Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

April 22, 2026

AI Agents Cause Cybersecurity Incidents at Two Thirds of Firms

April 22, 2026

JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025

April 22, 2026
Facebook X (Twitter) Instagram
Wednesday, April 22
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Crypto Exchange Grinex Blames Western Spies for $13m Theft
News

Crypto Exchange Grinex Blames Western Spies for $13m Theft

Team-CWDBy Team-CWDApril 21, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A sanctioned cryptocurrency exchange has claimed that Western intelligence agencies are to blame for a targeted attack last week which led to the theft of one billion rubles ($13.2m) from Russian customers.

Kyrgyzstan-based Grinex is believed to be the successor to Garantex, which was sanctioned by the US in 2022 for enabling money laundering and illegal transactions. Grinex suffered the same fate last August, but continues to help Russian’s evade sanctions via crypto-transactions.

However, in a statement late last week, the firm said it had been forced to suspend operations following a “large-scale cyber-attack” by “foreign” intelligence agencies.

It claimed that only these actors would be able to muster the “unprecedented level of resources and technology” used in the raid, saying that it was done to harm Russia’s “financial sovereignty.”

“From the very beginning, the exchange’s infrastructure has been subject to attacks,” said a Grinex spokesperson.

“We have documented systematic attempts to restrict the transfer of cryptocurrency outside the CIS: the exchange was placed on sanctions lists, crypto wallets were deliberately targeted, and transactions were blocked. Today, attempts to destabilize the domestic financial sector have reached a new level – the direct theft of assets from Russian citizens and companies using complex cyber-attacks.”

Read more on crypto-heists: DeFi Protocol Balancer Loses Over $120m in Cyber Heist

Grinex said it had filed a criminal complaint about the attack and shared relevant information with law enforcers.

It also shared the crypto address where the funds were allegedly deposited, after being converted to TRX.

Experts Question Narrative

However, blockchain experts are skeptical about the story Grinex is floating.

Forensics firm Chainalysis said that Western agencies typically freeze centralized stablecoins rather than swapping them. But in this attack, they were quickly swapped for a non-freezable, more decentralized token – a classic tactic apparently used by cybercriminals looking to quickly launder funds.

“Shortly after the funds were exfiltrated, they were actively moved by leveraging a popular Tron-based decentralized exchange (DEX) to swap the stablecoins into Tron (TRX), the native token of the Tron blockchain. Interestingly, this specific DEX was previously heavily leveraged by Garantex – Grinex’s sanctioned predecessor – as a source of liquidity to gas-fund its hot wallets,” Chainalysis explained.

“This behavior immediately raises reasonable questions about Grinex’s claim that Western authorities are behind the attack.”

Chainalysis suggested that this may be a false flag attack – potentially to cover an attempt by admins to move funds to their own wallets.

“Faced with mounting international pressure and a shrinking operational footprint, actors associated with Grinex could be using the guise of an alleged hack to quietly siphon liquidity and execute an exit scam,” it said.

“At the time of writing, the exfiltrated funds remain as a balance on a single address; as the funds move downstream, forensic blockchain evidence will provide additional clues into who might be responsible for the alleged hack.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident
Next Article North Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware
Team-CWD
  • Website

Related Posts

News

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

April 22, 2026
News

AI Agents Cause Cybersecurity Incidents at Two Thirds of Firms

April 22, 2026
News

JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025

April 22, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

Is it time for internet services to adopt identity verification?

January 14, 2026

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Chronology of a Skype attack

February 5, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.