Cross-Chain Infrastructure Under Scrutiny After the Hack
-

A significant portion of the stolen funds was routed through THORChain, allowing the attacker to bridge assets between blockchains without using centralized exchanges. This tactic helped obscure the money trail and reignited debate over how decentralized cross-chain systems can be abused during large-scale thefts.
Critics argue that while protocols like THORChain are neutral infrastructure, they can unintentionally facilitate laundering when combined with social engineering attacks. Supporters counter that responsibility lies with user security and monitoring layers—not the underlying protocol—highlighting an ongoing tension between decentralization and accountability.
-
reality is attackers will use whatever works, morals don’t really factor in