Privacy-focused crypto protocol Umbra has moved its hosted frontend into maintenance mode after detecting that funds linked to recent high-profile hacks passed through its system. The decision came after the team identified approximately 349 ETH, valued at about $800,000, connected to stolen assets.
Umbra confirmed the update in a public post on X, where it addressed speculation around the scale of activity. The team stated that reports of significantly higher volumes were inaccurate and clarified the exact amount observed onchain.
As has been reported, Umbra was used to move funds associated with recent, high profile hacks. In total, we are aware of 349 ETH (~$800K) of stolen funds moving through the protocol. Reports of much higher amounts are inaccurate. A few notes:
— Umbra (@UmbraCash) April 21, 2026
First, as a stealth address system,…
Team limits hosted access while investigations continue
The protocol’s developers said the change targets their own hosted interface, not the underlying system. Smart contracts remain active and accessible onchain, which reflects the permissionless structure of the protocol.
Umbra explained the timing of the move in its statement:
“We did, however, make the decision to move our hosted version of the frontend into maintenance mode. We did so this morning at 6:45 AM ET.”
The team linked the decision to ongoing recovery efforts tied to recent exploits. It stated that access will return once there is confidence that the interface will not interfere with tracking or recovery work.
This approach reflects a limited form of intervention. The project cannot prevent users from interacting with the protocol through alternative routes. Umbra acknowledged that users can still rely on self-hosted or locally deployed versions of the interface, since the code remains open source.
“There is nothing we can do to stop anyone from using these contracts, nor is there anything we can do to stop anyone from using a local or self hosted version of the Umbra frontend,” the team said.
Design limits appeal for laundering activity
Umbra pushed back on claims that its system provides effective cover for illicit transfers. The protocol uses stealth addresses, which obscure the recipient rather than the origin of funds.
This distinction matters in cases tied to stolen assets. Attackers often attempt to sever links between funds and compromised wallets. Umbra argued that its design does not support that goal.
In its statement, the team said:
“All the stolen funds moved through the protocol can be identified, and we have been in touch with security researchers who are involved.”
The team added that funds stored in stealth addresses remained secure at all times. It said no user funds faced risk during the incident.
Links to recent exploit activity
The disclosure came days after a major exploit tied to Kelp, where more than $280 million in crypto assets were drained. Reports connected parts of that activity to tools that attempted to move assets across networks, including flows that touched Umbra.
Investigators have associated the Kelp exploit with North Korea’s Lazarus Group, a sanctioned entity that has been linked to several high-value crypto attacks. The group often uses complex transaction paths across multiple protocols to obscure fund movements.
Umbra’s data suggests that only a small portion of those funds moved through its contracts. The team stressed that all such transfers remain traceable onchain.
Legal debate resurfaces over frontend control
The decision to restrict frontend access triggered renewed debate over how authorities interpret control in decentralized systems. Roman Storm, co-founder of Tornado Cash, responded publicly and questioned whether such steps would carry legal weight.
Storm referenced his own case and the arguments made by prosecutors:
“Prosecutors in my case called me a liar when I said that I can’t control Tornado Cash.”
He argued that authorities often treat interface changes as evidence of broader control over a protocol. He added:
“If you can make changes to the user interface, including further updates through new builds on IPFS, then you are in full control.”
Storm also criticized that interpretation, stating:
“SDNY really loves pretending that changing a front end is the same thing as controlling an entire protocol. I used to think we lived in a sane world.”
His comments highlight a central tension in crypto enforcement. Developers maintain that open-source smart contracts operate independently once deployed. Regulators often examine any point of influence, including hosted interfaces.
Broader pressure on DeFi responses
Umbra’s move came amid heightened scrutiny across decentralized finance following multiple incidents. In a separate case, Volo Protocol reported a $3.5 million exploit and froze affected vaults to contain losses.
These responses show how projects react under pressure when stolen funds move through interconnected systems. Teams often rely on partial measures, such as interface restrictions or asset freezes, even when they lack full control over protocol activity.
Umbra framed its decision as a temporary step. The team emphasized that the protocol itself continues to function as designed, while its hosted access point remains offline.
The situation underscores the limits of intervention in decentralized infrastructure. It also shows how teams attempt to cooperate with investigators without compromising the underlying architecture.

Disclaimer: All materials on this site are for informational purposes only. None of the material should be interpreted as investment advice. Please note that, despite the nature of much of the material created and hosted on this website, HODL FM operates as a media and informational platform, not a provider of financial advisory services. The opinions of authors and other contributors are their own and should not be taken as financial advice. If you require advice, HODL FM strongly recommends contacting a qualified industry professional.





