
The Uranium Finance hack is back in federal court. The U.S. Attorney’s Office for the Southern District of New York said Jonathan Spalletta, a 36-year-old Maryland man known online as “Cthulhon” and “Jspalletta,” has been charged over two April 2021 exploits that drained more than $54 million from the decentralized exchange and later moved part of the proceeds through Tornado Cash. The case matters now because it turns one of DeFi’s early bull-market heists into a named criminal prosecution, with prosecutors framing the conduct as computer fraud, extortion disguised as a bug bounty, and money laundering.
The indictment treats smart contract exploitation as straight fraud
The federal theory in this case is blunt. Prosecutors are not describing the Uranium exploits as a gray-zone dispute over code-is-law norms, nor are they treating the incident as a failed bounty negotiation that spiraled out of control. In the indictment and matching DOJ press release the government says Spalletta orchestrated two hacks in April 2021, knowingly extracted funds he was not entitled to receive, and then tried to hide the proceeds through a long laundering chain. That framing matters because it puts federal prosecutors on familiar terrain. They do not need a court to settle philosophical arguments about decentralized systems if they can show deceptive transactions, intent, and concealment.
That is a useful signal for DeFi operators who still speak about exploiters as if they sit in a separate category from ordinary fraud defendants. When prosecutors can point to transaction design, written admissions, laundering activity, and post-hack spending, the crypto wrapper starts to matter less. The court record says the first attack yielded about $1.4 million, the second about $53.3 million, and the exchange shut down after the larger drain. That sequence gives the government a clean narrative arc: unlawful access, extraction, concealment, conversion into personal assets. For anyone following Crypto Newswire, this is the latest reminder that major DeFi exploit cases are aging out of the mystery-wallet phase and into conventional criminal process.
The sham bug bounty story may become the most damaging fact pattern
The first Uranium incident was smaller in dollar terms, but it may carry outsized weight because of what happened after the drain. According to the indictment, prosecutors say Spalletta exploited a reward-accounting flaw on April 8, 2021, extracted roughly $1.4 million, then cut a deal under which he returned most of the funds while keeping about $386,000 that Uranium agreed to describe as a bug bounty. The government’s position is that this was not a white-hat settlement. It was extortion after the theft, followed by an attempt to rebrand the retained proceeds as legitimate compensation.
That distinction cuts deeper than this one case. DeFi has spent years relying on private Telegram negotiations, public wallet messages, and ad hoc bounty offers to recover funds after a breach. Sometimes those negotiations save users money. Sometimes they create a record that makes the attacker look less like a security researcher and more like a thief dictating terms. The DOJ seems eager to draw that line here. The press release quotes a message attributed to Spalletta saying, “Crypto is all fake internet money anyway,” which prosecutors will likely use to attack any later attempt to cast the episode as good-faith disclosure. Teams that follow Web3 Fraud Files coverage will read this closely, because it suggests that once a party drains funds first and negotiates later, federal authorities may view the bug bounty label as window dressing rather than mitigation.
The April 28 exploit exposed how thin code tolerances can destroy a venue
The second attack, on April 28, 2021, is where the case widens from an individual indictment into a reminder about protocol design discipline. The court filing says Uranium’s smart contract used the number 1,000 where it should have used 10,000 in a permission check tied to withdrawals, which let the attacker request far more than he knew he was entitled to receive. Prosecutors describe one example where a near-zero deposit was used to request roughly 88% of a pool’s U92 and about 90% of its BUSD. They say similar transactions hit 26 separate liquidity pools and pulled out about $53.3 million, which was the overwhelming majority of the venue’s crypto.
This is why Uranium still matters years after it vanished. The exploit was not a complex nation-state intrusion or a cross-chain logic bomb. It was a parameter error inside code governing value transfer. In DeFi, those mistakes are fatal because capital sits directly behind them. Once a venue is live, a flawed arithmetic assumption is not a back-office issue. It is the business. That is also why the indictment carries weight beyond the defendant. It freezes one of the sector’s recurring weaknesses in legal language: copied code, lightly modified logic, launch pressure, and incomplete threat modeling. Readers who spend time in Web3 Builder reporting will recognize the pattern. Mature crypto infrastructure now rises or falls on how precisely teams reason about tiny contract changes before real money arrives.
