PrizmaBetGüncelGirişAdresiHızlıveGüvenilirErişim!

Razzlekhan’s Husband, the Bitfinex Hacker, Makes First Public Statement Since Arrest

In a video posted to X, Ilya Lichtenstein reiterates he acted alone in stealing 120,000 bitcoin, denying a Netflix documentary’s speculation.

Ilya Lichtenstein, who pled guilty last year to charges related to the 2016 theft of 120,000 bitcoin from Bitfinex, has made his first public statement since his 2022 arrest.

In a five-minute video posted to X (formerly Twitter) on Thursday, Lichtenstein reiterated that he was the hacker and that he acted alone, denying speculation in a Netflix documentary that his father (or, perhaps, some spy agency, maybe Russia’s) might have been involved in the theft.

Story continues below

“My dad is no hacker, he doesn’t even know how to use Instagram,” said Lichtenstein, who was sentenced to five years in prison for conspiracy to commit money laundering, including the time he was incarcerated after the arrest while the case was pending.

“I offer my sincerest apologies to Bitfinex for all the stress that I have caused them,” he said in the video, recorded from prison during a remote visit with his wife. “I knew what I was doing was wrong and I did it anyway because I didn’t care … I look back at the person I was then, and I hate myself. I hate myself.”

In the video, Lichtenstein also provided an update on restitution for the funds he stole from Bitfinex.

“For the past three years, I have worked hard to account for and return all assets down to the last satoshi, as required by my plea agreement, and I will continue to do so,” Lichtenstein said, showing bags under his eyes.
A restitution hearing is set for February to determine whether they should be distributed to Bitfinex or to its customers who were affected by the hack.

Razzlekhan speaks

Lichtenstein’s wife, Heather “Razzlekhan” Morgan, pled guilty to one count of money laundering conspiracy and one count of conspiracy to defraud the United States.

Prosecutors said she became aware of the hack only years after the fact and was enlisted by her husband to launder the stolen bitcoin.

“In many ways, my wife … is just another victim of my bad decisions,” Lichtenstein said in the video.

Last month, Morgan was sentenced to 18 months in prison for her supporting role in Lichtenstein’s crimes.

“It’s nice to begin to have the public record surrounding our case set straight,” Morgan told CoinDesk, referring to the video her husband released. “You would think that would have happened after our sentencing memos got filed, but that really hasn’t been the case. There are so many myths that I look forward to debunking when we tell the real story.”

Best known for her goofy rap videos, Morgan recently began selling custom videos for $125 a pop on Cameo, a sort of non-pornographic version of Onlyfans. Her prison sentence could begin as soon as next month.

“Despite everything you’ve read, my Razzlekhan persona never had anything to do with this case, besides the government mentioning it in their charging documents. I created Razzlekhan years before I ever knew my husband had hacked Bitfinex,” Morgan told CoinDesk.

“While our criminal case was open, I was unable to speak publicly or tell my story,” she said. “This also meant I could not publish any articles or release any new artworks or songs the last three years. Now that the case is over, I look forward to freely expressing myself creatively again. … I am eager to tell the story of what really happened.”

Takes one to catch one

Atoning for his misdeeds in court, Lichtenstein said that after he serves his time he plans to pursue a career fighting cybercrime.

In Tuesday’s video, Lichtenstein reiterated that pledge.

“When I am released from prison … I plan to dedicate myself to working in the cybersecurity industry,” Lichtenstein said. “I know the cyber threats that we face and I know how to stop them.”

The bitcoin stolen in the 2016 hack was worth $70 million at the time and around $12 billion today.

The Netflix documentary leaves viewers with the impression that a substantial portion of the stolen funds remain missing, but according to Lichtenstein’s lawyer, this is not the case.

“With significant help from Mr. Lichtenstein, the government has recovered nearly all of the assets stolen during the 2016 Bitfinex hack,” the lawyer, Samson Enzer of Cahill Gordon & Reindel LLP, told CoinDesk. “In total, approximately 114,601 BTC (representing 96% of the approximately 119,754 BTC taken in the hack) were recovered, as well as 29 additional assets with substantial value.”

The U.S. Department of Justice did not respond by press time to CoinDesk’s inquiry about the percentage of stolen funds that were recovered.

Merhaba arkadaşlar, bugün sizlere Prizmabet adlı bir bahis sitesinden bahsedeceğim. Prizmabet, Betconstruct altyapısı ile üyelerine kaliteli hizmetler veren ve ülkemizin önde gelen bahis sitelerinden bir tanesidir. 2009 yılında kurulan Prizmabet, lisanslı, güvenilir ve avantajlı bir site olarak dikkat çekmektedir. Prizmabet’te spor bahisleri, canlı bahisler, casino, canlı casino, slot oyunları, sanal sporlar ve daha pek çok seçenek bulabilirsiniz. Prizmabet’te oyun oynamak için aradığınız ortamı fazlası ile bulacaksınız.

Prizmabet’in en önemli özelliklerinden biri de Prizmabet TV kanalıdır. Bu kanal sayesinde bahis sitesinde bulunan müsabakaları üyeler bir ücrete katlanmadan istedikleri zaman takip edebiliyor. Böylece hem heyecanlı hem de kazançlı bir bahis deneyimi yaşayabiliyorsunuz. Prizmabet TV kanalında futbol, basketbol, tenis, voleybol gibi popüler spor dallarının yanı sıra daha az bilinen sporlara da yer verilmektedir. Prizmabet TV kanalını kullanmak için sadece siteye üye olmanız ve yatırım yapmanız yeterlidir.

Prizmabet ayrıca üyelerine bol miktarda bonus ve promosyon da sunmaktadır. Prizmabet’te ilk üyelik bonusu olarak 100 TL deneme bonusu alabilirsiniz. Bunun yanında yatırım bonusları, kayıp bonusları, arkadaş davet bonusu, doğum günü bonusu gibi farklı bonuslar da mevcuttur. Prizmabet bonusları sayesinde daha fazla oyun oynayabilir ve kazancınızı artırabilirsiniz. Prizmabet bonuslarının çevrim şartları da oldukça makul seviyededir.

