The Kyrgyz cryptocurrency exchange Grinex, already under UK and US sanctions, has suspended operations following a large‑scale cyberattack. According to the company, attackers stole around $13.74 million in user funds, exceeding 1 billion rubles. The exchange publicly blamed “Western intelligence services”, a claim that has intensified debate among cybersecurity and sanctions experts about the real nature of the incident.
Sanctioned exchange Grinex and its ties to Garantex and Russian sanctions evasion
Grinex, registered in Kyrgyzstan, is viewed by multiple blockchain‑analytics firms as a rebranded successor to the sanctioned platform Garantex. The US Treasury’s Office of Foreign Assets Control (OFAC) sanctioned Garantex in April 2022 for laundering funds linked to ransomware operations and dark‑web markets, including Conti and Hydra. Sanctions were tightened again in August 2025 after accusations that Garantex processed more than $100 million in illicit transactions.
According to US Treasury data and analysis by Elliptic and TRM Labs, a significant portion of Garantex’s customer base was migrated to Grinex. A key technical element in this infrastructure is the ruble‑denominated stablecoin A7A5. Localized stablecoins like A7A5 allow exchanges to partially decouple settlement from the global banking system, increasing resilience to formal sanctions and enabling more opaque ruble‑linked flows.
Elliptic also highlighted Grinex’s links with other regionally connected platforms. In a February report, the firm noted that the Georgian crypto exchange Rapira, which maintains an office in Moscow, conducted direct transactions with Grinex exceeding $72 million. This pattern illustrates how crypto exchanges with Russian ties are used to circumvent sanctions and facilitate cross‑border capital movement outside traditional financial channels.
How the Grinex cyberattack unfolded: USDT theft on TRON and Ethereum
Elliptic reports that the cyberattack on Grinex occurred on 15 April 2026 around 12:00 UTC. The stolen assets were primarily denominated in the major stablecoin Tether (USDT) and were quickly moved to new addresses across the TRON and Ethereum blockchains.
Rapid USDT conversion to avoid Tether blacklisting
A core technique used by the attackers was the rapid swapping of USDT into other assets such as TRX and ETH. Many stablecoins, including USDT, incorporate a so‑called blacklist function, allowing the issuer (Tether) to freeze tokens at specific addresses suspected of being tied to crime. By immediately exchanging USDT for more decentralized tokens, criminals seek to outrun potential freezes and make law‑enforcement tracing more complex.
TRM Labs identified around 70 cryptocurrency wallets associated with this incident. Funds were dispersed across these addresses and routed through both TRON and Ethereum, following a well‑known laundering pattern: quick conversion from stablecoins to altcoins, fragmentation into multiple wallets, and use of several blockchains and intermediary services.
Collateral impact on TokenSpot and consolidation of stolen funds
TRM Labs also noted that another Kyrgyz platform, TokenSpot, was affected simultaneously and may function as a front platform for Grinex. On the day of the attack, TokenSpot announced “technical maintenance” via its Telegram channel and declared full restoration of services on 16 April. Estimated losses for TokenSpot are under $5,000, but those funds moved through two exchange‑controlled addresses and were ultimately consolidated in the same wallet cluster associated with Grinex, suggesting operational overlap.
Attribution debate: state‑backed attack or insider “false‑flag” operation?
The most contested dimension of the case is attribution. Grinex’s management claims that internal digital forensics allegedly point to a “unprecedented level of resources” and the involvement of “hostile states”. In public statements, the company framed the hack as an attack on the “financial sovereignty of Russia” and an effort to destabilize its domestic financial sector, asserting that the exchange’s infrastructure had been targeted “since the beginning of its operations”.
Blockchain‑analytics firm Chainalysis urges consideration of an alternative scenario. Given the heavy sanctions on Grinex, its narrow network of counterparties and use of transaction‑obfuscation techniques, analysts suggest the incident might resemble a “false‑flag” operation. In such a scenario, the outflow of funds is engineered or facilitated by insiders linked to Russian interests in order to reallocate assets, erase traces of previous flows, or prepare a fresh rebranding under a new name.
At present, available on‑chain data does not allow a definitive conclusion on whether this was a conventional cybercriminal intrusion or a politically framed insider operation. Nonetheless, experts view the disabling of Grinex as a significant setback for sanctions‑evasion infrastructure connected to the Russian crypto ecosystem, reducing available channels for high‑risk ruble‑linked transactions.
Cybersecurity lessons for crypto exchanges and users
The Grinex incident underscores the need for robust cybersecurity architecture in cryptocurrency exchanges. Best practice includes strict infrastructure segmentation, minimizing balances in hot wallets, enforcing multi‑signature access controls, and commissioning regular independent security audits of both wallet infrastructure and any smart contracts in use.
Equally important are real‑time blockchain‑monitoring systems capable of detecting abnormal withdrawal patterns and automated alerts on large or unusual stablecoin flows. Exchanges must also incorporate stablecoin‑specific risk management—including contingency plans for issuer‑initiated token freezes, which can disrupt both legitimate users and criminal actors.
For individual users, the case is a reminder to prioritize exchanges with transparent security policies, clear reporting on proof‑of‑reserves, and stringent KYC/AML procedures. Long‑term storage of substantial assets on centralized platforms remains risky; using hardware wallets, enabling strong multi‑factor authentication, and restricting withdrawals to whitelisted addresses significantly reduces exposure to exchange‑level breaches.
The attack on Grinex demonstrates how cybercrime, sanctions evasion, and digital finance intersect on a global scale. As investigations continue, regulators, exchanges, and users all face the same imperative: strengthen technical defenses, improve visibility into on‑chain activity, and treat cybersecurity not as an optional add‑on, but as a core requirement for participating safely in the cryptocurrency ecosystem.