‘Bitcoin Bonnie & Clyde’ Go To Jail 

A husband and wife cyber crime team have pleaded guilty to trying to launder $4.5bn (£3.5bn) of Bitcoin that he had stolen in a hack in 2016. This was the US’s biggest-ever crypto-currency theft case.

Heather Morgan and Ilya Lichtenstein were arrested last year in Manhattan, New York after police traced their riches back to the crypto heist. While evading police, Morgan masqueraded as a rapper and tech entrepreneur. As part of a plea deal, Lichtenstein admitted he was behind the hack.

US Deputy Attorney General Lisa Monaco said, “Today’s arrests, and the department’s largest financial seizure ever, show that cryptocurrency is not a safe haven for criminals... In a futile effort to maintain digital anonymity, the defendants laundered stolen funds through a labyrinth of cryptocurrency transactions. Thanks to the meticulous work of law enforcement, the department once again showed how it can and will follow the money, no matter what form it takes.”

Lichtenstein has pleaded guilty to conspiracy to commit money laundering, which could land him a maximum sentence of 20 years in prison. His wife has also pleaded guilty to one count of money laundering conspiracy and one count of conspiracy to defraud the United States. Both counts carry a max of five years in prison, which means that Morgan could serve up to 10 years in jail.

The couple both pleaded guilty to money laundering, but Morgan pleaded guilty to an additional count of conspiracy to defraud the United States.

In spite of attempting to cover up her crimes, Morgan published dozens of expletive-filled music videos and rap songs filmed in locations around New York, under the name Razzlekhan.

Morgan also had sidelines in the painting, fashion design and writing worlds, where she pitched herself as a kind of corporate coach. One of her recent pieces was titled, in part, “Tips to Protect Your Business from Cybercriminals” and featured an interview with a cryptocurrency exchange owner about how to prevent fraud. In her lyrics she called herself a "bad-ass money maker" and "the crocodile of Wall Street".

Morgan also claimed to be a successful tech businesswoman, calling herself an "economist, serial entrepreneur, software investor and rapper". But while developing her rapping and tech persona, she and her computer programmer husband were attempting to cash out their fortune stolen from the crypto firm Bitfinex.

The couple now face prison sentences with Lichtenstein in line for a possible maximum 20 years in prison and Morgan a possible 10.

At the time of their arrest their theft of 119,000 Bitcoins was worth about $4.5bn, making it the US Department of Justice's largest single financial seizure in its history. When the hack was carried out, the Bitcoins were worth about $71m.

Court documents showed in detail how the couple cashed out millions of dollars of the Bitfinex Bitcoins into traditional money using sophisticated techniques to try to stay under the radar. The successful police operation is the latest case to utilise tools able to analyse transactions on Bitcoin's public blockchain ledger. One of the couple's key mistakes was shopping with Walmart supermarket vouchers paid for with the stolen funds.

Police successfully decrypted a spreadsheet meticulously detailing the couple's intricate methods for laundering the stash, allowing them to recover nearly the full amount.

Prosecutors say they uncovered communication records that indicate Morgan and Lichtenstein were planning to flee the US for Russia, which is his country of birth. If successful, they would have probably lived a billionaire lifestyle, safe from arrest by the US.

BBC:     Yahoo:     The Guardian:     U.S. Dept of Public Affairs:     The Times:     Yahoo:     Metro

 

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« EvilProxy Hits Microsoft 365 Business Accounts
X Will Fund Claims Made By Unfairly Treated Users »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

ThreatConnect

ThreatConnect

ThreatConnect is an enterprise threat intelligence platform by Cyber Squared bridging incident response, defense, and threat analysis for InfoSec & DFIR teams.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

A3Sec

A3Sec

A3Sec provides professional solutions in the areas of Cybersecurity, Device Monitoring, Business Intelligence and Big Data.

ITsMine

ITsMine

ITsMine’s Beyond DLP solution is a leading Data Loss Prevention solution used by organizations to protect against internal and external threats automatically.

HardSecure

HardSecure

Hardsecure supports organizations to face security threats through the adoption of cybersecurity capabilities that guarantee 360º monitoring, visibility, mitigation, and blocking.

Hold Security

Hold Security

Hold Security works with companies of all sizes to provide unparalleled Threat Intelligence services that actually make a difference.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

VISTA InfoSec

VISTA InfoSec

VISTA InfoSec is a global Information Security Consulting firm with offices based in US, UK, Singapore and India.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

Vancord

Vancord

Vancord is an information and security technology company that works in collaboration with clients to support their infrastructure and data security needs for today and tomorrow.

Auxilion

Auxilion

Auxilion is an award-winning provider of consulting and IT support services, technologies and consulting for public and private organisations in the UK and Ireland.

Dial A Geek

Dial A Geek

Dial A Geek are a Bristol-based B Corp that provides Managed IT Services to companies of 20+ users. We help businesses with a smart use of tech, including compliance and cybersecurity solutions.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.