Prizmabet para yatırma ve çekme işlemleri konusunda da üyelerine kolaylık sağlamaktadır. Prizmabet’te banka havalesi, kredi kartı, papara, cepbank, QR kod, bitcoin gibi farklı yöntemlerle para yatırabilir ve çekebilirsiniz. Para yatırma ve çekme işlemleri 7/24 yapılabilmekte ve kısa sürede hesaplara yansımaktadır. Prizmabet para yatırma ve çekme işlemlerinde herhangi bir komisyon veya kesinti de yapmamaktadır.

Prizmabet müşteri hizmetleri de üyelerine 7/24 canlı destek hizmeti sağlamaktadır. Prizmabet canlı destek ekibi sayesinde site ile ilgili her türlü soru, sorun veya önerinizi iletebilir ve anında çözüm bulabilirsiniz. Prizmabet canlı destek ekibi profesyonel, güler yüzlü ve yardımseverdir.

Sonuç olarak, Prizmabet ülkemizin en iyi bahis sitelerinden biri olarak gösterilebilir. Prizmabet’te hem eğlenceli hem de kazançlı bir bahis deneyimi yaşayabilirsiniz. Prizmabet’e üye olmak için güncel giriş adresini web sitemizden bulabilirsiniz. Prizmabet’e girmek için tıklayınız! Prizmabet’e katıldığınıza pişman olmayacaksınız!

Heather ‘Razzlekhan’ Morgan Should Spend 18 Months in Prison, Prosecutors Tell Court

Heather Morgan, who was accused of helping launder proceeds from a 2016 Bitfinex hack, provided “substantial assistance” to prosecutors, according to the government’s sentencing memo.

Prosecutors have requested that Heather Morgan – better known by her rap moniker “Razzlekhan” – be sentenced to just 18 months behind bars for her role in laundering 120,000 bitcoins stolen from Bitfinex in a 2016 hack.

In August 2023, Morgan pleaded guilty to one count of money laundering conspiracy and one count of conspiracy to defraud the United States, each of which carries a maximum sentence of five years in prison.

Though Morgan and her husband Ilya Lichtenstein were first believed to only have laundered the proceeds of the hack (worth approximately $7.5 billion at today’s value), Lichtenstein later admitted to being the original hacker and pleaded guilty to one count of conspiracy to commit money laundering, which carries a maximum sentence of 20 years in prison.

According to court documents, Lichtenstein carried out the hack alone in 2016, and did not tell his wife or enlist her help with laundering the money until four years later, in 2020, making her only an accessory to the crime after it had already occurred.

“She was in some ways thrust into the middle of a serious criminal scheme without her initial consent, and undoubtedly felt compelled to support it out of a sense of loyalty to her husband and desire to preserve their life together,” prosecutors wrote in the memo. “That does negate the seriousness of her conduct, as she did ultimately join her husband’s conspiracy and use her own skillset to aid and enhance his criminal endeavors.”

Prosecutors have suggested a lenient sentence for Morgan in light of her early acceptance of responsibility and apparently “substantial assistance to law enforcement,” as well as the fact that she herself spent very little of the criminal proceeds.

However, they also urged the judge to take into account that, at several points during the investigation, Morgan attempted to obstruct justice by destroying evidence – throwing a computer down a garbage chute, deleting data from devices, and, during law enforcement’s execution of a search warrant at her and Lichtenstein’s Manhattan apartment, pretended to be grabbing her cat from under the bed while secretly shutting off her phone.

In addition to requesting jail time for Morgan, prosecutors have asked the court to order her to “return the cryptocurrencies seized by the government directly from the Bitfinex Hack Wallet – including approximately 94,643.29837084 BTC, 117,376.52651940 Bitcoin Cash (BCH), 117,376.58178024 Bitcoin Satoshi Vision (BSV), and 118,102.03258447 in Bitcoin Gold (BTG) valued at more than $6 billion at current prices – as in-kind restitution to Bitfinex.”

Morgan is set to be sentenced on Nov. 15 at 2:00 PM in Washington, D.C., one day after Lichtenstein is sentenced.

How North Korea Infiltrated the Crypto Industry

More than a dozen blockchain firms inadvertently hired undercover IT workers from the rogue state, incurring cybersecurity and legal risks, a CoinDesk investigation found.

The crypto company Truflation was still in its early stages in 2023 when founder Stefan Rust unknowingly hired his first North Korean employee.

“We were always looking for good developers,” Rust said from his home in Switzerland. Out of the blue, “this one developer came across the line.”

“Ryuhei” sent his resume over Telegram and claimed he was based in Japan. Soon after he was hired, odd inconsistencies began to surface.

At one point, “I’m talking to the guy, and he said he was in an earthquake,” Rust recalled. Except there was no recent earthquake in Japan. Then the employee started missing calls, and when he did show up, “it wasn’t him,” Rust said. “It was somebody else.” Whoever it was had dropped the Japanese accent.

Rust would soon learn that “Ryuhei” and four other employees – more than a third of his entire team – were North Korean. Unwittingly, Rust had fallen prey to a coordinated scheme by North Korea to secure remote overseas jobs for its people and funnel the earnings back to Pyongyang.

U.S. authorities have intensified their warnings recently that North Korean information technology (IT) workers are infiltrating tech companies, including crypto employers, and using the proceeds to fund the pariah state’s nuclear weapons program. According to a 2024 United Nations report, these IT workers rake in as much as $600 million annually for Kim Jon Un’s regime.

Hiring and paying the workers – even inadvertently – violates U.N. sanctions and is illegal in the U.S. and numerous other countries. It also presents a grave security risk, because North Korean hackers have been known to target companies through covert workers.

