Hacker Sentenced For Bitcoin Theft

A skilled and  prolific hacker has been given a five year sentence on 14th November for laundering the proceeds of one of the biggest ever crypto-currency thefts. His crime involved the the 2016  theft of a reporedt 120,000 bitcoin from cryptocurrency exchange Bitfinex, worth over $9bn at today's heightened exchange rate.   

Now, Ilya Lictenstein has been sentenced to five years in jail after he attempted to launder the money with the help of his wife Heather Morgan, who used the alias 'Razzlekhan' to promote her career in pop music. His  wife earlier pleaded guilty to one count of conspiracy to commit money laundering and is due to be sentenced next week.

According court documents, Lichtenstein hacked Bitfinex using advanced hacking tools: once inside the network, he fraudulently authorised more than 2,000 transactions transferring 119,754 bitcoin from Bitfinex to a crypto-currency wallet in Lichtenstein’s control. In a statement, the US Dept. of Justice said “Lichtenstein then took steps to cover his tracks by deleting from Bitfinex’s network access credentials and other log files that could have revealed his conduct to law enforcement... Following the hack, Lichtenstein enlisted the help of his wife, Heather Morgan, in laundering the stolen funds,”

At the time of the theft, the bitcoin was worth around $70m (£55.3m), but had risen in value to more than $4.5bn by the time they were arrested. At current prices the bitcoins are worth more than double that.

Lichtenstein, who has been in prison since his arrest in February 2022, who is 35, has been ordered to serve three years of supervised release following his release from imprisonment. This apparently lenient sentence for a theft of such magnitude was perhaps mitigated by his pledge to apply his skills to fight cybercrime after serving his sentence.

US District Judge Colleen Kollar-Kotelly told Lichtenstein that his theft was “meticulously planned” and not an impulsive act. Lichtenstein used advanced techniques,  which included using fictitious identities, switching the funds into different cryptocurrencies and buying gold coins. Lichtenstein was born in Russia but grew up in the US  would meet couriers to move the laundered money to Russia.

His wife produced dozens of expletive-filled music videos and rap songs filmed in locations around New York in which she described herself as a "bad-ass money maker" and "the crocodile of Wall Street".

 US Justice Dept.   |   Fortune   |   Axios   |    Bolton News   |    BBC   |  CCN    

Image: @HeatherReyhan 

You Might Also Read: 

Crypto Company Loses $200m To Hackers:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

« Five Best Practices For Secure & Scalable Cloud Migration
USB Attacks: The Threat Putting Critical Infrastructure At Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Digitus Biometrics

Digitus Biometrics

Digitus Biometrics is a market leader in biometric access control. We can secure access to any entry point, from the front door to the server rack cabinet.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

Cybernance

Cybernance

Cybernance provide an enterprise-wide, web-based software solution for managing and mitigating cyber risk based on key compliance frameworks.

Exabeam

Exabeam

Exabeam is a global cybersecurity leader that delivers AI-driven security operations.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

Blue Lance

Blue Lance

Blue Lance is a global provider of cybersecurity governance solutions. Our software solutions automatically collect and store the information necessary for investigations, audit and compliance.

Qrypt

Qrypt

Qrypt has developed the only cryptographic solution capable of securing information indefinitely with mathematical proof as evidence.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Sekoia.io

Sekoia.io

Sekoia.io is a European cybersecurity company whose mission is to develop the best protection capabilities against cyber-attacks.

Everfox

Everfox

Everfox (formerly Forcepoint Federal) has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.

BlazeGuard

BlazeGuard

At BlazeGuard, we understand that navigating the complex world of cybersecurity can be challenging. That’s why we make it our mission to simplify the process for you.