by nthitz on 6/7/21, 9:46 PM with 278 comments
by blhack on 6/8/21, 1:56 AM
While it's possible this it he FBI flexing some muscle that they have a backdoor into bitcoin's hashing algorithm, what seems much more likely (to me) is:
There is a more sophisticated hacking group which created this particular ransomware package. They sell this ransomware package to less sophisticated criminals.
(https://www.theverge.com/2021/5/10/22428996/colonial-pipelin...)
Is it so hard to imagine a scenario where the more advanced creators of this ransomware kit gave instructions to their purchasers on things like private keys, and the end user simply ignored them?
Somebody ignoring a warning when installing a software, and that allowing the FBI to subpeona access to the server where it was running, and grab this private key, seems FAR more likely to me than the FBI having a backdoor into BTC, or this all being a cover spy novel plot, or anything like that.
by shiado on 6/7/21, 10:42 PM
by shiado on 6/8/21, 1:52 AM
https://www.blockchain.com/btc/address/bc1qq2euq8pw950klpjca...
Which got funds from
https://www.blockchain.com/btc/address/3EYkxQSUv2KcuRTnHQA8t...
This is the wallet explorer used for clustering the wallet
https://www.walletexplorer.com/wallet/123085fff68ee703/addre...
I have no idea why they censored out parts of the bitcoin addresses as googling the uncensored part and transaction quantities lets you find them on countless sites.
by walrus01 on 6/7/21, 10:21 PM
by yamrzou on 6/7/21, 10:16 PM
They kept following transactions on the blockchain, but it's not clear how the private key became in the posession of the FBI.
by paulpauper on 6/7/21, 11:35 PM
Or they installed malware on the hacker's computers and were able to log the private key as it was generated.
Or the hackers foolishly stored the key pairs on a server
Bitcoin is falling and this news does not help because it shows that some aspect is less secure than previously thought.
by galaxyLogic on 6/8/21, 6:27 AM
If the victim pays someone we know which account it goes to, right? Then we know that account is criminal.
If bitcoins move from that account to other accounts we know that accounts that receive them are essentially "hiding stolen goods". So they are criminal accounts as well.
Then at some point they want to get dollars, and FBI can catch them by following where the dollars were sent. No?
by alex_young on 6/7/21, 11:20 PM
FBI recovers $2.3M in BTC today. Current BTC/USD around $34K today.
34 / 58 = .58
4.4 * .58 = 2.552
Looks like they recovered more or less all of it?
by dogman144 on 6/8/21, 3:10 AM
I’m curious what the wallet provider was.
by paxys on 6/7/21, 11:49 PM
Hah, of course the DoJ office doing bitcoin investigations is in San Francisco.
Also interesting that they were able to recover only $2.3M out of the $4.4M paid. I wonder if Colonial Pipeline will ever see this money.
by alksjdalkj on 6/8/21, 2:28 AM
by Geee on 6/8/21, 2:23 AM
by ac29 on 6/8/21, 12:11 AM
tl;dr: The hackers used the same full node wallet more than once, and the FBI was able to narrow in on an IP address because the first relay of the transactions was the same across multiple transactions. This server was in California, which allowed the FBI to seize it.
by h3cate on 6/7/21, 11:25 PM
by trhway on 6/8/21, 11:02 AM
does it mean that "tainted" BTC can be seized any time, even if the current holder may have no relation to the original crime?
by cirowrc on 6/7/21, 10:12 PM
by Animats on 6/8/21, 7:42 AM
Russian hackers have been captured in Israel, Spain, Belarius... Sometimes, after the FBI identifies them, they just watch and wait.
by ipsin on 6/8/21, 3:18 AM
Is it returned to the company, or does the DoJ keep it as an asset forfeiture?
by void_mint on 6/8/21, 3:37 AM
by Haemm0r on 6/8/21, 4:10 AM
by joemazerino on 6/8/21, 12:59 AM
by Black101 on 6/8/21, 12:40 AM
by doggosphere on 6/8/21, 2:46 AM
https://twitter.com/thisisbullish/status/1402056137340604418...
How amateur is that…
by ProjectArcturis on 6/7/21, 10:12 PM
by labrador on 6/7/21, 11:28 PM
by xwdv on 6/7/21, 11:27 PM
by vmception on 6/7/21, 11:22 PM
SHUTC - Should have used Tornado.cash
SHURENVM+TC - Should have used RenVM and Tornado.cash
by encryptluks2 on 6/7/21, 10:19 PM