A CoinDesk investigation now reveals just how aggressively and frequently North Korean job applicants have targeted crypto companies in particular – successfully navigating interviews, passing reference checks, even presenting impressive histories of code contributions on the open-source software repository GitHub.

CoinDesk spoke to more than a dozen crypto companies that said they inadvertently hired IT workers from the Democratic People’s Republic of Korea (DPRK), as the nation is officially called.

These interviews with founders, blockchain researchers and industry experts reveal that North Korean IT workers are far more prevalent in the crypto industry than previously thought. Virtually every hiring manager approached by CoinDesk for this story acknowledged that they had interviewed suspected North Korean developers, hired them unwittingly, or knew someone who had.

“The percentage of your incoming resumes, or people asking for jobs, or wanting to contribute – any of that stuff – that are probably from North Korea is greater than 50% across the entire crypto industry,” said Zaki Manian, a prominent blockchain developer who says he inadvertently hired two DPRK IT workers to help develop the Cosmos Hub blockchain in 2021. “Everyone is struggling to filter out these people.”

Among the unwitting DPRK employers identified by CoinDesk were several well-established blockchain projects, such as Cosmos Hub, Injective, ZeroLend, Fantom, Sushi and Yearn Finance. “This has all been happening behind the scenes,” said Manian.

This investigation marks the first time any of these companies have publicly acknowledged that they inadvertently hired DPRK IT workers.

In many cases, North Korean workers conducted their work just like typical employees; so the employers mostly got what they paid for, in a sense. But CoinDesk found evidence of workers subsequently funneling their wages to blockchain addresses linked to the North Korean government.

CoinDesk’s investigation also revealed several instances where crypto projects that employed DPRK IT workers later fell victim to hacks. In some of those cases, CoinDesk was able to link the heists directly to suspected DPRK IT workers on a firm’s payroll. Such was the case with Sushi, a prominent decentralized finance protocol that lost $3 million in a 2021 hacking incident.

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) and the Department of Justice began publicizing North Korean attempts to infiltrate the U.S. crypto industry in 2022. CoinDesk uncovered evidence that DPRK IT workers started working at crypto companies under fake identities well before then, at least as early as 2018.

“A lot of people, I think, are under the mistaken impression that this is something new that suddenly happened,” said Manian. “There are GitHub accounts and other things with these people that, like, go back to 2016, 2017, 2018.” (GitHub, owned by Microsoft, is the online platform that many software organizations use to host code and allow developers to collaborate.)

CoinDesk linked DPRK IT workers to companies using various methods, including blockchain payment records, public GitHub code contributions, emails from U.S. government officials and interviews directly with target companies. One of the largest North Korean payment networks examined by CoinDesk was uncovered by ZachXBT, a blockchain investigator who published a list of suspected DPRK developers in August.

Previously, employers remained silent due to concerns about unwanted publicity or legal repercussions. Now, confronted with extensive payment records and other evidence unearthed by CoinDesk, many of them have decided to come forward and share their stories for the first time, exposing the overwhelming success and scale of North Korea’s efforts to penetrate the crypto industry.

Fake documents

After hiring Ryuhei, the ostensibly Japanese employee, Rust’s Truflation received a flood of new applicants. Over just a few months, Rust unwittingly hired four more DPRK developers who said they were based in Montreal, Vancouver, Houston and Singapore.

The crypto sector is especially ripe for sabotage by North Korean IT workers. The workforce is particularly global, and crypto companies tend to be more comfortable than others hiring fully remote – even anonymous – developers.

CoinDesk reviewed DPRK job applications that crypto companies received from a variety of sources, including messaging platforms like Telegram and Discord, crypto-specific job boards like Crypto Jobs List, and hiring sites like Indeed.

“Where they’re having the most luck getting hired is these really fresh, new upstart teams who are willing to hire off a Discord,” said Taylor Monahan, a product manager at the crypto wallet app MetaMask who frequently publishes security research related to North Korean crypto activity. “They don’t have processes in place to hire people with background checks. They’re willing to pay in crypto a lot of times.”

Rust said he had conducted his own background checks on all of Truflation’s new hires. “They sent us their passports and ID cards, gave us GitHub repos, went through a test, and then, basically, we brought them on.”

To the untrained eye, most of the forged documents look indistinguishable from authentic passports and visas, though experts told CoinDesk that they probably would have been caught by professional background-checking services.

Although startups are less likely to use professional background checkers, “we do see North Korean IT workers at bigger companies as well, either as real employees or at least as contractors,” said Monahan.

Hiding in plain sight

In many cases, CoinDesk discovered DPRK IT workers at companies using publicly available blockchain data.

In 2021, Manian, the blockchain developer, needed some help at his company, Iqlusion. He sought out freelance coders who might be able to help with a project to upgrade the popular Cosmos Hub blockchain. He found two recruits; they delivered capably.

Manian never met the freelancers, “Jun Kai” and “Sarawut Sanit,” in person. They had previously worked together on an open-source software project funded by THORChain, a closely affiliated blockchain network, and they told Manian they were based in Singapore.

“I talked to them almost every day for a year,” said Manian. “They did the work. And I was, frankly, pretty pleased.”

Two years after the freelancers completed their work, Manian received an email from an FBI agent investigating token transfers that appeared to have come from Iqlusion en route to suspected North Korean crypto wallet addresses. The transfers in question turned out to be Iqlusion’s payments to Kai and Sanit.

The FBI never confirmed to Manian that the developers he’d contracted were agents of the DPRK, but CoinDesk’s review of Kai and Sanit’s blockchain addresses showed that throughout 2021 and 2022, they funneled their earnings to two individuals on OFAC’s sanctions list: Kim Sang Man and Sim Hyon Sop.

Acording to OFAC, Sim is a representative for Kwangson Banking Corp, a North Korean bank that launders IT worker funds to help “finance the DPRK’s WMD and ballistic missile programs.” Sarawut appears to have funneled all of his earnings to Sim and other Sim-linked blockchain wallets.

