Security & Infrastructure Tools
Grinex Exchange Blames Western Intelligence for $13.7M Crypto Hack
Grinex, a Kyrgyzstan-based exchange with Russian ties, suspended operations after a $13.7 million hack targeting Russian user wallets. The exchange claims Western intelligence orchestrated the attack to undermine Russia’s financial sovereignty, but no public evidence supports this attribution. Security researchers traced the theft to transfers through TRON and Ethereum addresses and noted a second hack at TokenSpot; US authorities have linked Grinex to the sanctioned Garantex network in 2025. The incident underscores ongoing risks around sanctioned, Russia-linked crypto activity.

Grinex Exchange Blames Western Intelligence for $13.7M Crypto Hack
- Executive Overview
- Kyrgyzstan-based Grinex crypto exchange halted its operations after a $13.7 million theft from wallets tied to Russian users.
- Grinex allows crypto-ruble exchanges between Russian businesses and individuals and is linked, in public reporting, to the previously sanctioned Garantex.
- The exchange attributes the attack to a foreign intelligence entity with “unprecedented level of resources and technology,” while public investigators have not provided definitive proof tying the incident to any specific actor.
- Background and Corporate Footprint
- Grinex launched in the year prior to the report and is described as having Russian links, with speculation that it is a rebrand of the sanctions-era Garantex platform.
- The predecessor exchange, Garantex, faced formal actions including arrests of its admin and domain seizures over allegations of facilitating illicit transactions and money laundering.
- Grinex’s operations included a stablecoin offering backed by the Russian ruble (A7A5), which was reported to enable bypassing some sanctions through on/off-ramp activity.
- Sanctions Context and Regulatory Posture
- In August 2025, the U.S. Department of the Treasury announced sanctions against Grinex, presenting evidence that the service continued activities associated with Garantex, including the same actors and illicit-like functions.
- The sanctions highlighted the role Grinex played in maintaining Russian financial sovereignty and partially enabling transfers despite international banking restrictions.
- Grinex defended its stance by pointing to the alleged involvement of foreign intelligence services, claiming access to resources and capabilities beyond those of ordinary criminal groups.
- The Hack Details and Immediate Aftermath
- The theft occurred on a Wednesday at 12:00 UTC, with stolen funds traced to wallets associated with Russian users.
- Reported movement of funds: from Grinex wallets to addresses on the TRON and Ethereum networks, followed by conversion to TRX and ETH using the SunSwap decentralized exchange protocol.
- Elliptic, a blockchain analytics firm, and TRM Labs documented the incident, but did not publish evidence directly linking the attack to Western intelligence or any single perpetrator.
- Attribution Claims vs. Evidence
- Grinex issued a public attribution, alleging a state-backed threat actor with substantial resources was responsible.
- Elliptic’s and TRM Labs’ analyses described the flow of funds and attacker addresses but stopped short of confirming any particular actor or state sponsorship.
- TRM Labs also noted a second hack at TokenSpot, another Kyrgyzstan-based exchange with ties to Grinex, which they linked to broader money-laundering and geopolitical activity, though no conclusive perpetrator attribution was offered.
- Related Entities, Actors, and Cross-Links
- TokenSpot: another exchange implicated by investigative reports, with alleged ties to laundering operations and geopolitical influence campaigns.
- SunSwap: the DeFi protocol used to convert stolen assets on-chain, enabling blending of funds across networks.
- A7A5 stablecoin: the ruble-linked asset used in Grinex’s ecosystem to facilitate certain transactions and sanctions circumvention.
- Houthi-linked networks and Moldova-related influence campaigns: cited in some analyses to illustrate broader regional and strategic alignment patterns observed by investigators.
- Timeline of Key Events
- Early 2025: Grinex reportedly launched, with internal and external references tying it to the Garantex lineage.
- August 2025: U.S. Treasury sanction announcement against Grinex, citing continued operation as Garantex’s successor and ongoing illicit-like activity.
- April 15, 2026 (approximate): The hack took place at 12:00 UTC, with funds moved into TRON and Ethereum ecosystems and subsequently swapped on SunSwap.
- April 17, 2026: The incident and subsequent analyses were reported publicly, with Grinex’s attribution claim and independent researchers outlining the on-chain activity and addresses involved.
- What Is Known and What Remains Unclear
- Known:
- The breach affected Grinex wallets tied to Russian users and involved a substantial financial loss amounting to $13.7 million.
- On-chain movement followed a path from Grinex to TRON and Ethereum addresses, then toward TRX and ETH via SunSwap.
- Investigations by Elliptic and TRM Labs identified attacker addresses and a related incident at TokenSpot, but did not publish definitive perpetrator attribution.
- Unknown:
- A definitive technical proof tying the attack to Western intelligence or any specific state actor.
- The full extent of any internal compromises at Grinex or potential collateral losses beyond the reported wallets.
- The exact timeline and operational details of the second hack referenced by TRM Labs and its connection to the primary incident.
- Observations on Public Disclosures and Gaps
- Public statements from Grinex rely on attribution to foreign intelligence without providing technical indicators or forensics to substantiate the claim.
- Independent investigators have detailed the flow of funds and related addresses but have not confirmed the responsible party.
- The involvement of TokenSpot in a separate but related theft suggests potential ecosystem-linked vulnerabilities or misaligned sanctions-avoidance mechanisms across Kyrgyzstan-based exchanges.
- Implications for the Crypto Security Landscape
- The incident underscores ongoing risks associated with cross-border exchanges operating in jurisdictions with evolving regulatory scrutiny.
- It highlights the value—and the limits—of on-chain analytics in attribution; even with address clustering and transaction tracing, pinpointing a state actor remains challenging.
- The case illustrates how sanctions regimes interact with crypto platforms that maintain services tied to sanctioned networks, including the use of stablecoins and DeFi protocols to move value.
- Concluding Context
- The Grinex case sits at the intersection of sanctions enforcement, cross-border crypto liquidity, and alleged state-backed cyber operations.
- What remains critical for the broader community is transparent forensic sharing, clear attribution standards, and robust controls to reduce the risk of large-scale wallet breaches and illicit fund flows across decentralized and centralized crypto ecosystems.