Russian cryptocurrency exchange Grinex has suspended operations after attackers drained approximately 1 billion rubles (~$12 million) from its platform, according to a disclosure from the exchange itself on April 16, 2026. Grinex publicly attributed the intrusion to a "hostile state" actor, with reporting pointing toward suspected Western intelligence services. The stolen funds were laundered into TRX, consolidated at a single address now holding roughly 45.9 million TRX (~$15 million).

What Happened

Grinex disclosed that its systems were compromised in a sophisticated intrusion that culminated in the unauthorized transfer of roughly 1 billion rubles worth of customer and platform assets. In its public statement, the exchange said the "digital footprint and nature of the attack indicate an unprecedented level of resources and technology, accessible only to structures of hostile states." The company has suspended trading and withdrawals, and says it has referred the matter to Russian law enforcement for criminal investigation.

Grinex itself operates under a politically charged shadow. In 2025, the U.S. Treasury's Office of Foreign Assets Control (OFAC) designated Grinex as a successor entity to Garantex, the sanctioned Russian exchange that was dismantled in a coordinated international action earlier that year. That sanctions posture is central context for any attribution claim made by the victim.

What Was Taken

Based on the victim's disclosure and on-chain signals:

Why It Matters

This incident lands at the intersection of cybercrime, sanctions policy, and geopolitical conflict. Several points stand out for defenders and analysts:

The Attack Technique

Grinex has not published technical indicators, malware samples, or intrusion timelines. The exchange characterized the tradecraft as beyond the reach of conventional criminal actors but provided no specifics. Absent IOCs, defenders in the crypto sector should assume the intrusion chain followed patterns common to exchange compromises observed over the past several years:

Any of these vectors is compatible with the victim's claim of a high-resource actor, but also with a well-resourced criminal operation.

What Organizations Should Do

Crypto exchanges, custodians, and treasury operations should treat this incident as a prompt to revisit core controls:

  1. Enforce hardware-backed, multi-party signing for all hot wallet movement above defined thresholds, with out-of-band human approval that cannot be bypassed by a single compromised workstation.
  2. Harden the developer and operations identity perimeter: phishing-resistant MFA (FIDO2), conditional access on managed devices only, and aggressive revocation workflows for departing or compromised personnel.
  3. Monitor for anomalous internal access to signing services, key vaults, and transaction orchestration APIs, with alerting tuned for first-seen source hosts and off-hours approval activity.
  4. Maintain a pre-arranged relationship with blockchain analytics providers and relevant chain foundations, so stolen funds can be flagged or frozen in minutes, not hours, following detection.
  5. Rehearse incident communications separately from technical response, including sanctioned-entity considerations, attribution discipline, and regulator notification timelines.
  6. Review exposure to counterparty risk from Grinex and related entities, including any residual flows from Garantex, given the active law enforcement and sanctions posture around this cluster.

Sources: ‼️‍️A Russian crypto exchange was hacked, likely by Western intelligence agencies, and 1 billion rubles were stolen - Pravda EN