Kai, meanwhile, funneled nearly $8 million directly to Kim. According to a 2023 OFAC advisory, Kim is a representative for the DPRK-operated Chinyong Information Technology Cooperation Company, which, “by way of companies under its control and their representatives, employs delegations of DPRK IT workers that operate in Russia and Laos.”

Iqlusion’s wages to Kai accounted for less than $50,000 of the nearly $8 million he sent to Kim, and some of the remaining funds came from other crypto companies.

For example, CoinDesk discovered payments from the Fantom Foundation, which develops the widely-used Fantom blockchain, to “Jun Kai” and another DPRK-linked developer.

“Fantom did identify two external personnel as being involved with North Korea in 2021,” a Fantom Foundation spokesperson told CoinDesk. “However, the developers in question worked on an external project that was never finished and never deployed.”

According to the Fantom Foundation, “The two individuals in question were terminated, never contributed any malicious code nor ever had access to Fantom’s codebase, and no users of Fantom were impacted.” One of the DPRK workers attempted to attack Fantom’s servers but failed because he lacked the requisite access, according to the spokesperson.

According to the OpenSanctions database, Kim’s DPRK-linked blockchain addresses were not published by any governments until May 2023 – more than two years after Iqlusion and Fantom made their payments.

Leeway given

The U.S. and the UN sanctioned the hiring of DPRK IT workers in 2016 and 2017, respectively.

It is illegal to pay North Korean workers in the U.S. whether you know you’re doing it or not—a legal concept called “strict liability.”

It doesn’t necessarily matter where a company is based, either: Hiring workers from the DPRK can carry legal risks for any company that does business in countries that enforce sanctions against North Korea.

However, the U.S. and other U.N. member states have yet to prosecute a crypto company for hiring North Korean IT workers.

The U.S. Treasury Department opened an inquiry into Iqlusion, which is based in the U.S., but Manian says the investigation concluded without any penalties.

U.S. authorities have been lenient about bringing charges against the firms – on some level acknowledging that they were victims of, at best, an unusually elaborate and sophisticated type of identity fraud, or, at worst, a long con of the most humiliating sort.

Legal risks aside, paying DPRK IT workers is also “bad because you’re paying people that are basically being exploited by the regime,” explained MetaMask’s Monahan.

According to the UN Security Council’s 615-page report, DPRK IT workers only keep a small portion of their paychecks. “Lower earners keep 10 percent while the highest earners could keep 30 percent, ” the report states.

While these wages might still be high relative to the average in North Korea, “I don’t care where they live,” said Monahan. “If I am paying someone and they’re literally being forced to send their entire paycheck to their boss, that would make me very uncomfortable. It would make me more uncomfortable if their boss is, you know, the North Korean regime.”

CoinDesk reached out to multiple suspected DPRK IT workers over the course of reporting but did not hear back.

Coming forward

CoinDesk identified more than two dozen companies that employed possible DPRK IT workers by analyzing blockchain payment records to OFAC-sanctioned entities. Twelve companies presented with the records confirmed to CoinDesk that they had previously discovered suspected DPRK IT workers on their payrolls.

Some declined to comment further for fear of legal repercussions, but others agreed to share their stories with the hope that others could learn from their experiences.

In many cases, DPRK employees proved easier to identify after they’d been hired.

Eric Chen, CEO of Injective, a decentralized finance-focused project, said that he contracted a freelance developer in 2020 but quickly fired him for underperformance.

“He didn’t last long,” said Chen. “He was writing crappy code that didn’t work well.” It wasn’t until this past year, when a U.S. “government agency” reached out to Injective, that Chen learned the employee was linked to North Korea.

Several companies told CoinDesk that they fired an employee before even knowing about any links to the DPRK – say, due to substandard work.

‘Milk payroll for a few months’

However, DPRK IT workers are similar to typical developers in that their aptitudes can vary.

On the one hand, you’ll have employees who “show up, get through an interview process, and just milk payroll for a few months of salary,” said Manian. “There’s also another side of it, which is you encounter these people who, when you interview them, their actual technical chops are really strong.”

Rust recalled having “one really good developer” at Truflation who claimed he was from Vancouver but turned out to be from North Korea. “He was really a young kid,” Rust said. “It felt like he was just out of college. A bit green behind the ears, super keen, really excited to be working on an opportunity.”

In another instance, Cluster, a decentralized finance startup, fired two developers in August after ZachXBT reached out with evidence that they were linked to the DPRK.

“It’s actually crazy how much these guys knew,” Cluster’s pseudonymous founder, z3n, told CoinDesk. In retrospect, there were some “clear red flags.” For example, “every two weeks they changed their payment address, and every month or so they would change their Discord name or Telegram name.”

Webcam off

In conversations with CoinDesk, many employers said they noticed abnormalities that made more sense when they learned that their employees were probably North Korean.

Sometimes the hints were subtle, like employees working hours that didn’t match their supposed work location.

Other employers, like Truflation, noticed hints that an employee was multiple people masquerading as a single individual – something the employee would try to hide by keeping his webcam off. (They’re almost always men).

One company hired an employee who showed up for meetings in the morning but would seem to forget everything that was discussed later on in the day – a quirk that made more sense when the employer realized she’d been speaking to multiple people.

When Rust brought his concerns about Ryuhei, his “Japanese” employee, to an investor with experience tracking criminal payment networks, the investor quickly identified the four other suspected DPRK IT workers on Truflation’s payroll.

“We immediately cut our ties,” Rust said, adding that his team conducted a security audit of its code, enhanced its background-checking processes and changed certain policies. One new policy was to require remote workers to turn on their cameras.

A $3M hack

Many of the employers consulted by CoinDesk were under the mistaken impression that DPRK IT workers operate independently from North Korea’s hacking arm, but blockchain data and conversations with experts reveal that the regime’s hacking activities and IT workers are frequently linked.

