The $4.8M Institutional Heist Recovery
Recipient: Global Macro Hedge Fund (Zurich-based)
Breach Vector: Compromised API keys + fake liquidity spoofing
BitReclaim Response:
- Initial Contact: Email to [email protected] with 37 TX hashes (Day 0 14:30 CET)
- Hour 4: Identified ACG's fake "price oracle" contract (0x3f5CE... fraud cluster)
- Day 1: Filed emergency freeze orders with Binance/Kraken compliance
- Day 3: Recovered $4,821,700 (107.3 BTC) via:
- 62.4 BTC from ACG's "insurance" wallet
- 44.9 BTC reversed from pending mixer transactions
- Day 4: Detached to fund's Ledger Enterprise vault (3-of-5 multisig)
Forensic Note: ACG was using Tornado Cash Nova pools with modified relayer logic.