Bitcoin exchange CEO arrested for money laundering

Bitcoin exchange CEO arrested for money laundering

submitted by democrutis to news [link] [comments]

Bitcoin exchange CEO arrested for money laundering

submitted by vedder10 to worldnews [link] [comments]

Bitcoin exchange CEO arrested for money laundering

Bitcoin exchange CEO arrested for money laundering submitted by fraggle212 to Bitcoin [link] [comments]

Bitcoin exchange CEO arrested for money laundering

submitted by MfDoomz to news [link] [comments]

Bitcoin exchange CEO arrested for money laundering

submitted by praveenemmanuel to news [link] [comments]

Bitcoin exchange CEO arrested for money laundering

Bitcoin exchange CEO arrested for money laundering submitted by cowboyhaze to Bitcoin [link] [comments]

Bitcoin exchange CEO arrested for money laundering

submitted by hollywoodhank to news [link] [comments]

Bitcoin exchange CEO arrested for money laundering

Bitcoin exchange CEO arrested for money laundering submitted by ModerationLog to ModerationLog [link] [comments]

Romania: Bitcoin Exchange CEO Vlad Nistor Arrested for Money Laundering, May Face US Extradition

Romania: Bitcoin Exchange CEO Vlad Nistor Arrested for Money Laundering, May Face US Extradition submitted by Ranzware to BitNewsLive [link] [comments]

Romania: Bitcoin Exchange CEO Vlad Nistor Arrested for Money Laundering, May Face US Extradition

Romania: Bitcoin Exchange CEO Vlad Nistor Arrested for Money Laundering, May Face US Extradition submitted by cryptoallbot to cryptoall [link] [comments]

Romania: Bitcoin Exchange CEO Vlad Nistor Arrested for Money Laundering, May Face US Extradition

Romania: Bitcoin Exchange CEO Vlad Nistor Arrested for Money Laundering, May Face US Extradition submitted by ulros to fbitcoin [link] [comments]

Romania: Bitcoin Exchange CEO Vlad Nistor Arrested for Money Laundering, May Face US Extradition

Romania: Bitcoin Exchange CEO Vlad Nistor Arrested for Money Laundering, May Face US Extradition submitted by n4bb to CoinPath [link] [comments]

BREAKING: CEO of #Bitcoin exchange arrested for money laundering

BREAKING: CEO of #Bitcoin exchange arrested for money laundering submitted by CaptainDogeSparrow to dogecoin [link] [comments]

Romania: Bitcoin Exchange CEO Vlad Nistor Arrested for Money Laundering, May Face US Extradition

Romania: Bitcoin Exchange CEO Vlad Nistor Arrested for Money Laundering, May Face US Extradition submitted by Ranzware to BitNewsLive [link] [comments]

CEO of Bitcoin Exchange Arrested for Laundering Silk Road Money

CEO of Bitcoin Exchange Arrested for Laundering Silk Road Money submitted by furiouslamb to Drugs [link] [comments]

[Business Insider] CEO OF BITCOIN EXCHANGE ARRESTED FOR MONEY LAUNDERING

[Business Insider] CEO OF BITCOIN EXCHANGE ARRESTED FOR MONEY LAUNDERING submitted by HiroJa to DogeNews [link] [comments]

CEO of Bitcoin exchange "BitInstant" arrested for money laundering in relation to Silk Road drug trafficking.

CEO of Bitcoin exchange submitted by john2kxx to Libertarian [link] [comments]

Round up of Cryptocurrency News #7 Week 17/08 - 23/08

Heya everyone! Its been a little while, I'm still trying to get back into the groove of writing. Sorry about post#6, there will be a catch-up posted soon.
 
So... onto News recap #7! What have seen happen? First of all we have seen a pump from a bunch of altcoins: OMG, Cosmos, IOTA, NEO, THETA, ARAGON, SiaCoin, Golem, Swipe. As Ethereum fees remain high Omisego pumped over 130% in one day. It has now pulled back, watch the volume for further movement. Something interesting to me is a lot of these are projects from 2017.
 
Link appears to have broken its bullish market structure, dumping 23% in 48 hours. Be careful. IOTA is pushing its boundaries as its chrysalis mainnet goes live inching closer to complete decentralisation! https://cryptopotato.com/iotas-chrysalis-goes-live-on-mainnet/
 
Ethereum 2.0 upgrade is harder than first appeared, Vitalik says it will take much longer as they have a governance issue for the new blockchain.
 
Bitcoin and Ethereum have had slight adjustments in price potentially tightening up for another move (Hold above $11700 please!) Fingers crossed it is in the upward direction. They are currently in the red over the past few days however don't let that fool you as they are both up over 20% over the last 30 days. Also there was much excitement as Bitcoin rallied over 12K but was quickly beaten down back under. We can now be clear this is a resistance level and possibly a soon to be support level as the price has been steadily pushing back upwards toward 12k. In spite of this most crypto influencers are bearish and expecting a pull back.
 