In September 2021, MISO, a platform built by Sushi for launching crypto tokens, lost $3 million in a widely reported heist. CoinDesk found evidence that the attack was linked to Sushi’s hiring of two developers with blockchain payment records connected to North Korea.

At the time of the hack, Sushi was one of the most-talked-about platforms in the emerging world of decentralized finance (DeFi). More than $5 billion had been deposited into SushiSwap, which mainly serves as a “decentralized exchange” for people to swap between cryptocurrencies without intermediaries.

Joseph Delong, Sushi’s chief technology officer at the time, traced the MISO heist to two freelance developers who helped to build it: individuals using the names Anthony Keller and Sava Grujic. Delong said the developers – who he now suspects were a single person or organization – injected malicious code into the MISO platform, redirecting funds to a wallet they controlled.

When Keller and Grujic were contracted by Sushi DAO, the decentralized autonomous organization that governs the Sushi protocol, they supplied credentials that seemed typical enough – even impressive – for entry-level developers.

Keller operated under the pseudonym “eratos1122” in public, but when he applied to work on MISO he used what appeared to be his real name, “Anthony Keller.” In a resume that Delong shared with CoinDesk, Keller claimed to reside in Gainesville, Georgia, and to have graduated from the University of Phoenix with a bachelor’s degree in computer engineering. (The university didn’t respond to a request for confirmation of whether there was a graduate by that name.)

Keller’s resume included genuine references to previous work. Among the most impressive was Yearn Finance, an extremely popular crypto investment protocol that offers users a way to earn interest across a range of pre-made investment strategies. Banteg, a core developer at Yearn, confirmed that Keller worked on Coordinape, an app built by Yearn to help teams collaborate and facilitate payments. (Banteg says Keller’s work was restricted to Coordinape and he didn’t have access to Yearn’s core codebase.)

Keller referred Grujic to MISO and the two presented themselves as “friends,” according to Delong. Like Keller, Grujic supplied a resume with his supposed real name rather than his online pseudonym, “AristoK3.” He claimed to be from Serbia and a graduate of the University of Belgrade with a bachelor’s degree in computer science. His GitHub account was active, and his resume listed experience with several smaller crypto projects and gaming startups.

Rachel Chu, a former core developer at Sushi who worked closely with Keller and Grujic before the heist, said she was already “suspicious” of the pair before any hack had taken place.

Despite claiming to be based across the globe from one another, Grujic and Keller “had the same accent” and the “same way of texting,” said Chu. “Every time we talked, they’d have some background noise, like they’re in a factory,” she added. Chu recalled seeing Keller’s face but never Grujic’s. According to Chu, Keller’s camera was “zoomed in” so that she couldn’t ever make out what was behind him.

Keller and Grujic eventually stopped contributing to MISO around the same time. “We think that Anthony and Sava are the same guy,” said Delong, “so we stop paying them.” This was the height of the COVID-19 pandemic, and it was not unheard of for remote crypto developers to masquerade as multiple people to extract extra money from payroll.

After Keller and Grujic were let go in the summer of 2021, the Sushi team neglected to revoke their access to the MISO codebase.

On Sept. 2, Grujic committed malicious code to the MISO platform under his “Aristok3” screen name, redirecting $3 million to a new cryptocurrency wallet, based on a screenshot provided to CoinDesk.

CoinDesk’s analysis of blockchain payment records suggests a potential link between Keller, Grujic and North Korea. In March 2021, Keller posted a blockchain address in a now-deleted tweet. CoinDesk discovered multiple payments between this address, Grujic’s hacker address and the addresses Sushi had on file for Keller. Sushi’s internal investigation ultimately concluded that the address belonged to Keller, according to Delong.

CoinDesk found that the address in question sent most of its funds to “Jun Kai” (the Iqlusion developer who sent money to the OFAC-sanctioned Kim Sang Man) and another wallet that appears to serve as a DPRK proxy (because it, too, paid Kim).

Lending further credence to the theory that Keller and Grujic were North Korean, Sushi’s internal investigation found that the pair frequently operated using IP addresses in Russia, which is where OFAC says North Korea’s DPRK IT workers are sometimes based. (The U.S. phone number on Keller’s resume is out of service, and his “eratos1122” Github and Twitter accounts have been deleted.)

Additionally, CoinDesk discovered evidence that Sushi employed another suspected DPRK IT contractor at the same time as Keller and Grujic. The developer, identified by ZachXBT as “Gary Lee,” coded under the pseudonym LightFury and funneled his earnings to “Jun Kai” and another Kim-linked proxy address.

After Sushi publicly pinned the attack on Keller’s pseudonym, “eratos1122,” and threatened to involve the FBI, Grujic returned the stolen funds. While it might seem counterintuitive that a DPRK IT worker would care about protecting a fake identity, DPRK IT workers seem to reuse certain names and build up their reputations over time by contributing to many projects, perhaps as a way to earn credibility with future employers.

Someone might have decided that protecting the Anthony Keller alias was more lucrative in the long run: In 2023, two years after the Sushi incident, someone named “Anthony Keller” applied to Truflation, Stefan Rust’s company.

Attempts to contact “Anthony Keller” and “Sava Grujic” for comment were unsuccessful.

DPRK-style heists

North Korea has stolen more than $3 billion in cryptocurrency through hacks over the past seven years, according to the UN. Of the hacks that blockchain analysis firm Chainalysis has tracked in the first half of 2023 and which it believes are connected to the DPRK, “approximately half of them involved IT worker-related theft,” said Madeleine Kennedy, a spokesperson for the firm.

North Korean cyberattacks don’t tend to resemble the Hollywood version of hacking, where hoodie-wearing programmers break into mainframes using sophisticated computer code and black-and-green computer terminals.

DPRK-style attacks are decidedly lower-tech. They usually involve some version of social engineering, where the attacker earns the trust of a victim who holds the keys to a system and then extracts those keys directly through something as simple as a malicious email link.

