{"id":"jonathan-spalletta","title":"Jonathan Spalletta","content":"**Jonathan Spalletta** is a Maryland resident who was indicted in March 2026 in connection with the 2021 exploits of Uranium Finance, a [decentralized cryptocurrency exchange](https://iq.wiki/wiki/decentralized-exchange). He is accused of stealing over $54 million in two separate hacks by exploiting vulnerabilities in the platform's smart contracts. According to federal prosecutors, Spalletta then laundered the stolen funds and used them to purchase millions of dollars in rare collectibles, including high-value trading cards and historical memorabilia. The case is being handled by the U.S. Attorney's Office for the Southern District of New York. [\\[1\\]](#cite-id-J5f47CEju7fixjz1) [\\[2\\]](#cite-id-6WlKHOpHh6kink7j)​\n\n## Background and Indictment\n\nJonathan Spalletta was born circa 1990 and resided in Rockville, Maryland, at the time of his indictment. [\\[1\\]](#cite-id-J5f47CEju7fixjz1) He operated online under several aliases, including \"Cthulhon,\" \"Jspalletta,\" \"Jonny Boy,\" \"Nass,\" and \"SirJonathan.\" [\\[1\\]](#cite-id-J5f47CEju7fixjz1) [\\[3\\]](#cite-id-snv1fCexhR01nXqv)\n\nOn March 30, 2026, an indictment from the Southern District of New York was unsealed, charging Spalletta for his alleged role in the Uranium Finance exploits. He surrendered to authorities on the same day. [\\[1\\]](#cite-id-J5f47CEju7fixjz1) [\\[2\\]](#cite-id-6WlKHOpHh6kink7j) The case was assigned to U.S. District Judge Jed S. Rakoff. [\\[1\\]](#cite-id-J5f47CEju7fixjz1)\n\nSpalletta faces two federal charges:\n\n* One count of computer fraud, which carries a maximum sentence of 10 years in prison.\n* One count of money laundering, which carries a maximum sentence of 20 years in prison.\n\nIf convicted on both counts, he faces a potential total sentence of up to 30 years. [\\[1\\]](#cite-id-J5f47CEju7fixjz1) [\\[2\\]](#cite-id-6WlKHOpHh6kink7j)\n\n## Uranium Finance Exploits\n\nUranium Finance was a [decentralized finance](https://iq.wiki/wiki/defi) (DeFi) project that operated as an [automated market maker](https://iq.wiki/wiki/automated-market-maker) on the [BNB Chain](https://iq.wiki/wiki/binance-smart-chain) (formerly Binance Smart Chain), allowing users to trade cryptocurrencies through liquidity pools. [\\[4\\]](#cite-id-pqeCD07UqurlLHTU) [\\[3\\]](#cite-id-snv1fCexhR01nXqv) Prosecutors allege Spalletta carried out two separate hacks against the platform in April 2021.\n\n### First Exploit (April 2021)\n\nAccording to the indictment, the first hack occurred on or about April 8, 2021. Spalletta allegedly exploited a bug within one of Uranium Finance's smart contracts to fraudulently withdraw \"rewards\" tokens from a [liquidity pool](https://iq.wiki/wiki/liquidity-pool), stealing approximately $1.4 million worth of cryptocurrency. [\\[1\\]](#cite-id-J5f47CEju7fixjz1)​\n\n### Deception Campaign\n\nIn the period surrounding the hacks, Spalletta and alleged co-conspirators are accused of orchestrating a deception campaign to mislead investors and conceal their involvement. They created a public \"War Room\" on the messaging platform Telegram, where they posed as a team dedicated to investigating the incident and recovering the stolen funds. [\\[4\\]](#cite-id-pqeCD07UqurlLHTU)​\n\nAs part of this ruse, they promoted a false narrative that a \"white-hat hacker\" had intervened to secure some of the assets. To lend credibility to this claim, they returned approximately $2 million of the stolen funds to a wallet they controlled but presented to the community as the official developer's wallet. This act was intended to build trust among the