News for the week: More awareness of cryptocurrency and purchasing by institutional traders, but do they have the iron hands to play the crypto market? We will have to wait and see, as for Dave Portnoy (who cares), he entered and left within a week. Blames Chainlink and Orchid as Chainlink dumps 20% on him in a day. "Ive bought the top many times" Portnoy doesn't understand the principles of the market as he also appears to think pump and dumps are encouraged within the cryptosphere. I'd keep an eye on him if he tries to push a cryptocurrency onto anyone.
 
Outside of the meme news, "Bitcoins perception is changing over time, its image as a money-laundering vehicle has subsided, with investors now taking a much keener interest in it. News story counts of potential money laundering were much more prevalent in 2013-14 but have since subsided, while counts of Bitcoin as an investment have become more of a focus."
 
Bitcoin's hashrate reaches record high of 130 exahash per second (EH/s). This is especially important after bitcoins halving, as miners have had to switch off and upgrade from old inefficient mining rigs, because when miners commit more computing power to process BTC transactions it helps to strengthen the network and secure it against 51% attacks!
 
Warren Buffet changes his mind on Gold, will Bitcoin be next on his mind? Buffetts company reveals it has dumped bank stocks (such as JP Morgan, Goldman Sachs) and taken a position in a gold miner. This could also be a cheeky indicator something is a bit fishy within the current US financial system and Buffett is looking to retain his wealth for rockier times to come.
 
Thanks for reading, this week it is very Bitcoin heavy as I am thinking a move is on the way for the top performing cryptocurrencies. Below I would recommend reading the important links and CBDC links. It shouldnt be more than 30 mins, and most of them you can skim through :)
 
DISCORD LINK: https://discord.gg/zxXXyuJ 🍕 Bring some virtual pizza to share 🍕 Come have a chat, stimulate a discussion, ask a question or share some knowledge. We are all friendly crypto enthusiasts up for a chat, supportive and want to help each other with knowledge and investments! Big thanks to our Telegram and My Crypto HQ for the constant news updates! The Gravychain Collective: https://t.me/gravychain My Crypto HQ: https://t.me/My_Crypto_HQ
Important Links:
More links:
Central Bank Digital Currencies (CBDC):
Bitcoin Adoption + cryptocurrency engagment:
submitted by IOTAbesomewhere to Gravychain [link] [comments]

Cyber Crime - Cashaa NEO Bank Reports 337 BTC Hack, Indian Cyber Crime Team Investigating the Matter

Recently reported by India’s crypto news publication, CoinCrunchIndia, a major crypto NEO Bank, Cashaa has lost 337 BTC. It says that the Crime Branch of Delhi, a state of India is currently investigating the matter.
Cashaa is essentially a UK based crypto-friendly NEO bank, offering financial services to the crypto industry. In its latest hiring application for the PR manager, Cashaa claimed that the firm is growing more than 200% month by month. However, the platform has significant traffic from India and offers crypto services to Indian crypto enthusiasts.
As per details shared by CoinCrunchIndia, the attack was found on Friday (July 10) afternoon at around 1:23 pm (IST). While most exchanges use ‘multi-sig wallet’ as the higher level of security for funds stored in exchanges, Cashaa appeared to be using a ‘blockchain.com' wallet to store and send BTC. The first copy of the complaint shared by report reads the message from Cashaa’s employee as follows;
AT 1:23 PM, I logged into my Bitcoin.info wallet and made two transfers at 1:23 PM and 1:26 PM, at the same time multiple more transferrers happened to 'Receiver's address', emptying my wallet. It seems that the hacker got the notification as soon as I logged into my wallet, and stole the funds from him. today more than 336 Bitcoin is sent to the hacker address, affecting more people.
These BTCs were transferred to this BTC wallet address “14RYUUaMW1shoxCav4znEh64xnTtL3a2Ek” as per the records on ‘Blockchain explorer” and reports shared by CoinCrunchIndia.
Cashaa didn’t officially comment on the hack, however, it says that the company is ‘still investigating the damage caused by the incident’. It is believed that Cashaa ‘might suspend all deposits and withdrawals for 24 hours”.
In addition, Indian crypto exchanges and trading platforms are ready to work with Cashaa in resolving the issue. As such, Bitbns exchange ensured that they have marked the address, CoinDCX and WazirX also added that they will work closely with the Cashaa team ‘to support in whatever way they can’.
On the other side, an anonymous user on Twitter ‘United Crypto Exchange’ speculates that the hacker is trying to use 7BTC each, using blockchain and bitpie wallet, and then selling in mostly to Huobi. That being said, Kumar Gaurav, CEO at Cashaa blames at exchanges that hackers usually transfer stolen funds. Without specifically pointing at the matter and naming the exchange, Kumar Gaurav added;
“Everyone working in the crypto industry has to work very hard to bring the same level of security which currently an average person has when dealing with a bank account. As of today, hackers are very confident to hack crypto addresses and move it through exchanges that are facilitating such laundering through their systems. Exchanges like these must be shut down and owners of these exchanges should be charged with money laundering facilitation crime.”
Given the popularity of cryptocurrency and bitcoin, scams and hacks are on top bulletins quite often. In fact, we recently reported that India’s Kerala state-reported major scam in which the local police arrested the group of goons that kidnapped the mastermind behind a ‘bitcoin-related fraud scheme’.
Conclusively, Cashaa in our recent research report about demographics of Indian crypto users unveiled that they have a massive young audience between the age of '18-35.
Since Cashaa is yet to reveal the details about the incident, stay tuned with Bit2Buzz for the development of this 337 BTC hack.
submitted by Bit2buzz to CryptoCurrencies [link] [comments]