“To date, we have never seen DPRK do, like, a real exploit,” said Monahan. “It’s always: social engineering, and then compromise the device, and then compromise the private keys.”

IT workers are well-placed to contribute to DPRK heists, either by extracting personal information that could be used to sabotage a potential target or by gaining direct access to software systems flush with digital cash.

A series of coincidences

On Sept. 25, as this article was nearing publication, CoinDesk was scheduled for a video call with Truflation’s Rust. The plan was to fact-check some details he had shared previously.

A flustered Rust joined the call 15 minutes late. He’d just been hacked.

CoinDesk reached out to more than two dozen projects that appeared to have been duped into hiring DPRK IT workers. In the final two weeks of reporting alone, two of those projects were hacked: Truflation and a crypto borrowing app called Delta Prime.

It’s too early to determine if either hack was directly connected to any inadvertent hiring of DPRK IT workers.

Delta Prime was breached first, on Sept. 16. CoinDesk had previously uncovered payments and code contributions connecting Delta Prime to Naoki Murano, one of the DPRK-linked developers publicized by ZachXBT, the pseudonymous blockchain sleuth.

The project lost more than $7 million, officially because of “a compromised private key.” Delta Prime did not respond to numerous requests for comment.

The Truflation hack followed less than two weeks later. Rust noticed funds streaming out of his crypto wallet around two hours before the call with CoinDesk. He had just returned home from a trip to Singapore and was scrambling to make sense of what he’d done wrong. “I just have no idea how it happened,” he said. “I had my notebooks all locked up in the safe in the wall in my hotel. I had my mobile with me the whole time.”

Millions of dollars were leaving Rust’s personal blockchain wallets as he was speaking. “I mean, that really sucks. That’s my kids’ school; pension fees.”

Truflation and Rust ultimately lost around $5 million. The official cause was a stolen private key.

Merhaba arkadaşlar, bugün sizlere Prizmabet adlı bir bahis sitesinden bahsedeceğim. Prizmabet, Betconstruct altyapısı ile üyelerine kaliteli hizmetler veren ve ülkemizin önde gelen bahis sitelerinden bir tanesidir. 2009 yılında kurulan Prizmabet, lisanslı, güvenilir ve avantajlı bir site olarak dikkat çekmektedir. Prizmabet’te spor bahisleri, canlı bahisler, casino, canlı casino, slot oyunları, sanal sporlar ve daha pek çok seçenek bulabilirsiniz. Prizmabet’te oyun oynamak için aradığınız ortamı fazlası ile bulacaksınız.

Prizmabet’in en önemli özelliklerinden biri de Prizmabet TV kanalıdır. Bu kanal sayesinde bahis sitesinde bulunan müsabakaları üyeler bir ücrete katlanmadan istedikleri zaman takip edebiliyor. Böylece hem heyecanlı hem de kazançlı bir bahis deneyimi yaşayabiliyorsunuz. Prizmabet TV kanalında futbol, basketbol, tenis, voleybol gibi popüler spor dallarının yanı sıra daha az bilinen sporlara da yer verilmektedir. Prizmabet TV kanalını kullanmak için sadece siteye üye olmanız ve yatırım yapmanız yeterlidir.

Prizmabet ayrıca üyelerine bol miktarda bonus ve promosyon da sunmaktadır. Prizmabet’te ilk üyelik bonusu olarak 100 TL deneme bonusu alabilirsiniz. Bunun yanında yatırım bonusları, kayıp bonusları, arkadaş davet bonusu, doğum günü bonusu gibi farklı bonuslar da mevcuttur. Prizmabet bonusları sayesinde daha fazla oyun oynayabilir ve kazancınızı artırabilirsiniz. Prizmabet bonuslarının çevrim şartları da oldukça makul seviyededir.

Prizmabet para yatırma ve çekme işlemleri konusunda da üyelerine kolaylık sağlamaktadır. Prizmabet’te banka havalesi, kredi kartı, papara, cepbank, QR kod, bitcoin gibi farklı yöntemlerle para yatırabilir ve çekebilirsiniz. Para yatırma ve çekme işlemleri 7/24 yapılabilmekte ve kısa sürede hesaplara yansımaktadır. Prizmabet para yatırma ve çekme işlemlerinde herhangi bir komisyon veya kesinti de yapmamaktadır.

Prizmabet müşteri hizmetleri de üyelerine 7/24 canlı destek hizmeti sağlamaktadır. Prizmabet canlı destek ekibi sayesinde site ile ilgili her türlü soru, sorun veya önerinizi iletebilir ve anında çözüm bulabilirsiniz. Prizmabet canlı destek ekibi profesyonel, güler yüzlü ve yardımseverdir.

Sonuç olarak, Prizmabet ülkemizin en iyi bahis sitelerinden biri olarak gösterilebilir. Prizmabet’te hem eğlenceli hem de kazançlı bir bahis deneyimi yaşayabilirsiniz. Prizmabet’e üye olmak için güncel giriş adresini web sitemizden bulabilirsiniz. Prizmabet’e girmek için tıklayınız! Prizmabet’e katıldığınıza pişman olmayacaksınız!

Crypto Hackers Nabbed $409M in Q3: Immunefi

The figure is 40% less than in third-quarter 2023.

Hackers stole $409 million worth of cryptocurrency in the third quarter, and an additional $3 million was lost to fraud, according to a report by Immunefi.

The figure is 40% less than in third-quarter 2023, the bug bounty platform said.

The amount of capital locked on decentralized finance (DeFi) protocols represents an “unparalleled and attractive opportunity for blackhat hackers,” Immunefi said. There is currently $87.2 billion in total value locked (TVL) across DeFi, according to DefiLlama.

Most the quarter’s losses came from hacks of crypto exchanges, with India’s WazirX losing $235 million and Singapore’s BingX $52 million. The report said 32 other hacks accounted for 32% of total losses.

