Monday, February 24, 2025
HomeCyber AttackFormer Security Engineer Arrested for Stealing $9 Million from Crypto Exchange

Former Security Engineer Arrested for Stealing $9 Million from Crypto Exchange

Published on

SIEM as a Service

Follow Us on Google News

Shakeeb Ahmed, a former security engineer, has been arrested for defrauding a decentralized crypto exchange and stealing over $9 million.

A digital currency exchange, also known as a cryptocurrency exchange (DCE), is a company that enables individuals to trade cryptocurrencies or digital currencies for other assets, such as traditional fiat money or other digital currencies.

This marks the first criminal case involving a smart contract operated by a decentralized exchange.

Vulnerability in Crypto Exchange’s Smart Contracts

In July 2022, Ahmed took advantage of a vulnerability in smart contracts and inserted fake pricing data, resulting in fraudulent gains of approximately $9 million. He also utilized “flash loans” to defraud the crypto exchange.

Utilizing his specialized skills as a senior security engineer, he forcefully carried out the attack by reverse engineering smart contracts and conducting rigorous blockchain audits.

After committing theft, he made the decision to return all of the stolen money except for $1.5 million to the Crypto Exchange, on the condition that they did not report the incident to law enforcement.

Ahmed concealed the source and ownership of the millions he stole from the Crypto Exchange by laundering them through fees, including (i) conducting token-swap transactions, (ii) “bridging” fraud proceeds from the Solana blockchain over to the Ethereum blockchain, (iii) exchanging fraud proceeds into Monero, an anonymized and particularly difficult cryptocurrency to trace, and (iv) using overseas cryptocurrency exchanges.

After this, he started to search online for these criminal accountabilities with similar previous attacks; he searched about ‘defi hack’ and search several news about these articles For example: searching for the term “wire fraud” and for the term “evidence laundering.”

Particularly he searched “can I cross the border with crypto,” “how to stop the federal government from seizing assets,” and “buying citizenship”; and he visited a website titled “16 Countries Where Your Investments Can Buy Citizenship.

“The case is being prosecuted by the Office’s Money Laundering and Transnational Criminal Enterprises Unit and Complex Frauds and Cybercrime Unit.  Assistant U.S. Attorneys David R. Felton and Kevin Mead are in charge of the prosecution.”

As a consequence of the attack, he was sentenced to 20 years in prison in New York.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

GitVenom Campaign Abuses Thousands of GitHub Repositories to Infect Users

The GitVenom campaign, a sophisticated cyber threat, has been exploiting GitHub repositories to spread...

UAC-0212: Hackers Unleash Devastating Cyber Assault on Critical Infrastructure

In a recent escalation of cyber threats, hackers have launched a targeted campaign, identified...

Widespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users

A recent cybersecurity investigation has uncovered a cluster of 16 malicious Chrome extensions that...

Sliver C2 Server Vulnerability Enables TCP Hijacking for Traffic Interception

A significant vulnerability has been discovered in the Sliver C2 server, a popular open-source...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

GitVenom Campaign Abuses Thousands of GitHub Repositories to Infect Users

The GitVenom campaign, a sophisticated cyber threat, has been exploiting GitHub repositories to spread...

UAC-0212: Hackers Unleash Devastating Cyber Assault on Critical Infrastructure

In a recent escalation of cyber threats, hackers have launched a targeted campaign, identified...

Widespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users

A recent cybersecurity investigation has uncovered a cluster of 16 malicious Chrome extensions that...