The biggest cryptocurrency thefts in the last 10 years

In this article, we will try to remember all the major theft of cryptocurrencies over the past 10 years.
1. Bitstamp $5.3 mln (BTC), January 4th, 2015
On January 4, 2015, the operational hot wallet of Bitstamp announced that it was hacked by an anonymous hacker and 19,000 Bitcoins (worth of $5 million) were lost.
The initiation of the attack fell on November 4, 2014. Then Damian Merlak, the CTO of the exchange, was offered free tickets to punk rock festival Punk Rock Holiday 2015 via Skype, knowing that Merlak is interested in such music and he plays in the band. To receive the tickets, he was asked to fill out a participant questionnaire by sending a file named “Punk Rock Holiday 2015 TICKET Form1.doc”. This file contained the VBA script. By opening the file, he downloaded the malware on his computer. Although Merlak did not suspect wrong and has opened the "application form", to any critical consequences, this did not open access to the funds of exchange.
The attackers, however, did not give up. The attack continued for five weeks, during which hackers presented themselves as journalists, then headhunters.
Finally, the attackers were lucky. On December 11, 2014, the infected word document was opened on his machine by Bitstamp system administrator Luka Kodric, who had access to the exchange wallet. The file came to the victim by email, allegedly on behalf of an employee of the Association for computer science, although in fact, as the investigation showed, the traces of the file lead deep into Tor. Hackers were not limited to just one letter. Skype attacker pretending to be an employee of the Association for computing machinery, convinced that his Frame though to make international honor society, which required some paperwork. Kodric believed.
By installing a Trojan on Kodriс's computer hackers were able to obtain direct access to the hot wallet of the exchange. The logs show that the attacker, under the account of Kodric, gained access to the server LNXSRVBTC, where he kept the wallet file.dat, and the DORNATA server where the password was stored. Then the servers were redirected to a certain IP address that belongs to one of the providers of Germany.
There are still no official reports of arrests in this case. Obviously, the case is complicated by the fact that the hackers are outside the UK, and the investigation has to cooperate with law enforcement agencies in other countries.
2. GateHub $9.5 mln (XRP), June 1th, 2019
Hackers have compromised nearly 100 XRP Ledger wallets on cryptocurrency wallet service GateHub. The incident was reported by GateHub in a preliminary statement on June 6.
XRP enthusiast Thomas Silkjær, who first noticed the suspicious activity, estimates that the hackers have stolen nearly $10 million worth of cryptocurrency (23,200,000 XRP), $5.5 million (13,100,000 XRP) of which has already been laundered through exchanges and mixer services.
GateHub notes that it is still conducting an investigation and therefore cannot publish any official findings. Also, GateHub advises victims to make complaints to the relevant authorities of their jurisdiction.
3. Tether, $30.9 mln (USDT), November 19th, 2017
Tether created a digital currency called "US tokens" (USDT) — they could be used to trade real goods using Bitcoin, Litecoin and Ether. By depositing $1 in Tether, the user received 1 USD, which can be converted back into fiat. On November 19, 2017, the attacker gained access to the main Tether wallet and withdrew $ 30.9 million in tokens. For the transaction, he used a Bitcoin address, which means that it was irreversible.
To fix the situation, Tether took action by which the hacker was unable to withdraw the stolen money to fiat or Bitcoin, but the panic led to a decrease in the value of Bitcoin.
4. Ethereum, $31 mln (ETH), July 20th, 2017
On July 20, 2017, the hacker transferred 153,037 Ethers to $31 million from three very large wallets owned by SwarmCity, Edgeless Casino and Eternity. Unknown fraudster managed to change the ownership of wallets, taking advantage of the vulnerability with multiple signatures.
First, the theft was noticed by the developers of SwarmCity.
Further events deserve a place in history: "white hackers" returned the stolen funds, and then protected other compromised accounts. They acted in the same way as criminals, who stole funds from vulnerable wallets — just not for themselves. And it all happened in less than a day.
5. Dao (Decentralized Autonomous Organization) $70 mln (ETH), June 18th, 2016
On June 18, 2016, members of the Ethereum community noticed that funds were being drained from the DAO and the overall ETH balance of the smart contract was going down. A total of 3.6 million Ether (worth around $70 million at the time) was drained by the hacker in the first few hours. The attack was possible because of an exploit found in the splitting function. The attackes withdrew Ether from the DAO smart contract multiple times using the same DAO Tokens. This was possible due to what is known as a recursive call exploit.
In this exploit, the attacker was able to "ask" the smart contract (DAO) to give the Ether back multiple times before the smart contract could update its own balance. There were two main faults that made this possible: the fact that when the DAO smart contract was created the coders did not take into account the possibility of a recursive call, and the fact that the smart contract first sent the ETH funds and then updated the internal token balance.
It's important to understand that this bug did not come from Ethereum itself, but from this one application that was built on Ethereum. The code written for the DAO had multiple bugs, and the recursive call exploit was one of them. Another way to look at this situation is to compare Ethereum to the Internet and any application based on Ethereum to a website: if a website is not working, it doesn't mean that the Internet is not working, it simply means that one website has a problem.
The hacker stopped draining the DAO for unknown reasons, even though they could have continued to do so.
The Ethereum community and team quickly took control of the situation and presented multiple proposals to deal with the exploit. In order to prevent the hacker from cashing in the Ether from his child DAO after the standard 28 days, a soft-fork was voted on and came very close to being introduced. A few hours before it was set to be released, a few members of the community found a bug with the implementation that opened a denial-of-service attack vector. This soft fork was designed to blacklist all the transactions made from the DAO.
6. NiceHash, 4736.42 (BTC), December 6th, 2017
