Inside the Atomic Wallet Hack: North Korea Connection and the Sinbad.io Crypto Mixer

The world of crypto has become a hotbed for hackers and cybercriminals in recent years, and the latest victim of such crime is Atomic Wallet. The company recently suffered a hack that resulted in the loss of up to $35 million, and investigations reveal that the funds have been traced to a crypto mixer favored by North Korea’s notorious cyber-hacking group.

Background on the Atomic Wallet hack

On June 3, several user accounts belonging to Atomic Wallet were compromised, leading to losses of up to $35 million. The company’s Chief Marketing Officer, Roland Säde, assured the public that the Atomic Wallet team is doing everything possible to recover the funds and that an investigation is ongoing. Unfortunately, the latest news has revealed that the funds were traced to a crypto mixer known to be favored by the infamous North Korean Lazarus Group.

Tracing of funds to crypto mixer Sinbad.io

The blockchain compliance analytics firm Elliptic reported that its investigations team has traced the Atomic Wallet hack funds to the crypto mixer Sinbad.io. The firm did not reveal exactly how much was sent to the mixer, however, it was noted that the funds were being swapped for bitcoin before being obfuscated through the mixer.

Previous use of Sinbad.io by North Korea’s Lazarus Group

According to Elliptic, Sinbad.io has been previously used to launder over $100 million in crypto assets that were stolen by North Korea’s notorious Lazarus Group. The hacking group is responsible for several high-profile cybercrimes in recent years, including the hack of Sony Pictures in 2014 and the theft of $81 million from the Bangladesh Bank in 2016.

“Sinbad.io” is likely a rebranded version of “Blender.io”

Elliptic also reported that Sinbad.io is likely a rebranded version of Blender.io, another popular mixer used to launder funds stolen by the Lazarus Group. Blender.io was the first mixer to be sanctioned by the U.S. Treasury Department.

U.S. Treasury Department Imposes Sanctions Against Blender.io

The US Treasury Department sanctioned Blender.io in 2020, stating that the service was used to launder over $10 million in cryptocurrency stolen from two different crypto exchanges. The sanctions prohibit US individuals and businesses from conducting transactions with Blender.io.

Atomic Wallet’s response to the hack

After the hack, Atomic Wallet’s CMO, Roland Säde, assured the public that the team was doing everything possible to recover the funds. He advised victims to track the illicit transfers and report them to popular crypto exchanges to prevent the scammers from exchanging the funds.

Recommendations to victims

Unfortunately, for many victims of the hack, it may be too late to do anything to recover their lost funds. However, going forward, it is recommended that crypto users take additional steps to secure their wallets, such as enabling two-factor authentication, avoiding public Wi-Fi when accessing their wallets, and keeping their private keys offline.

Potential consequences for victims

The Atomic Wallet hack highlights the risks associated with owning and using crypto wallets. Victims of the hack may lose their investments entirely, leaving them with little to no recourse to recover their lost funds. It is essential for crypto users to exercise caution when investing in digital assets and to use secure wallets with necessary protections to avoid falling victim to cybercriminals.

The Atomic Wallet hack and the tracing of stolen funds to a crypto mixer used by the North Korean Lazarus Group are a stark reminder of the risks associated with the world of crypto. Crypto users must remain vigilant and take necessary precautions to secure their wallets and protect their investments. The Atomic Wallet team is continuing to investigate the hack and working to recover the lost funds, but for many victims, the consequences may be irreversible.

Explore more

Closing the Feedback Gap Helps Retain Top Talent

The silent departure of a high-performing employee often begins months before any formal resignation is submitted, usually triggered by a persistent lack of meaningful dialogue with their immediate supervisor. This communication breakdown represents a critical vulnerability for modern organizations. When talented individuals perceive that their professional growth and daily contributions are being ignored, the psychological contract between the employer and

Employment Design Becomes a Key Competitive Differentiator

The modern professional landscape has transitioned into a state where organizational agility and the intentional design of the employment experience dictate which firms thrive and which ones merely survive. While many corporations spend significant energy on external market fluctuations, the real battle for stability occurs within the structural walls of the office environment. Disruption has shifted from a temporary inconvenience

How Is AI Shifting From Hype to High-Stakes B2B Execution?

The subtle hum of algorithmic processing has replaced the frantic manual labor that once defined the marketing department, signaling a definitive end to the era of digital experimentation. In the current landscape, the novelty of machine learning has matured into a standard operational requirement, moving beyond the speculative buzzwords that dominated previous years. The marketing industry is no longer occupied

Why B2B Marketers Must Focus on the 95 Percent of Non-Buyers

Most executive suites currently operate under the delusion that capturing a lead is synonymous with creating a customer, yet this narrow fixation systematically ignores the vast ocean of potential revenue waiting just beyond the immediate horizon. This obsession with immediate conversion creates a frantic environment where marketing departments burn through budgets to reach the tiny sliver of the market ready

How Will GitProtect on Microsoft Marketplace Secure DevOps?

The modern software development lifecycle has evolved into a delicate architecture where a single compromised repository can effectively paralyze an entire global enterprise overnight. Software engineering is no longer just about writing logic; it involves managing an intricate ecosystem of interconnected cloud services and third-party integrations. As development teams consolidate their operations within these environments, the primary source of truth—the