“We’re seeing a higher number of incidents targeting DeFi, while CeFi experiences fewer incidents but often with more severe consequences, with hundreds of millions in stolen funds in a single exploit,” said Mitchell Amador, founder and CEO of ImmuneFi.

“In CeFi, the biggest infrastructural issue is private key management, which is essential to maintaining the self-custody of crypto assets but is not typically subject to security audits. It requires rigorous key management policies, practices, and emergency plans.”

WazirX lost funds after hackers compromised the exchange’s private keys. The exchange halted withdrawals and froze trading on July 18, and is now seeking a moratorium from Singapore’s courts to give it time to restructure.

The Ethereum blockchain was the most common target for hackers, with 15 incidents of theft reported compared with eight on BNB Chain and two on Base.

There were also two incidents of funds being recovered after being stolen. Ronin Network recouped $10 million from a $12 million hack and ShezmuTech clawed back all $4.9 million that was taken.

Merhaba arkadaşlar, bugün sizlere Prizmabet adlı bir bahis sitesinden bahsedeceğim. Prizmabet, Betconstruct altyapısı ile üyelerine kaliteli hizmetler veren ve ülkemizin önde gelen bahis sitelerinden bir tanesidir. 2009 yılında kurulan Prizmabet, lisanslı, güvenilir ve avantajlı bir site olarak dikkat çekmektedir. Prizmabet’te spor bahisleri, canlı bahisler, casino, canlı casino, slot oyunları, sanal sporlar ve daha pek çok seçenek bulabilirsiniz. Prizmabet’te oyun oynamak için aradığınız ortamı fazlası ile bulacaksınız.

Prizmabet’in en önemli özelliklerinden biri de Prizmabet TV kanalıdır. Bu kanal sayesinde bahis sitesinde bulunan müsabakaları üyeler bir ücrete katlanmadan istedikleri zaman takip edebiliyor. Böylece hem heyecanlı hem de kazançlı bir bahis deneyimi yaşayabiliyorsunuz. Prizmabet TV kanalında futbol, basketbol, tenis, voleybol gibi popüler spor dallarının yanı sıra daha az bilinen sporlara da yer verilmektedir. Prizmabet TV kanalını kullanmak için sadece siteye üye olmanız ve yatırım yapmanız yeterlidir.

Prizmabet ayrıca üyelerine bol miktarda bonus ve promosyon da sunmaktadır. Prizmabet’te ilk üyelik bonusu olarak 100 TL deneme bonusu alabilirsiniz. Bunun yanında yatırım bonusları, kayıp bonusları, arkadaş davet bonusu, doğum günü bonusu gibi farklı bonuslar da mevcuttur. Prizmabet bonusları sayesinde daha fazla oyun oynayabilir ve kazancınızı artırabilirsiniz. Prizmabet bonuslarının çevrim şartları da oldukça makul seviyededir.

Prizmabet para yatırma ve çekme işlemleri konusunda da üyelerine kolaylık sağlamaktadır. Prizmabet’te banka havalesi, kredi kartı, papara, cepbank, QR kod, bitcoin gibi farklı yöntemlerle para yatırabilir ve çekebilirsiniz. Para yatırma ve çekme işlemleri 7/24 yapılabilmekte ve kısa sürede hesaplara yansımaktadır. Prizmabet para yatırma ve çekme işlemlerinde herhangi bir komisyon veya kesinti de yapmamaktadır.

Prizmabet müşteri hizmetleri de üyelerine 7/24 canlı destek hizmeti sağlamaktadır. Prizmabet canlı destek ekibi sayesinde site ile ilgili her türlü soru, sorun veya önerinizi iletebilir ve anında çözüm bulabilirsiniz. Prizmabet canlı destek ekibi profesyonel, güler yüzlü ve yardımseverdir.

Sonuç olarak, Prizmabet ülkemizin en iyi bahis sitelerinden biri olarak gösterilebilir. Prizmabet’te hem eğlenceli hem de kazançlı bir bahis deneyimi yaşayabilirsiniz. Prizmabet’e üye olmak için güncel giriş adresini web sitemizden bulabilirsiniz. Prizmabet’e girmek için tıklayınız! Prizmabet’e katıldığınıza pişman olmayacaksınız!

Bu Kripto Para Projesi Kullanıcılara İade Sözü Verdi: Token Zıpladı!

Kripto para projesi 3 milyon dolarlık bir istismardan etkilenen 11 kullanıcıya iade yapacağını doğruladı ve token fiyatı zıpladı.

Banana Gun, geçen hafta ağır bir hack saldırısının kurbanı oldu. Kripto para projesi 3 milyon dolarlık bir istismardan etkilenen 11 kullanıcıya iade yapacağını doğruladı. Bu açıklamanın ardından token fiyatı yükselişe geçti. Ekip, Banana Gun’ın kullandığı Telegram mesaj oracle’ında potansiyel bir güvenlik açığı tespit ettiğini açıkladı. Ayrıca, bunun da muhtemelen istismara yol açmış olduğunu söyledi.

Kripto para projesi zararı tazmin edeceğini duyurdu, token yükselişe geçti!

Kriptokoin.com’dan takip ettiğiniz üzere Banana Gun, geçen hafta bir hack saldırısıyla kayıplar yaşadı. Proje ekibi, 3 milyon dolarlık bir cüzdan istismarından etkilenen 11 kullanıcıya geri ödeme sözü verdi. Ekip, “Etkilenen tüm kullanıcılara Banana Gun hazinesinden tamamen geri ödeme yapılacak. Ayrıca, geri ödemeler için hiçbir token satılmayacak” açıklamasını yaptı.

Bu gelişmeni ardından token fiyatı yükselişe geçti. BANANA fiyatı gün içinde seyrettiği 36 dolar seviyesinden 41,82 dolara yükseldi. Kripto para daha sonra irtifa kaybetse de yükseldiği seviyelere yakın işlem görmeye devam ediyor. BANANA yazı sırasında günlük bazda yaklaşık %10 artışla 40 dolar seviyelerinde el değiştiriyor. Bu arada, tokenin işlem hacmi %58 gibi kayda değer bir artış gördü. Bu da yatırımcıların ve traderların tokene olan ilgisini yansıtıyor.

