article thumbnail

Identifying the Person Behind Bitcoin Fog

Schneier on Security

Identifying the person behind Bitcoin Fog serves as an illustrative example of how hard it is to be anonymous online in the face of a competent police investigation: Most remarkable, however, is the IRS’s account of tracking down Sterlingov using the very same sort of blockchain analysis that his own service was meant to defeat.

article thumbnail

Russians charged with hacking Mt. Gox exchange and operating BTC-e

Security Affairs

Two Russian nationals have been charged with the hack of the cryptocurrency exchange Mt. Gox in 2011 and money laundering. Russian nationals Alexey Bilyuchenko (43) and Aleksandr Verner (29) have been charged with the hack of the cryptocurrency exchange Mt. Then the attackers transferred funds from Mt. ” reads the DoJ.

Hacking 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Alexander Vinnik, the operator of BTC-e exchange, pleaded guilty to money laundering

Security Affairs

Alexander Vinnik , a Russian national, pleaded guilty to conspiracy to commit money laundering for his involvement in operating the cryptocurrency exchange BTC-e from 2011 to 2017. Vinnik set up numerous such shell companies and financial accounts across the globe to allow BTC-e to conduct its business.”

article thumbnail

John McAfee found dead in prison cell ahead of extradition to US

Security Affairs

The company was purchased by Intel in 2011 for more than $7.6bn. According to the indictment , the expert earned millions in income from promoting cryptocurrencies, consulting work, speaking engagements, and selling the rights to his life story for a documentary.

article thumbnail

Crypto security breaches cause $4.25 billion losses worth of cryptos in 2021

Security Affairs

The cyberattacks against the cryptocurrency industry are a profitable business for threat actors, according to the experts, $12.1 billion worth of cryptocurrencies have been stolen in the last decade. “Cryptocurrency crime stands in direct proportion to the size of the cryptocurrency market. Threat actors stole $3.18

article thumbnail

The Origins and History of the Dark Web

Identity IQ

Transactions on the dark web are typically conducted using cryptocurrencies such as Bitcoin to maintain anonymity. You probably use the deep web all the time — examples may include bank accounts, your email, and login-restricted content such as news or streaming entertainment. From 2011 to 2013, the Silk Road hosted 1.2

article thumbnail

Google obtained a temporary court order against CryptBot distributors

Security Affairs

The malware allows operators to steal login credentials from popular services such as social media platforms and cryptocurrency wallets, then stolen data is sold on cybercrime forums by the operators. CryptBot malware is active since at least 2019, it allows operators to steal sensitive data from the Google Chrome of the infected systems.

Malware 94