Hacker Sentenced For Bitcoin Theft

A skilled and  prolific hacker has been given a five year sentence on 14th November for laundering the proceeds of one of the biggest ever crypto-currency thefts. His crime involved the the 2016  theft of a reporedt 120,000 bitcoin from cryptocurrency exchange Bitfinex, worth over $9bn at today's heightened exchange rate.   

Now, Ilya Lictenstein has been sentenced to five years in jail after he attempted to launder the money with the help of his wife Heather Morgan, who used the alias 'Razzlekhan' to promote her career in pop music. His  wife earlier pleaded guilty to one count of conspiracy to commit money laundering and is due to be sentenced next week.

According court documents, Lichtenstein hacked Bitfinex using advanced hacking tools: once inside the network, he fraudulently authorised more than 2,000 transactions transferring 119,754 bitcoin from Bitfinex to a crypto-currency wallet in Lichtenstein’s control. In a statement, the US Dept. of Justice said “Lichtenstein then took steps to cover his tracks by deleting from Bitfinex’s network access credentials and other log files that could have revealed his conduct to law enforcement... Following the hack, Lichtenstein enlisted the help of his wife, Heather Morgan, in laundering the stolen funds,”

At the time of the theft, the bitcoin was worth around $70m (£55.3m), but had risen in value to more than $4.5bn by the time they were arrested. At current prices the bitcoins are worth more than double that.

Lichtenstein, who has been in prison since his arrest in February 2022, who is 35, has been ordered to serve three years of supervised release following his release from imprisonment. This apparently lenient sentence for a theft of such magnitude was perhaps mitigated by his pledge to apply his skills to fight cybercrime after serving his sentence.

US District Judge Colleen Kollar-Kotelly told Lichtenstein that his theft was “meticulously planned” and not an impulsive act. Lichtenstein used advanced techniques,  which included using fictitious identities, switching the funds into different cryptocurrencies and buying gold coins. Lichtenstein was born in Russia but grew up in the US  would meet couriers to move the laundered money to Russia.

His wife produced dozens of expletive-filled music videos and rap songs filmed in locations around New York in which she described herself as a "bad-ass money maker" and "the crocodile of Wall Street".

 US Justice Dept.   |   Fortune   |   Axios   |    Bolton News   |    BBC   |  CCN    

Image: @HeatherReyhan 

You Might Also Read: 

Crypto Company Loses $200m To Hackers:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Dealing With Cloud Security Challenges
USB Attacks: The Threat Putting Critical Infrastructure At Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CUIng.org

CUIng.org

The CUIng initiative was launched to tackle the problem of criminal exploitation of information hiding techniques.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

HudsonCyber

HudsonCyber

HudsonCyber, part of HudsonAnalytix, provides leading cyber risk management services for the global maritime transportation industry.

RIPS Technologies

RIPS Technologies

RIPS Technologies delivers automated security analysis for PHP applications as platform independent software or highly scalable cloud service.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

Keynetic Technologies

Keynetic Technologies

Keynetic focuses on developing cybersecurity solutions for Industry 4.0.

Get Indemnity

Get Indemnity

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Laminar

Laminar

Laminar provides the only Public Cloud Data Protection solution that provides full visibility and enforcement capabilities across your entire public cloud infrastructure.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

FoxPointe Solutions

FoxPointe Solutions

FoxPointe Solutions is a full-service cyber risk management and compliance firm.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.

Blue Goat Cyber

Blue Goat Cyber

Blue Goat stands at the forefront of cybersecurity, particularly in medical device security and penetration testing.

Pulsar Security

Pulsar Security

Pulsar Security is a team of highly skilled, offensive cybersecurity professionals with the industry's most esteemed credentials and advanced real-world experience.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.