In April 2021, a vulnerability in the code of a small decentralized exchange ended with over $50 million in digital assets disappearing within minutes. Now, almost four years later, the U.S. authorities have filed charges against a Maryland man who they accuse of having starred in this robbery and of washing much of what was removed through tools that are typical of the crypt ecosystem.
According to the Office of the Prosecutor of the South District of New York, the defendant, identified as Jonathan Spalletta, reportedly attacked the Uranium Finance platform in two separate attacks and used programming errors in smart contracts to extract funds from liquidity reserves. The facts are detailed by the Department of Justice in a public statement and the recent indictment; the official note is available. Here. and Full indictment.

The charges describe two different farms. In the first, the attacker manipulated a variable of the intelligent contract that controlled bonuses, forcing unmatched withdrawals and draining hundreds of thousands of dollars. Three weeks later, he took advantage of another failure - a one-way error in the transaction verification logic - that allowed fraudulent withholding equivalent to withdraw almost all of the assets of 26 liquidity tools, taking approximately $53.3 million and leaving the project without sufficient funds to continue operating.
That a simple code error has such dramatic consequences is not a coincidence: platforms that work with automated smart contracts, known as Automated Market Makers (AMM), depend on immutable rules written in code. When those rules have a bug, operations are executed exactly as scheduled - even if that means paying tokens that have not been deposited - and the reversal can be impossible if there are no adequate control mechanisms. To understand the model, it is useful to review the technical explanation of AMM, such as the one that publishes projects such as Uniswap.
After taking over the funds, the prosecution claims that Spalletta washed part of the loot through decentralized exchanges and the use of cryptomoneda mixers. Among the platforms that have been historically identified for facilitating asset laundering are Tornado Cash; it is not casual for the United States authorities to have sanctioned this service in 2022 for its use in illicit operations, illustrating the legal risks associated with certain mixing services. The U.S. Treasury's action against Tornado Cash is available on its official note. Here..
The trail of the funds, however, did not completely disappear. Blockchain research tools and specialized forensic companies are developing increasingly precise techniques to follow movements between wallets and close the doors to those who try to hide the proceeds. Researchers and firms in the sector have analysed the traceability of the Uranium case and have shown how, despite the mixing layers, it was possible to link addresses and recover assets, which supported the authorities' action and subsequent seizure.
Some of the money, according to the prosecution, ended up becoming objects of high value collectionism: letters from Magic: The Gathering, sealed packs of old editions, a complete collection of the first edition of Pokémon and even an ancient Roman currency, among other acquisitions. These assets were located and confiscated in February 2025 by a court-authorized search warrant; in addition, approximately $31 million was recovered in cryptomonedas linked to the addresses of the accused.
The legal consequences facing the accused are serious: the charge includes charges for computer fraud - with penalties that can reach 10 years in prison - and charges for money-laundering, which lead to tougher sanctions in the federal criminal system. Beyond individual penalties, the case points out that transactions in lockchain, however decentralized and anonymous they may appear, are not outside the scope of the law or technological research when criminal activities are linked.
This episode is a practical lesson for developers, DeFi projects and users: code security cannot be a secondary task. rigorous audits, automated testing programmes that include controls on critical variables, community reviews, and governance mechanisms prepared to respond to failures are essential to reduce the risk of catastrophic failures. It also recalls that the crisis of confidence that generates attacks of this magnitude affects not only the project concerned but the entire public perception of decentralized finance.

Finally, the case opens up questions about responsibility in open software environments: who answers when the code fails, the auditor, the project team, the users who provided liquidity? The legal response may take time to shape, but practice - and the recent action of the authorities - suggests that those who exploit profit-making vulnerabilities can be prosecuted and prosecuted with the same rigour as in the traditional financial world.
For those who want to deepen official information, the Department of Justice's statement is available Here. and the text of the indictment can be read in this link. For a complementary journalistic and technical view on detention and the case, please consult reports from specialized media such as BleepingComputer and, for context on the risk posed by the mixers, the note from the Treasury Office on Tornado Cash cited above.
The episode is, in short, a reminder that in the world, technology and law are converging: a bug can trigger real losses and anonymity is increasingly relative to advanced forensic techniques and coordinated action by the authorities.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...