According to reporting from PANews, an individual known as Lick has been directly connected to one of the most significant cryptocurrency theft cases on record. The incident centers on the unlawful transfer of over $90 million that originated from a U.S. government-seized address. Beyond this single major heist, Lick appears to be linked to a series of thefts perpetrated against multiple unnamed victims throughout late 2025, specifically spanning the November and December timeframe.
The Scale of Lick’s Alleged Operations
The scope of this case is considerable, with investigations revealing patterns of coordinated theft activity rather than isolated incidents. The $90 million figure represents the primary target, though the involvement of numerous additional victims suggests a more extensive operation. Each theft followed similar methodologies, indicating a systematic approach to fund acquisition and concealment.
Moving Stolen Assets Through Tornado Cash
Surveillance data has tracked the movement of stolen funds through privacy-focused protocols. Specifically, monitoring teams observed that Lick has been routing assets into Tornado Cash, a widely-used mixing service that obscures transaction trails. To date, approximately 11,037 ETH has been transferred through this mixing service, demonstrating a clear attempt to fragment and anonymize the stolen cryptocurrency. This pattern of fund movement provides crucial evidence in establishing the connection between the theft activities and subsequent laundering efforts through privacy mixers.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Lick Connected to Major $90 Million Theft Case from Government-Seized Funds
According to reporting from PANews, an individual known as Lick has been directly connected to one of the most significant cryptocurrency theft cases on record. The incident centers on the unlawful transfer of over $90 million that originated from a U.S. government-seized address. Beyond this single major heist, Lick appears to be linked to a series of thefts perpetrated against multiple unnamed victims throughout late 2025, specifically spanning the November and December timeframe.
The Scale of Lick’s Alleged Operations
The scope of this case is considerable, with investigations revealing patterns of coordinated theft activity rather than isolated incidents. The $90 million figure represents the primary target, though the involvement of numerous additional victims suggests a more extensive operation. Each theft followed similar methodologies, indicating a systematic approach to fund acquisition and concealment.
Moving Stolen Assets Through Tornado Cash
Surveillance data has tracked the movement of stolen funds through privacy-focused protocols. Specifically, monitoring teams observed that Lick has been routing assets into Tornado Cash, a widely-used mixing service that obscures transaction trails. To date, approximately 11,037 ETH has been transferred through this mixing service, demonstrating a clear attempt to fragment and anonymize the stolen cryptocurrency. This pattern of fund movement provides crucial evidence in establishing the connection between the theft activities and subsequent laundering efforts through privacy mixers.