BANANA günlük fiyat grafiği. Kaynak: CoinMarketCap

Hack olayının arka planı!

Banana Gun, sektörün önde gelen Telegram tabanlı ticaret botlarından birini işletiyor. Kullanıcıların on-chain işlem yapabilmelerini ve yaklaşan token lansmanlarını takip edebilmelerini sağlayan bot, yaklaşık 279.000 kullanıcıdan 6,3 milyar doların üzerinde işlem hacmi elde etti.

Kripto para topluluk üyeleri ilk olarak geçtiğimiz Perşembe günü saldırıya dikkat çekti. Ayrıca, Banana Gun bazı kullanıcıların cüzdanlarından “yetkisiz transferlere” tanık olduğunu doğruladı. Olay, ekibin Ethereum Sanal Makinesi ve Solana botunu kapatmasına yol açtı. Ancak arka uç sistemlerinin tehlikeye atılmadığını iddia etti. Ekip, “Sadece çok az sayıda kullanıcı etkilendi. Ayrıca, transferler manuel olarak gerçekleştirilmiş gibi görünüyor. Bu da sorunun bir ön uç güvenlik açığından kaynaklanabileceğini düşünmemize yol açıyor” dedi.

Bu sayının 11 kullanıcı olduğu ve saldırının “dolandırılması kolay olmayan” “akıllı para” traderlarını ve kripto gazilerini hedef aldığı ortaya çıktı. Banana Gun Salı günü yaptığı açıklamada, hedeflerin sosyal varlıkları veya ticaret uzmanlıkları nedeniyle alanda bilindiğini de sözlerine ekledi.

Kripto para projesi hacker ile pazarlık yapıyor!

Verim protokolü Shezmu’dan 21 Eylül’de 5 milyon dolar çalan hacker, beyaz şapka ödülünü kabul etti. Daha sonra çaldığı fonların çoğunu iade etti. Shezmu, ShezmuUSD (ShezUSD) stablecoin kasalarından birinin istismar edildiğini tespit etti. Ayrıca, bilgisayar korsanı çalınan fonların %90’ının 24 saat içinde iade edilmesini talep etti. Birkaç saat içinde Shezmu, çalınan Dai (DAI) tokenlerini cüzdanına almaya başladı. Hacker başlangıçta 282,18 Ethereum’u (ETH) protokole iade etti. Ayrıca, bunu 137 Wrapped Ether (WETH) tutarındaki başka bir iade ile takip etti.

Merhaba arkadaşlar, bugün sizlere Prizmabet adlı bir bahis sitesinden bahsedeceğim. Prizmabet, Betconstruct altyapısı ile üyelerine kaliteli hizmetler veren ve ülkemizin önde gelen bahis sitelerinden bir tanesidir. 2009 yılında kurulan Prizmabet, lisanslı, güvenilir ve avantajlı bir site olarak dikkat çekmektedir. Prizmabet’te spor bahisleri, canlı bahisler, casino, canlı casino, slot oyunları, sanal sporlar ve daha pek çok seçenek bulabilirsiniz. Prizmabet’te oyun oynamak için aradığınız ortamı fazlası ile bulacaksınız.

Prizmabet’in en önemli özelliklerinden biri de Prizmabet TV kanalıdır. Bu kanal sayesinde bahis sitesinde bulunan müsabakaları üyeler bir ücrete katlanmadan istedikleri zaman takip edebiliyor. Böylece hem heyecanlı hem de kazançlı bir bahis deneyimi yaşayabiliyorsunuz. Prizmabet TV kanalında futbol, basketbol, tenis, voleybol gibi popüler spor dallarının yanı sıra daha az bilinen sporlara da yer verilmektedir. Prizmabet TV kanalını kullanmak için sadece siteye üye olmanız ve yatırım yapmanız yeterlidir.

Prizmabet ayrıca üyelerine bol miktarda bonus ve promosyon da sunmaktadır. Prizmabet’te ilk üyelik bonusu olarak 100 TL deneme bonusu alabilirsiniz. Bunun yanında yatırım bonusları, kayıp bonusları, arkadaş davet bonusu, doğum günü bonusu gibi farklı bonuslar da mevcuttur. Prizmabet bonusları sayesinde daha fazla oyun oynayabilir ve kazancınızı artırabilirsiniz. Prizmabet bonuslarının çevrim şartları da oldukça makul seviyededir.

Prizmabet para yatırma ve çekme işlemleri konusunda da üyelerine kolaylık sağlamaktadır. Prizmabet’te banka havalesi, kredi kartı, papara, cepbank, QR kod, bitcoin gibi farklı yöntemlerle para yatırabilir ve çekebilirsiniz. Para yatırma ve çekme işlemleri 7/24 yapılabilmekte ve kısa sürede hesaplara yansımaktadır. Prizmabet para yatırma ve çekme işlemlerinde herhangi bir komisyon veya kesinti de yapmamaktadır.

Prizmabet müşteri hizmetleri de üyelerine 7/24 canlı destek hizmeti sağlamaktadır. Prizmabet canlı destek ekibi sayesinde site ile ilgili her türlü soru, sorun veya önerinizi iletebilir ve anında çözüm bulabilirsiniz. Prizmabet canlı destek ekibi profesyonel, güler yüzlü ve yardımseverdir.

Sonuç olarak, Prizmabet ülkemizin en iyi bahis sitelerinden biri olarak gösterilebilir. Prizmabet’te hem eğlenceli hem de kazançlı bir bahis deneyimi yaşayabilirsiniz. Prizmabet’e üye olmak için güncel giriş adresini web sitemizden bulabilirsiniz. Prizmabet’e girmek için tıklayınız! Prizmabet’e katıldığınıza pişman olmayacaksınız!