NiceHash is a Slovenian cryptocurrency hash power broker with integrated marketplace that connects sellers of hashing power (miners) with buyers of hashing power using the sharing economy approach.
On December 6, 2017, the company's servers became the target of attack. At first, Reddit users reported that they could not access their funds and make transactions — when they tried to log in, they were shown a message about a service interruption. In the end, it became known that the service had undergone a major cyberattack and 4736,42 Bitcoins disappeared without a trace.
Despite heavy losses, NiceHash was able to continue working, but CEO and founder Marco Koval resigned, giving way to a new team. The company managed to maintain the trust of investors and began to strengthen the protection of its systems.
7. Mt.Gox, 850000 (BTC), June 19th, 2011
The Hacking Of Mt.Gox was one of the biggest Bitcoin thefts in history. It was the work of highly professional hackers using complex vulnerabilities.
A hacker (or a group of hackers) allegedly gained access to a computer owned by one of the auditors and used a security vulnerability to access Mt.Gox servers, then changed the nominal value of Bitcoin to 1 cent per coin.
Then they brought out about 2000 BTC. Some customers, without knowing it, conducted transactions at this low price, a total of 650 BTC, and despite the fact that the hacking hit the headlines around the world, no Bitcoin could be returned.
To increase investor confidence, the company has compensated all of the stolen coins, placed most of the remaining funds in offline storage, and the next couple of years was considered the most reliable Bitcoin exchanger in the world.
However, it was only an illusion of reliability.
The problems of the organization were much more serious, and the management probably did not even know about them.
CEO of Mt.Gox, Mark Karpeles, was originally a developer, but over time he stopped delving into technical details, basking in the rays of glory — because he created the world's largest platform for cryptocurrency exchange. At that time Mt.Gox handled over 70% of all Bitcoin transactions.
And, of course, there were those who wanted to take advantage of the technological weakness of the service. At some point, hackers made it so that Bitcoins could be bought at any price, and within minutes millions of dollars worth of coins were sold — mostly for pennies. World prices for Bitcoin stabilized in a few minutes, but it was too late.
As a result, Mt.Gox lost about 850,000 Bitcoins. The exchange had to declare bankruptcy, hundreds of thousands of people lost money, and the Japanese authorities arrested CEO Mark Karpeles for fraud. He pleaded not guilty and was subsequently released. In 2014, the authorities restored some of the Bitcoins remaining at the old addresses, but did not transfer them to the exchange, and created a trust to compensate for the losses of creditors.
8. Coincheck, $530 mln, January 26th, 2018
The sum was astonishing, and even surpassed the infamous Mt.Gox hack.
While Mt.Gox shortly filed for bankruptcy following the hack, Coincheck has surprisingly remained in business and was even recently approved as a licensed exchange by Japan’s Financial Services (FSA).
Coincheck was founded in 2014 in Japan and was one of the most popular cryptocurrency exchanges in the country. Offering a wide variety of digital assets including Bitcoin, Ether, LISK, and NEM, Coincheck was an emerging exchange that joined the Japan Blockchain Association.
Since Coincheck was founded it 2014, it was incidentally not subject to new exchange registration requirements with Japan’s FSA — who rolled out a framework after Mt. Gox –, and eventually was a contributing factor to its poor security standards that led to the hack.
On January 26th, 2018, Coincheck posted on their blog detailing that they were restricting NEM deposits and withdrawals, along with most other methods for buying or selling cryptocurrencies on the platform. Speculation arose that the exchange had been hacked, and the NEM developers issued a statement saying they were unaware of any technical glitches in the NEM protocol and any issues were a result of the exchange’s security.
Coincheck subsequently held a high-profile conference where they confirmed that hackers had absconded with 500 million NEM tokens that were then distributed to 19 different addresses on the network. Totaling roughly $530 million at the time — NEM was hovering around $1 then — the Coincheck hack was considered the largest theft in the industry’s history.
Coincheck was compelled to reveal some embarrassing details about their exchange’s security, mentioning how they stored all of the NEM in a single hot wallet and did not use the NEM multisignature contract security recommended by the developers.
Simultaneously, the NEM developers team had tagged all of the NEM stolen in the hack with a message identifying the funds as stolen so that other exchanges would not accept them. However, NEM announced they were ending their hunt for the stolen NEM for unspecified reasons several months later, and speculation persisted that hackers were close to cashing out the stolen funds on the dark web.
Mainstream media covered the hack extensively and compared it to similar failures by cryptocurrency exchanges in the past to meet adequate security standards. At the time, most media coverage of cryptocurrencies was centered on their obscure nature, dramatic volatility, and lack of security. Coincheck’s hack fueled that narrative considerably as the stolen sum was eye-popping and the cryptocurrency used — NEM — was unknown to most in the mainstream.
NEM depreciated rapidly following the hack, and the price fell even more throughout 2018, in line with the extended bear market in the broader industry. Currently, NEM is trading at approximately $0.07, a precipitous fall from ATH over $1.60 in early January.
The extent of the Coincheck hack was rivaled by only a few other hacks, notably the Mt.Gox hack. While nominally Coincheck is the largest hack in the industry’s history, the effects of Mt.Gox were significantly more impactful since the stolen funds consisted only of Bitcoin and caused a sustained market correction as well as an ongoing controversy with the stolen funds and founder. Moreover, Mt.Gox squandered 6% of the overall Bitcoin circulation at the time in a market that was much less mature than it is today.
Despite the fallout, Coincheck is now fully operational and registered with Japan’s FSA.
As practice shows, people make mistakes and these mistakes can cost a lot. Especially, when we talk about mad cryptoworld. Be careful and keep your private keys in a safe place.
submitted by SwapSpace_co to BitcoinMarkets [link] [comments]

