BTCC / BTCC Square / Cryptopolitan /
Tornado Cash Receives $6.2M from SagaEVM Exploit—Here’s What It Means for Crypto Security

Tornado Cash Receives $6.2M from SagaEVM Exploit—Here’s What It Means for Crypto Security

Published:
2026-01-24 19:55:57
6
2

$6.2M of the funds stolen during the SagaEVM exploit has been deposited into Tornado Cash

Another day, another multi-million dollar crypto exploit finds its way into the industry's favorite digital laundry.

The Money Trail Goes Cold

The $6.2 million haul from the recent SagaEVM breach has officially entered the mixing service, effectively scrambling the transaction trail. This move signals the attacker's shift from theft to obfuscation—a standard yet frustrating playbook in decentralized finance.

Security Gaps Meet Privacy Tools

Exploits like this underscore a persistent tension: the same privacy protocols that protect legitimate users also provide cover for ill-gotten gains. The funds' journey from a compromised smart contract to a mixer highlights the cat-and-mouse game between blockchain auditors and bad actors.

The Regulatory Elephant in the Room

Each high-profile incident fuels the debate around privacy tools and their place in a regulated financial future—or as some Wall Street veterans might sneer, 'just another cost of doing business in the digital Wild West.'

The saga continues, but the money? That's already gone dark.

How the hackers laundered the stolen funds 

According to the report by blockchain security firm CertiK, the attackers initially distributed the funds across five separate wallets before they funneled them into the privacy mixer via multiple transactions. 

“Mitigation is underway, and the team is fully focused on a solution,” the team wrote at the time. 

The exploit saw nearly $7,000,000 in USDC, yUSD, ETH, and tBTC transferred to the Ethereum mainnet. The exploiter’s wallet had been identified and fed to exchanges and bridges to blacklist it and possibly reclaim the stolen funds. 

According to Certik’s report, $6.2 million out of those funds is what has now been split into deposits fed into the Tornado Cash mixer. This is expected to frustrate remediation and recovery efforts. 

The latest deposit adds to the notoriety of Tornado Cash, adding to a past checkered with US sanctions and legal issues still plaguing its developers. 

Attackers continue to use it to obscure their trails post-exploit, and it does exactly what it was designed to do — help them disappear. 

What happened to SagaEVM? 

According to a post-mortem the team shared on January 21, the incident involved a coordinated sequence of contract deployments, cross-chain activity, and subsequent liquidity withdrawals.

The document revealed that the team paused the chain out of an abundance of caution while they actively investigated and mitigated. It revealed the focus was stopping further impact by keeping SagaEVM paused while mitigation is implemented; validating the full blast radius using archive data and execution traces; and hardening the relevant components before a restart. 

The main components affected by the exploit include the SagaEVM chainlet, as well as Colt and Mustang. Others, like the Saga SSC mainnet, Saga protocol consensus, validator security, and other Saga chainlets, went unaffected. 

“There has been no consensus failure, validator compromise, or signer key leakage,” the document read. “The broader Saga network remains structurally sound.” 

The team claimed its next steps WOULD be to complete root cause validation, patch and harden affected cross-chain and deployment components, coordinate with ecosystem partners where relevant, and publish a more comprehensive technical post-mortem. 

Vulnerability links back to Cosmos 

After receiving support from Cosmos Labs engineers, the team has revealed that the issue originated from the original Ethermint codebase, making it an inherited issue. 

In response to that post, Cosmos Labs shared a statement, admitting they are aware of the incident and claiming they have been working closely with Saga and external security partners to investigate and remediate the “confirmed vulnerability.” 

They revealed they had contacted a subset of EVM chains they deemed affected by the incident and provided short-term mitigations. 

“As always, we recommend all projects continue to implement baseline security practices such as rate-limiting and security monitoring to strengthen early detection and mitigation,” they wrote on X.

If you're reading this, you’re already ahead. Stay there with our newsletter.

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users

All articles reposted on this platform are sourced from public networks and are intended solely for the purpose of disseminating industry information. They do not represent any official stance of BTCC. All intellectual property rights belong to their original authors. If you believe any content infringes upon your rights or is suspected of copyright violation, please contact us at [email protected]. We will address the matter promptly and in accordance with applicable laws.BTCC makes no explicit or implied warranties regarding the accuracy, timeliness, or completeness of the republished information and assumes no direct or indirect liability for any consequences arising from reliance on such content. All materials are provided for industry research reference only and shall not be construed as investment, legal, or business advice. BTCC bears no legal responsibility for any actions taken based on the content provided herein.