victims and create the appearance of a legitimate recovery effort being underway. [\\[4\\]](#cite-id-pqeCD07UqurlLHTU)​\n\n### Second Exploit (April 2021)\n\nOn or about April 28, 2021, Spalletta allegedly executed the second, much larger hack. He exploited a separate, critical error in Uranium Finance's main smart contract that governed [cryptocurrency](https://iq.wiki/wiki/cryptocurrency) withdrawals. This vulnerability allowed an attacker to manipulate the value of input tokens during a swap, enabling them to drain nearly all other assets held in the platform's liquidity pools. [\\[1\\]](#cite-id-J5f47CEju7fixjz1) [\\[4\\]](#cite-id-pqeCD07UqurlLHTU)​\n\nThe attack targeted 26 separate liquidity pools, resulting in the theft of approximately $53.3 million in various cryptocurrencies, including [BNB](https://iq.wiki/wiki/binance-coin) and [BUSD](https://iq.wiki/wiki/binance-peg-busd). The massive theft created a catastrophic loss of funds, forcing the Uranium Finance exchange to cease operations permanently. [\\[1\\]](#cite-id-J5f47CEju7fixjz1) [\\[2\\]](#cite-id-6WlKHOpHh6kink7j)​\n\n## Money Laundering and Asset Purchases\n\nFollowing the hacks, Spalletta is accused of engaging in a sophisticated scheme to launder the stolen cryptocurrency, of which he allegedly received at least $11 million personally. [\\[3\\]](#cite-id-snv1fCexhR01nXqv)​\n\nThe laundering process allegedly involved using [Tornado Cash](https://iq.wiki/wiki/tornado-cash), a [cryptocurrency](https://iq.wiki/wiki/cryptocurrency) mixing service designed to obscure the on-chain trail of transactions. The stolen BNB and BUSD tokens were swapped for [Ethereum](https://iq.wiki/wiki/ethereum) (ETH), which was then converted into [Monero](https://iq.wiki/wiki/monero) (XMR), a privacy-enhancing cryptocurrency, to further conceal the funds' origins. [\\[1\\]](#cite-id-J5f47CEju7fixjz1) [\\[3\\]](#cite-id-snv1fCexhR01nXqv)​\n\nThe laundered proceeds were then allegedly used to acquire a collection of high-value and rare items:\n\n* **Magic: The Gathering Cards:** A \"Black Lotus\" card purchased for approximately 1,512,500.\n* **Pokémon Cards:** A sealed box of first-edition \"Booster\" cards for approximately 750,000.\n* **Antiquities and Memorabilia:** An \"Eid Mar Denarius,\" an antique Roman coin commemorating the assassination of Julius Caesar, for 137,500.\n\nThese specific purchases and their values were detailed in the Department of Justice's indictment materials. [\\[1\\]](#cite-id-J5f47CEju7fixjz1) [\\[2\\]](#cite-id-6WlKHOpHh6kink7j)​\n\n## Investigation and Asset Seizure\n\nThe investigation into the Uranium Finance hacks was conducted by the Federal Bureau of Investigation (FBI) and the Internal Revenue Service, Criminal Investigation (IRS-CI). [\\[3\\]](#cite-id-snv1fCexhR01nXqv) On February 24, 2025, U.S. law enforcement seized cryptocurrency linked to the hacks, which was valued at approximately $31 million at the time of the seizure. [\\[1\\]](#cite-id-J5f47CEju7fixjz1) [\\[2\\]](#cite-id-6WlKHOpHh6kink7j)​\n\nIn addition to the [cryptocurrency](https://iq.wiki/wiki/cryptocurrency), authorities executed a search warrant at Spalletta's residence and seized numerous physical assets believed to have been purchased with the stolen funds. These seized items included the \"Black Lotus\" trading card, antique coins, and other collectibles. [\\[1\\]](#cite-id-J5f47CEju7fixjz1)​\n\n## Official Statements\n\nUpon the unsealing of the indictment, U.S. Attorney for the Southern District of New York, Damian Williams, stated: \"As alleged, Jonathan Spalletta repeatedly hacked smart contracts to steal millions of dollars worth of other people’s money for himself, and destroyed a cryptocurrency exchange in the process. Spalletta was allegedly able to do so by exploiting bugs in the exchange’s computer code. But he was not able to hide the fruits of his fraud. We will continue to unravel complex cybercrimes and hold fraudsters accountable, no matter how sophisticated the scheme.