Binance Cuts Ties With Its US Customers, Does CZ Fear Being Arrested?

Towards the end of last week, Binance, a leading cryptocurrency exchange in the world, announced that it would be blocking its US users. The move was manifested by a change in the exchange’s terms of service.

The change picked 28 other countries that its users will not be able to access Binance.com. Among countries restricted from using Binance.com include those that have economic sanctions.

Prohibition of Use Clause

As per the ‘Prohibition of use’ clause on the updated terms of service, Binance notes:

“By accessing and using the Services, you represent and warrant that you are not on any trade or economic lists such as the UN Security Council Sanctions list, … or placed on the US Commerce Department’s ‘Denied Persons List.’ Binance is unable to provide services to any US persons. Binance maintains to select its markets and jurisdictions to operate and may restrict or deny the Services in certain countries at its discretion.”

It’s a shock that the exchange is closing its doors for users in the United States, considering that approximately 20 percent of its users originate from the US. For example, in the past six months, more than 40 million users from the United States visited Binance.com. The US was followed by India, Japan, Germany, and Turkey.

There’s a Way Around the Restriction, But not for Everyone

While the news are likely to dampen the crypto mood in the US market, US residents may still have a way to bypass the blockage; by using a virtual private network (VPN). Unfortunately, only those that are not verified can successfully use a VPN. However, Binance users who are not verified can only withdraw a maximum of 2 Bitcoins.

Changpeng Zhao (CZ), Binance’s CEO, had earlier anticipated the restrictions. But, the CEO expressed optimism saying that “some short terms pains may be necessary for long term goals.”

From Centralized to Decentralized, the SEC Gets Involved

With the exchange shifting from being centralized to decentralized, the United States Securities and Exchange Commission (SEC) must be involved. To prevent being caught in a regulatory standoff with the SEC, Binance announced that they would geo-fence their decentralized exchange to wade off users from the US among other countries such as Central Africa Republic, Cuba, Ukraine, Libya, Liberia, Venezuela, Zimbabwe, Iraq, Iran, Lebanon, among others.

After Coburn, CZ May Be Next

CZ possibly fears being arrested following what happened to Zachary Coburn. Coburn, the CEO of EtherDelta, a decentralized crypto platform, was charged by the US Securities and Exchange Commission for running an unregistered crypto platform. As per the SEC, EtherDelta has handled over 3.6 million orders which included tokens that the SEC classifies as securities.

