Thursday, January 2, 2025
HomecryptocurrencyCrypto Exchange Founder Pleads Guilty for Dark Web Transfer

Crypto Exchange Founder Pleads Guilty for Dark Web Transfer

Published on

SIEM as a Service

Bitzlato Ltd., a cryptocurrency exchange, was founded and is primarily owned by an individual who facilitated transactions between buyers and sellers in dark markets.

The exchange acted as a conduit for such transactions to take place, making it an important player in the underground world of illicit activities involving digital currencies.

A cryptocurrency exchange works similarly to stock exchanges, which helps investors buy and sell in digital currencies such as Bitcoin, Ethereum, or Tether.

- Advertisement - SIEM as a Service

According to reports, Bitzlato Ltd. was identified as the primary entity involved in facilitating illegal transactions for the infamous online drug market, Hydra.

Exchange Founder Pleads Guilty

Hydra Market, the biggest and longest-running darknet market in the world, was Bitzlato’s biggest counterparty in cryptocurrency transactions.

Hydra Market was an online marketplace for drugs, financial information that had been stolen, false identification documents, and money laundering services.

Users exchanged more than $700 million worth of bitcoin with Bitzlato, either directly or through middlemen, before Hydra Market’s closure in April 2022 as a result of seizures made by German and American law enforcement.

“As alleged, Bitzlato advertised a haven for fraudsters, thieves, and other criminals to launder illicit proceeds — but their business model didn’t account for federal law enforcement,” said Deputy Attorney General Lisa O. Monaco. 

Anatoly Legkodymov, a Russian national who resided in Shenzen, agreed to dissolve Bitzlato and to release any claim over approximately $23 million in Bitzlato’s seized assets.

Legkdoymov’s plea shows the impact on anyone who provides a haven for criminals and their illicit wealth.

According to the report, Bitzlato, a cryptocurrency exchange with global operations and a Hong Kong registration, advertised that it only needed minimal identification from its users; either selfies or passports are required.

The users of Bitzlato can directly submit identifying information, allowing them to provide information. It’s claimed that Bitzlato turned into a haven for money meant for use in illegal activities as a result of these inadequate know-your-customer (KYC) processes.

On multiple occasions, Legkodymov was informed that the cryptocurrency sent through Bitzlato was either meant for use in illegal transactions or was the proceeds of crime.

As a result of this illegal exchange, Legkodymov faces a maximum of 5 years in prison, but the government has not yet confirmed the date.

Latest articles

PoC Exploit Released For Critical Windows LDAP RCE Vulnerability

The CVE-2024-49112 vulnerability in Windows LDAP allows remote code execution on unpatched Domain Controllers,...

New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings

PLAYFULGHOST, a Gh0st RAT variant, leverages distinct traffic patterns and encryption, which spread via...

Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA

The Tycoon 2FA platform is a Phishing-as-a-Service (PhaaS) tool that enables cybercriminals to easily...

Windows 11 BitLocker Encryption Bypassed to Extract Full Volume Encryption Keys

A cybersecurity researcher has demonstrated a method to bypass BitLocker encryption on Windows 11...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

PoC Exploit Released For Critical Windows LDAP RCE Vulnerability

The CVE-2024-49112 vulnerability in Windows LDAP allows remote code execution on unpatched Domain Controllers,...

New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings

PLAYFULGHOST, a Gh0st RAT variant, leverages distinct traffic patterns and encryption, which spread via...

Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA

The Tycoon 2FA platform is a Phishing-as-a-Service (PhaaS) tool that enables cybercriminals to easily...