\" [\\[1\\]](#cite-id-J5f47CEju7fixjz1)\n\nFBI Assistant Director in Charge James Smith commented on the FBI's commitment to pursuing such cases: \"Bad actors in the cryptocurrency space are on notice that the FBI is committed to identifying and apprehending them regardless of their use of sophisticated trading techniques.\" [\\[3\\]](#cite-id-snv1fCexhR01nXqv)\n\nThomas M. Fattorusso, the Special Agent in Charge of the New York Field Office of the IRS-CI, added: \"Spalletta's alleged actions to exploit the code of Uranium Finance is a new-age, high-tech spin on fraud... IRS Criminal Investigation will continue to lend our cyber and financial investigative expertise to cases like this one to ensure those who look for illicit profits from the digital world are brought to justice.\" [\\[4\\]](#cite-id-pqeCD07UqurlLHTU)","summary":"Jonathan Spalletta is a Maryland resident indicted in March 2026 for his alleged role in the 2021 hacks of the DeFi exchange Uranium Finance, from which over $50 million was stolen and laundered through services like Tornado Cash.","images":[{"id":"QmbAXbQgZHU8Y5aXUVbQfaChDMBN7sfAvK2CXrkvuYFhtG","type":"image/jpeg, image/png"}],"categories":[{"id":"people","title":"people"}],"tags":[{"id":"PeopleInDeFi"}],"media":[],"metadata":[{"id":"references","value":"[\n {\n \"id\": \"J5f47CEju7fixjz1\",\n \"url\": \"https://www.justice.gov/usao-sdny/pr/maryland-man-charged-defrauding-crypto-exchange-over-50-million-hacks?bm-verify=AAQAAAAN\\\\_\\\\_\\\\_\\\\_\\\\_81ICohjIbSvGxiTS32wmoBghRmtQo82nrMi1\\\\_ut2Okl5nl3LauRl\\\\_suB3nG3fxmSCI8JoT7ndWB\\\\_7uzpkXNpP0XYZl12agRvPBK98K-pXiG9K\\\\_s15Q9dvafpP346A51984qjfqgP7NQJb3bZoxgZxroPRtMKVPvyzwj0JG3lmUMayIDmvD9s0ZonglosvxTzcl689NO0jty7XbCieu8rLVFg5wHKX6mCyouW0sC5yN282Cq9WBbflaN7lQt2J8BpNP\\\\_nvWJlebD0FyLrc9GIXkGiDB34h2EwFej18DaEnVtv\\\\_Quf1rGpDS3jRKQwBRGv9l1MNaV7YlfsuNCrZflRo\\\\_7gn8GVX-vGC1Vfn0aeFQITbCSeriIqEccMY3l\\\\_8X1EOk\",\n \"description\": \"Maryland Man Charged With Defrauding Crypto Exchange\",\n \"timestamp\": 1774904030044\n },\n {\n \"id\": \"6WlKHOpHh6kink7j\",\n \"url\": \"https://www.theblock.co/post/395766/maryland-man-charged-54-million-uranium-finance-hacks-faces-30-years\",\n \"description\": \"Maryland man charged in $54 million Uranium Finance hacks faces 30 years\",\n \"timestamp\": 1774904030044\n },\n {\n \"id\": \"snv1fCexhR01nXqv\",\n \"url\": \"https://www.ainvest.com/news/uranium-finance-hack-54m-outflow-31m-recovery-11m-laundering-2603/\",\n \"description\": \"Uranium Finance Hack: $54M Outflow\",\n \"timestamp\": 1774904030044\n },\n {\n \"id\": \"pqeCD07UqurlLHTU\",\n \"url\": \"https://www.binance.com/en/square/post/03-30-2026-federal-indictment-jonathan-spalletta-charged-in-uranium-finance-hacks-307246349193041\",\n \"description\": \"Binance Square post on Spalletta indictment\",\n \"timestamp\": 1774904030044\n }\n]"},{"id":"previous_cid","value":"\"https://ipfs.everipedia.org/ipfs/QmZbQxGCY5fzmy5UE7D6an7qqCRFqPSqcdcZcf69CpqBaB\""},{"id":"commit-message","value":"\"Removed Jonathan Spalletta page\""},{"id":"previous_cid","value":"QmZbQxGCY5fzmy5UE7D6an7qqCRFqPSqcdcZcf69CpqBaB"}],"events":[{"id":"245dec5d-4730-4b8e-9a44-1f88e0120668","date":"2021-04","title":"First Uranium Finance Hack","type":"DEFAULT","description":"Allegedly exploited a bug in a smart contract