A Twitter user, veltre_nick, while contributing to the news regarding Coburn’s predicaments, noted:

“These are just the SEC charges. The money laundering charges for being an unlicensed money transmitter come next. Then there will be more. And every DEX. DEX’s are money laundering machines.”

If the SEC holds the same views as veltre_nick, then CZ may have just avoided being charged or even an arrest. Luckily, another Twitter user has a solution, “DEX makers tip: don’t start in the USA.”
submitted by CapitalSail to CryptoCurrencies [link] [comments]

The biggest cryptocurrency thefts in the last 10 years

In this article, we will try to remember all the major theft of cryptocurrencies over the past 10 years.
1. Bitstamp $5.3 mln (BTC), January 4th, 2015
On January 4, 2015, the operational hot wallet of Bitstamp announced that it was hacked by an anonymous hacker and 19,000 Bitcoins (worth of $5 million) were lost.
The initiation of the attack fell on November 4, 2014. Then Damian Merlak, the CTO of the exchange, was offered free tickets to punk rock festival Punk Rock Holiday 2015 via Skype, knowing that Merlak is interested in such music and he plays in the band. To receive the tickets, he was asked to fill out a participant questionnaire by sending a file named “Punk Rock Holiday 2015 TICKET Form1.doc”. This file contained the VBA script. By opening the file, he downloaded the malware on his computer. Although Merlak did not suspect wrong and has opened the "application form", to any critical consequences, this did not open access to the funds of exchange.
The attackers, however, did not give up. The attack continued for five weeks, during which hackers presented themselves as journalists, then headhunters.
Finally, the attackers were lucky. On December 11, 2014, the infected word document was opened on his machine by Bitstamp system administrator Luka Kodric, who had access to the exchange wallet. The file came to the victim by email, allegedly on behalf of an employee of the Association for computer science, although in fact, as the investigation showed, the traces of the file lead deep into Tor. Hackers were not limited to just one letter. Skype attacker pretending to be an employee of the Association for computing machinery, convinced that his Frame though to make international honor society, which required some paperwork. Kodric believed.
By installing a Trojan on Kodriс's computer hackers were able to obtain direct access to the hot wallet of the exchange. The logs show that the attacker, under the account of Kodric, gained access to the server LNXSRVBTC, where he kept the wallet file.dat, and the DORNATA server where the password was stored. Then the servers were redirected to a certain IP address that belongs to one of the providers of Germany.
There are still no official reports of arrests in this case. Obviously, the case is complicated by the fact that the hackers are outside the UK, and the investigation has to cooperate with law enforcement agencies in other countries.
2. GateHub $9.5 mln (XRP), June 1th, 2019
Hackers have compromised nearly 100 XRP Ledger wallets on cryptocurrency wallet service GateHub. The incident was reported by GateHub in a preliminary statement on June 6.
XRP enthusiast Thomas Silkjær, who first noticed the suspicious activity, estimates that the hackers have stolen nearly $10 million worth of cryptocurrency (23,200,000 XRP), $5.5 million (13,100,000 XRP) of which has already been laundered through exchanges and mixer services.
GateHub notes that it is still conducting an investigation and therefore cannot publish any official findings. Also, GateHub advises victims to make complaints to the relevant authorities of their jurisdiction.
3. Tether, $30.9 mln (USDT), November 19th, 2017
Tether created a digital currency called "US tokens" (USDT) — they could be used to trade real goods using Bitcoin, Litecoin and Ether. By depositing $1 in Tether, the user received 1 USD, which can be converted back into fiat. On November 19, 2017, the attacker gained access to the main Tether wallet and withdrew $ 30.9 million in tokens. For the transaction, he used a Bitcoin address, which means that it was irreversible.
To fix the situation, Tether took action by which the hacker was unable to withdraw the stolen money to fiat or Bitcoin, but the panic led to a decrease in the value of Bitcoin.
4. Ethereum, $31 mln (ETH), July 20th, 2017
On July 20, 2017, the hacker transferred 153,037 Ethers to $31 million from three very large wallets owned by SwarmCity, Edgeless Casino and Eternity. Unknown fraudster managed to change the ownership of wallets, taking advantage of the vulnerability with multiple signatures.
First, the theft was noticed by the developers of SwarmCity.
Further events deserve a place in history: "white hackers" returned the stolen funds, and then protected other compromised accounts. They acted in the same way as criminals, who stole funds from vulnerable wallets — just not for themselves. And it all happened in less than a day.
5. Dao (Decentralized Autonomous Organization) $70 mln (ETH), June 18th, 2016
On June 18, 2016, members of the Ethereum community noticed that funds were being drained from the DAO and the overall ETH balance of the smart contract was going down. A total of 3.6 million Ether (worth around $70 million at the time) was drained by the hacker in the first few hours. The attack was possible because of an exploit found in the splitting function. The attackes withdrew Ether from the DAO smart contract multiple times using the same DAO Tokens. This was possible due to what is known as a recursive call exploit.
In this exploit, the attacker was able to "ask" the smart contract (DAO) to give the Ether back multiple times before the smart contract could update its own balance. There were two main faults that made this possible: the fact that when the DAO smart contract was created the coders did not take into account the possibility of a recursive call, and the fact that the smart contract first sent the ETH funds and then updated the internal token balance.
It's important to understand that this bug did not come from Ethereum itself, but from this one application that was built on Ethereum. The code written for the DAO had multiple bugs, and the recursive call exploit was one of them. Another way to look at this situation is to compare Ethereum to the Internet and any application based on Ethereum to a website: if a website is not working, it doesn't mean that the Internet is not working, it simply means that one website has a problem.
The hacker stopped draining the DAO for unknown reasons, even though they could have continued to do so.
The Ethereum community and team quickly took control of the situation and presented multiple proposals to deal with the exploit. In order to prevent the hacker from cashing in the Ether from his child DAO after the standard 28 days, a soft-fork was voted on and came very close to being introduced. A few hours before it was set to be released, a few members of the community found a bug with the implementation that opened a denial-of-service attack vector. This soft fork was designed to blacklist all the transactions made from the DAO.
