‘Bitcoin Bonnie & Clyde’ Go To Jail 

A husband and wife cyber crime team have pleaded guilty to trying to launder $4.5bn (£3.5bn) of Bitcoin that he had stolen in a hack in 2016. This was the US’s biggest-ever crypto-currency theft case.

Heather Morgan and Ilya Lichtenstein were arrested last year in Manhattan, New York after police traced their riches back to the crypto heist. While evading police, Morgan masqueraded as a rapper and tech entrepreneur. As part of a plea deal, Lichtenstein admitted he was behind the hack.

US Deputy Attorney General Lisa Monaco said, “Today’s arrests, and the department’s largest financial seizure ever, show that cryptocurrency is not a safe haven for criminals... In a futile effort to maintain digital anonymity, the defendants laundered stolen funds through a labyrinth of cryptocurrency transactions. Thanks to the meticulous work of law enforcement, the department once again showed how it can and will follow the money, no matter what form it takes.”

Lichtenstein has pleaded guilty to conspiracy to commit money laundering, which could land him a maximum sentence of 20 years in prison. His wife has also pleaded guilty to one count of money laundering conspiracy and one count of conspiracy to defraud the United States. Both counts carry a max of five years in prison, which means that Morgan could serve up to 10 years in jail.

The couple both pleaded guilty to money laundering, but Morgan pleaded guilty to an additional count of conspiracy to defraud the United States.

In spite of attempting to cover up her crimes, Morgan published dozens of expletive-filled music videos and rap songs filmed in locations around New York, under the name Razzlekhan.

Morgan also had sidelines in the painting, fashion design and writing worlds, where she pitched herself as a kind of corporate coach. One of her recent pieces was titled, in part, “Tips to Protect Your Business from Cybercriminals” and featured an interview with a cryptocurrency exchange owner about how to prevent fraud. In her lyrics she called herself a "bad-ass money maker" and "the crocodile of Wall Street".

Morgan also claimed to be a successful tech businesswoman, calling herself an "economist, serial entrepreneur, software investor and rapper". But while developing her rapping and tech persona, she and her computer programmer husband were attempting to cash out their fortune stolen from the crypto firm Bitfinex.

The couple now face prison sentences with Lichtenstein in line for a possible maximum 20 years in prison and Morgan a possible 10.

At the time of their arrest their theft of 119,000 Bitcoins was worth about $4.5bn, making it the US Department of Justice's largest single financial seizure in its history. When the hack was carried out, the Bitcoins were worth about $71m.

Court documents showed in detail how the couple cashed out millions of dollars of the Bitfinex Bitcoins into traditional money using sophisticated techniques to try to stay under the radar. The successful police operation is the latest case to utilise tools able to analyse transactions on Bitcoin's public blockchain ledger. One of the couple's key mistakes was shopping with Walmart supermarket vouchers paid for with the stolen funds.

Police successfully decrypted a spreadsheet meticulously detailing the couple's intricate methods for laundering the stash, allowing them to recover nearly the full amount.

Prosecutors say they uncovered communication records that indicate Morgan and Lichtenstein were planning to flee the US for Russia, which is his country of birth. If successful, they would have probably lived a billionaire lifestyle, safe from arrest by the US.

BBC:     Yahoo:     The Guardian:     U.S. Dept of Public Affairs:     The Times:     Yahoo:     Metro

 

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« EvilProxy Hits Microsoft 365 Business Accounts
X Will Fund Claims Made By Unfairly Treated Users »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

Advens

Advens

Advens is a company specializing in information security management. We provide Consultancy, Security Audits and Technology Solutions.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

SOOHO

SOOHO

SOOHO helps to detect security vulnerabilities earlier. Our blockchain security platform audits from smart contracts to on-chain transactions.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

Glocomp Systems

Glocomp Systems

Glocomp Systems is one of Malaysia’s premier ICT infrastructure distributor offering a comprehensive portfolio of solutions including cybersecurity and privacy.

Secret Intelligence Service (SIS - MI6)

Secret Intelligence Service (SIS - MI6)

The UK’s Secret Intelligence Service, also known as MI6, has three core aims: stopping terrorism, disrupting the activity of hostile states, and giving the UK a cyber advantage.

Abu Dhabi Gov Digital

Abu Dhabi Gov Digital

Gov Digital (formerly Abu Dhabi Digital Authority - ADDA) enable, support and deliver a digital government that is proactive, personalised, collaborative and secure.

Verizon

Verizon

Verizon is a leader in IT technology solutions - Verizon Cloud, Networking, Security, Mobility, Machine-to-Machine (M2M), Advanced Communications and Professional Services.

Pixee

Pixee

Pixee fixes vulnerabilities, hardens code, squashes bugs, and gives engineers more time to focus on the work that counts.

LEPHISH

LEPHISH

LePhish is a French cybersecurity solution specializing in automated phishing campaigns.

IT.ie

IT.ie

IT.ie are a comprehensive provider of Managed IT Services, Cloud Solutions, Cyber Security, and proactive IT support services.

C5 Technology

C5 Technology

C5 Technology specialises in the provision of networking, security, and infrastructure services to enterprises and government agencies.