to steal approximately $1.4 million and extorted a 'bug bounty' from the project.","link":null,"multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null},{"id":"904344b1-85e5-4178-b064-7017cabad4e3","date":"2021-04","title":"Second Uranium Finance Hack","type":"DEFAULT","description":"Allegedly exploited a critical error in Uranium Finance's main smart contract, stealing approximately $53.3 million and causing the exchange to shut down.","link":null,"multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null},{"id":"bf98be2c-c1d7-47c6-bdf3-6e3ba7f32750","date":"2025-02","title":"Cryptocurrency Seizure by Authorities","type":"DEFAULT","description":"U.S. law enforcement seized cryptocurrency linked to the hacks, valued at approximately $31 million at the time of seizure.","link":null,"multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null},{"id":"93efc583-7c0b-4680-ba03-da78e47f6282","date":"2026-03","title":"Indicted by Southern District of New York","type":"DEFAULT","description":"Indicted on charges of computer fraud and money laundering in connection with the Uranium Finance hacks and surrendered to authorities.","link":null,"multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null}],"user":{"id":"0x8af7a19a26d8fbc48defb35aefb15ec8c407f889"},"author":{"id":"0x8af7a19a26d8fbc48defb35aefb15ec8c407f889"},"operator":{"id":"0x1E23b34d3106F0C1c74D17f2Cd0F65cdb039b138"},"language":"en","version":1,"linkedWikis":{"blockchains":[],"founders":[],"speakers":[]},"recentActivity":"{\"items\":[{\"id\":\"6a2d351c-ccc7-46d1-8d4a-2df814450317\",\"title\":\"Jonathan Spalletta\",\"description\":\"Jonathan Spalletta is a Maryland resident indicted in March 2026 for his alleged role in the 2021 hacks of the DeFi exchange Uranium Finance, from which over $50 million was stolen and laundered through services like Tornado Cash.\",\"timestamp\":\"2026-03-30T21:18:39.168Z\",\"category\":\"people\",\"status\":{\"icon\":\"RiGlobalLine\",\"label\":\"Wiki Updated\",\"iconClassName\":\"text-green-500\"},\"user\":{\"name\":\"0x8af7a19a26d8fbc48defb35aefb15ec8c407f889\",\"address\":\"0x1E23b34d3106F0C1c74D17f2Cd0F65cdb039b138\"},\"button\":{\"label\":\"View Summary\",\"icon\":\"RiFileTextLine\"},\"summarySections\":[{\"title\":\"Content\",\"subtitle\":\"Updated content with new internal links, revised text, and removal of a section.\",\"variant\":\"modified\",\"changeCount\":9,\"changes\":[\"In the introduction, added a link to 'decentralized cryptocurrency exchange'.\",\"In the 'Uranium Finance Exploits' section, added links for 'decentralized finance' and 'automated market maker'.\",\"Renamed the 'First Exploit and Extortion (April 2021)' subsection to 'First Exploit (April 2021)'.\",\"In the 'First Exploit (April 2021)' subsection, added a link to 'liquidity pool'.\",\"Removed a paragraph detailing an alleged extortion attempt following the first exploit. [[\\\\[1\\\\]]](#cite-id-J5f47CEju7fixjz1) [[\\\\[2\\\\]]](#cite-id-6WlKHOpHh6kink7j)\",\"In the 'Second Exploit (April 2021)' subsection, added links for 'cryptocurrency', 'BNB', and 'BUSD'.\",\"In the 'Money Laundering and Asset Purchases' section, added links for 'cryptocurrency' and 'Monero'.\",\"In the 'Money Laundering and Asset Purchases' section, revised the details and values of purchased collectibles. [[\\\\[1\\\\]]](#cite-id-J5f47CEju7fixjz1) [[\\\\[2\\\\]]](#cite-id-6WlKHOpHh6kink7j)\",\"In the 'Investigation and Asset Seizure' section, added a link to 'cryptocurrency'.\"]},{\"title\":\"Categories\",\"subtitle\":\"Removed a category from the wiki.\",\"variant\":\"removed\",\"changeCount\":1,\"changes\":[\"Removed category 'Regulations'\"]}]}]}"}