6. NiceHash, 4736.42 (BTC), December 6th, 2017
NiceHash is a Slovenian cryptocurrency hash power broker with integrated marketplace that connects sellers of hashing power (miners) with buyers of hashing power using the sharing economy approach.
On December 6, 2017, the company's servers became the target of attack. At first, Reddit users reported that they could not access their funds and make transactions — when they tried to log in, they were shown a message about a service interruption. In the end, it became known that the service had undergone a major cyberattack and 4736,42 Bitcoins disappeared without a trace.
Despite heavy losses, NiceHash was able to continue working, but CEO and founder Marco Koval resigned, giving way to a new team. The company managed to maintain the trust of investors and began to strengthen the protection of its systems.
7. Mt.Gox, 850000 (BTC), June 19th, 2011
The Hacking Of Mt.Gox was one of the biggest Bitcoin thefts in history. It was the work of highly professional hackers using complex vulnerabilities.
A hacker (or a group of hackers) allegedly gained access to a computer owned by one of the auditors and used a security vulnerability to access Mt.Gox servers, then changed the nominal value of Bitcoin to 1 cent per coin.
Then they brought out about 2000 BTC. Some customers, without knowing it, conducted transactions at this low price, a total of 650 BTC, and despite the fact that the hacking hit the headlines around the world, no Bitcoin could be returned.
To increase investor confidence, the company has compensated all of the stolen coins, placed most of the remaining funds in offline storage, and the next couple of years was considered the most reliable Bitcoin exchanger in the world.
However, it was only an illusion of reliability.
The problems of the organization were much more serious, and the management probably did not even know about them.
CEO of Mt.Gox, Mark Karpeles, was originally a developer, but over time he stopped delving into technical details, basking in the rays of glory — because he created the world's largest platform for cryptocurrency exchange. At that time Mt.Gox handled over 70% of all Bitcoin transactions.
And, of course, there were those who wanted to take advantage of the technological weakness of the service. At some point, hackers made it so that Bitcoins could be bought at any price, and within minutes millions of dollars worth of coins were sold — mostly for pennies. World prices for Bitcoin stabilized in a few minutes, but it was too late.
As a result, Mt.Gox lost about 850,000 Bitcoins. The exchange had to declare bankruptcy, hundreds of thousands of people lost money, and the Japanese authorities arrested CEO Mark Karpeles for fraud. He pleaded not guilty and was subsequently released. In 2014, the authorities restored some of the Bitcoins remaining at the old addresses, but did not transfer them to the exchange, and created a trust to compensate for the losses of creditors.
8. Coincheck, $530 mln, January 26th, 2018
The sum was astonishing, and even surpassed the infamous Mt.Gox hack.
While Mt.Gox shortly filed for bankruptcy following the hack, Coincheck has surprisingly remained in business and was even recently approved as a licensed exchange by Japan’s Financial Services (FSA).
Coincheck was founded in 2014 in Japan and was one of the most popular cryptocurrency exchanges in the country. Offering a wide variety of digital assets including Bitcoin, Ether, LISK, and NEM, Coincheck was an emerging exchange that joined the Japan Blockchain Association.
Since Coincheck was founded it 2014, it was incidentally not subject to new exchange registration requirements with Japan’s FSA — who rolled out a framework after Mt. Gox –, and eventually was a contributing factor to its poor security standards that led to the hack.
On January 26th, 2018, Coincheck posted on their blog detailing that they were restricting NEM deposits and withdrawals, along with most other methods for buying or selling cryptocurrencies on the platform. Speculation arose that the exchange had been hacked, and the NEM developers issued a statement saying they were unaware of any technical glitches in the NEM protocol and any issues were a result of the exchange’s security.
Coincheck subsequently held a high-profile conference where they confirmed that hackers had absconded with 500 million NEM tokens that were then distributed to 19 different addresses on the network. Totaling roughly $530 million at the time — NEM was hovering around $1 then — the Coincheck hack was considered the largest theft in the industry’s history.
Coincheck was compelled to reveal some embarrassing details about their exchange’s security, mentioning how they stored all of the NEM in a single hot wallet and did not use the NEM multisignature contract security recommended by the developers.
Simultaneously, the NEM developers team had tagged all of the NEM stolen in the hack with a message identifying the funds as stolen so that other exchanges would not accept them. However, NEM announced they were ending their hunt for the stolen NEM for unspecified reasons several months later, and speculation persisted that hackers were close to cashing out the stolen funds on the dark web.
Mainstream media covered the hack extensively and compared it to similar failures by cryptocurrency exchanges in the past to meet adequate security standards. At the time, most media coverage of cryptocurrencies was centered on their obscure nature, dramatic volatility, and lack of security. Coincheck’s hack fueled that narrative considerably as the stolen sum was eye-popping and the cryptocurrency used — NEM — was unknown to most in the mainstream.
NEM depreciated rapidly following the hack, and the price fell even more throughout 2018, in line with the extended bear market in the broader industry. Currently, NEM is trading at approximately $0.07, a precipitous fall from ATH over $1.60 in early January.
The extent of the Coincheck hack was rivaled by only a few other hacks, notably the Mt.Gox hack. While nominally Coincheck is the largest hack in the industry’s history, the effects of Mt.Gox were significantly more impactful since the stolen funds consisted only of Bitcoin and caused a sustained market correction as well as an ongoing controversy with the stolen funds and founder. Moreover, Mt.Gox squandered 6% of the overall Bitcoin circulation at the time in a market that was much less mature than it is today.
Despite the fallout, Coincheck is now fully operational and registered with Japan’s FSA.
As practice shows, people make mistakes and these mistakes can cost a lot. Especially, when we talk about mad cryptoworld. Be careful and keep your private keys in a safe place.
submitted by SwapSpace_co to ethtrader [link] [comments]