The laundering trail shows why old DeFi cases do not stay cold
One of the strongest signals in the filing is temporal. The hacks happened in April 2021. The government says law enforcement seized about $31 million in crypto on February 24, 2025. Charges were then unsealed in March 2026. That timeline tells the market two things. First, investigators are willing to keep working a DeFi case for years if the amounts justify the effort. Second, moving funds across chains and through privacy tools may delay attribution, but it does not end the inquiry. The indictment says Spalletta moved funds through multiple blockchains and sent about $386,000 from the first attack and about $26 million from the second through Tornado Cash. Treasury’s 2022 sanctions announcement on Tornado Cash had already cemented the mixer’s position in U.S. enforcement thinking as a laundering venue tied to cybercrime proceeds.
The seizure piece matters just as much. A 2025 CoinDesk report and a matching The Block report put a public timestamp on the recovery before prosecutors named a defendant. That sequencing suggests a familiar enforcement pattern: trace first, seize what can be reached, then move on identity and charging once the attribution record is strong enough. For DeFi builders and traders, that is a sharper warning than any headline sentence. Blockchain investigations do not need to move fast to be effective. They need to be patient, cumulative, and backed by access to exchanges, custodians, chain analytics, and search warrants.
Personal spending turned the stolen crypto into a physical evidence trail
Crypto crime stories often stop at the wallet layer, but this case shows where prosecutors like to end them: in the defendant’s house. The DOJ says Spalletta used the alleged proceeds to buy personal collectible items, including a Black Lotus Magic card for roughly $500,000, 18 sealed Alpha Booster packs for about $1.5 million, a first-edition Pokémon base set for about $750,000, an “Eid Mar Denarius” Roman coin for more than $600,000, and even a piece of fabric from the Wright brothers’ plane that later traveled to the moon with Neil Armstrong. The press release says several items were seized from his residence under a judicially authorized search warrant.
That matters because it strips away a common illusion in crypto circles: that once proceeds leave the original wallet cluster, the evidentiary story becomes abstract. In practice, converting digital theft into rare, high-value collectibles can help prosecutors tell a jury where the money went and why the conduct was motivated by personal enrichment. Physical goods also give law enforcement something to photograph, seize, value, and present as tangible fruits of the alleged offense. In a courtroom, that is powerful. It turns chain analysis into objects the jury can see. It also undercuts any defense story built around experimentation, protocol friction, or accidental over-withdrawal. People do not accidentally buy museum-grade trading cards and ancient coins with mixed funds. As more old exploit cases ripen into prosecutions, the market will keep watching Web3 Fraud Files for the same pattern: chain obfuscation may slow the case, but the spending trail often makes the story legible again.
The next meaningful stage will come through discovery and motion practice, where the government will have to show how it linked years of wallet activity, seized assets, and private communications to a single operator with enough precision to survive defense challenges. DeFi teams should pay close attention, because the record built in this case is likely to shape how future projects handle exploit negotiations, bounty language, mixer exposure, and evidence preservation the moment funds move.
This article is for informational purposes only and does not constitute financial or investment advice.
Reference Desk
Sources & References
Berat Oshily has spent the last ten years deep in the weeds of crypto security not from the sidelines, but hands-on, working contracts, breaking systems, and figuring out exactly where things go wrong. Based in Birmingham, he focuses on Web3 fraud: the scams, the exploits, the rug pulls, and the smart contract vulnerabilities that cost real people real money. He knows how attackers think because he has spent years testing the same systems they target. Beyond the technical work, Berat has a knack for making complicated on-chain fraud understandable whether he's talking to security professionals or someone who just lost funds to a phishing link. You'll often find him at blockchain conferences across the UK and Europe, sharing what he knows.
Continue Reading
Related Articles
Additional reporting and adjacent stories connected to this topic.
Yesterday
Resolv Infinite Mint Exposed the Soft Underbelly of Stablecoin Issuance
Resolv’s infinite mint exploit exposed how a compromised service role and weak issuance controls can turn a stablecoin backend into a balance-sheet failure.

Yesterday
Drift Protocol Hack Exposes Governance Risk in Solana Durable Nonce Workflows
Drift Protocol’s $285 million exploit exposed how durable nonce workflows, weak signer review, and zero-delay governance can turn admin control into a balance-sheet event.

Yesterday
Drift Beckons North Korea-Linked Hackers After $285M Exploit
Drift Protocol’s response to its $285 million exploit has shifted on-chain as the project publicly beckons wallets tied to the attack while forensic scrutiny intensifies.



