermine Russia's financial sovereignty. Neither TRM nor fellow research firm Elliptic has explained how the attackers bypassed Grinex's defenses. The incident raises questions about the security of sanctioned crypto platforms and the geopolitical dimensions of digital finance.

What exactly happened to Grinex, and why is it halting operations?

Grinex, a US-sanctioned cryptocurrency exchange based in Kyrgyzstan, suffered a major security breach that led to the theft of approximately $13 million to $15 million in digital assets. In response, the exchange announced it is temporarily halting all operations to assess the damage and prevent further losses. The company stated that the attack was carried out by hackers linked to Western special services, and that it had been under persistent attack attempts since its establishment 16 months ago. The decision to pause operations is a precautionary measure, though it is unclear if Grinex will resume services. Blockchain researchers from TRM Labs confirmed the theft, noting roughly 70 drained wallet addresses—more than the 54 initially reported by Grinex. The exchange's closure marks a significant setback for a platform that facilitated crypto transactions for users in Russia and other regions subject to US sanctions.

Crypto Exchange Grinex Blames Western Hackers for $15 Million Theft After Halting Operations
Source: feeds.arstechnica.com

How much money was actually stolen, and who reported the discrepancy?

Grinex initially claimed that hackers made off with $13 million from the exchange. However, independent blockchain researchers at TRM Labs, which has confirmed the theft, estimated the losses at $15 million. TRM discovered roughly 70 drained addresses, whereas Grinex reported only 54 compromised wallets. The difference of about 16 addresses accounts for the additional $2 million. Neither TRM nor another blockchain forensics firm, Elliptic, has publicly explained how the attackers breached Grinex's security systems. The discrepancy highlights the challenges of accurately tracking stolen crypto funds, especially when exchanges may not have full visibility into all affected wallets. The larger figure underscores the severity of the heist and raises concerns about the exchange's internal monitoring capabilities.

Who does Grinex blame for the heist, and what evidence do they cite?

Grinex explicitly blames "western special services" hackers for orchestrating the theft. In a statement, the exchange said, "The digital footprints and nature of the attack indicate an unprecedented level of resources and technology available exclusively to the structures of unfriendly states." According to Grinex, the attackers specifically targeted Russian users of the platform. The exchange argues that the attack was coordinated to cause direct damage to Russia's financial sovereignty. However, Grinex has not provided concrete evidence linking the heist to any particular government or intelligence agency. Blockchain researchers from TRM and Elliptic have not corroborated these claims, focusing instead on the technical aspects of the theft. The accusation fits a broader narrative of geopolitical tensions in the crypto space, where sanctioned entities often attribute cyberattacks to state actors.

Why does Grinex consider this attack a threat to Russia's financial sovereignty?

Grinex claims that the hackers' goal was to undermine Russia's financial sovereignty by targeting an exchange that serves Russian clients and facilitates transactions in an economy under Western sanctions. The exchange notes that the attack was not random but specifically aimed at Russian users, suggesting an intent to disrupt Russia's alternative financial infrastructure. As a US-sanctioned entity, Grinex operates outside the traditional SWIFT system, and its shutdown could limit options for Russian individuals and businesses looking to move money internationally. By crippling such platforms, Grinex argues, hostile states seek to weaken Russia's ability to conduct independent financial operations. While this interpretation is contested, it reflects the broader geopolitical struggle where digital currencies become tools of economic warfare.

Crypto Exchange Grinex Blames Western Hackers for $15 Million Theft After Halting Operations
Source: feeds.arstechnica.com

What do blockchain researchers say about how the attackers breached Grinex's defenses?

Neither TRM Labs nor Elliptic, two leading blockchain research firms that investigated the incident, have publicly detailed the exact method used to bypass Grinex's security. Grinex itself has not offered a technical explanation, only stating that the attackers displayed "unprecedented" resources and technology. This silence leaves a critical gap in understanding the vulnerability. Common crypto exchange heists often involve private key theft, phishing, or exploitation of smart contract flaws, but without official confirmation, these remain speculations. The lack of transparency may stem from ongoing investigations or a desire to avoid revealing weaknesses that could be exploited elsewhere. For now, the breach remains a mystery to the broader crypto community.

How long had Grinex been operating, and has it faced attacks before?

Grinex was incorporated 16 months ago and has been under near-constant attack attempts since its launch, according to the exchange's statement. The recent heist is the culmination of persistent efforts to compromise the platform. The company says the latest attacks specifically targeted Russian users, indicating a shift in the attackers' focus. Over the past year and a half, Grinex likely faced a range of cyber threats—from DDoS attacks to phishing campaigns—but the $15 million theft marks the most severe breach. The exchange's short lifespan and vulnerability to attacks raise questions about the security posture of sanctioned crypto platforms, which often operate with fewer regulatory protections and less robust infrastructure compared to mainstream exchanges.

What implications does this heist have for the broader cryptocurrency ecosystem?

The Grinex incident underscores the growing geopolitical tensions within the cryptocurrency space. Sanctioned exchanges are increasingly becoming targets for cyberattacks attributed to state actors, blurring the line between financial crime and international conflict. The heist also reveals the difficulty of securing digital assets when exchanges lack the resources or support of traditional financial institutions. For Russian users, the loss of a sanctioned platform may drive them toward decentralized alternatives or peer-to-peer trading, which carry their own risks. Moreover, the incident could lead to tighter scrutiny of crypto exchanges operating in sanctioned regions, potentially accelerating regulatory crackdowns. Blockchain forensics firms like TRM and Elliptic play a crucial role in tracking stolen funds, but recovering assets remains challenging. The $15 million heist is a stark reminder that the crypto ecosystem is not immune to the political struggles that define the physical world.