Australian Woman Accused of Laundering $5M in Bitcoin ... Former CEO of collapsed MtGox bitcoin exchange arrested in Japan Bitcoin for Money Laundering? Segwit2X Debate part #1 BitInstant CEO Charlie Shrem Arrested! Bitcoin exchange CEO arrested on drug money laundering ...

U.S. government agents have arrested Charlie Shrem, the CEO of Bitcoin exchange BitInstant, charging him with laundering money for customers of online drug bazaar Silk Road. The U.S. attorney in the Southern District of New York said Shrem helped someone he hadn’t met in person, Robert Faiella, sell more than $1 million worth of bitcoins […] Charles Shre Bitcoin Exchange CEO Charlie Shrem Arrested for Drugs and Money Laundering added by Daniel Worku on January 27, 2014 View all posts by Daniel Worku → 27/01/2014 The widening circle of arrests in the investigation of the Silk Road drug market sites just extended into the heart of the Bitcoin community. The Department of Justice announced Monday that it’s arrested Charlie Shrem ... The CEO of Bitcoin exchanger BitInstant has been arrested and charged with money laundering over allegations that he and another man sold more than $1 million in Bitcoins to buyers and sellers of ... LONDON — The vice chairman of the Bitcoin Foundation, a trade group promoting the adoption of the digital currency, has been charged by United States prosecutors with conspiring to commit money ... U.S. government agents have arrested Charlie Shrem, the CEO of Bitcoin exchange BitInstant, charging him with laundering money for customers of online drug bazaar Silk Road.

[index] [28246] [25429] [14865] [46298] [6681] [27607] [41518] [10466] [20297] [36224]

Australian Woman Accused of Laundering $5M in Bitcoin ...

Bitcoin exchange CEO arrested for money laundering. U.S. government agents have arrested Charlie Shrem, the CEO of Bitcoin exchange BitInstant, charging him ... In a first for the country, an Australian woman has been charged with illegally operating an unregistered Bitcoin exchange. She further stands accused of usi... The CEO of one of the world's leading bitcoin exchanges - BitInstant - has been arrested in New York. The prosecution claims Charlie Shrem was involved in a ... The CEO of Blackrock is calling Bitcoin has a tool for Money Laundering - is this the case of is he scared that Bitcoin will revolutionise the banking sector. 0:47 Market Recap 2:28 BlackRock CEO ... Published on Aug 1, 2015. Mark Karpeles, the former CEO of of the MtGox Bitcoin exchange, was arrested by Japanese police on Saturday in connection with the disappearance of hundreds of millions ...

#