Saturday, February 15, 2025
HomeCyber AttackFormer Security Engineer Arrested for Stealing $9 Million from Crypto Exchange

Former Security Engineer Arrested for Stealing $9 Million from Crypto Exchange

Published on

SIEM as a Service

Follow Us on Google News

Shakeeb Ahmed, a former security engineer, has been arrested for defrauding a decentralized crypto exchange and stealing over $9 million.

A digital currency exchange, also known as a cryptocurrency exchange (DCE), is a company that enables individuals to trade cryptocurrencies or digital currencies for other assets, such as traditional fiat money or other digital currencies.

This marks the first criminal case involving a smart contract operated by a decentralized exchange.

Vulnerability in Crypto Exchange’s Smart Contracts

In July 2022, Ahmed took advantage of a vulnerability in smart contracts and inserted fake pricing data, resulting in fraudulent gains of approximately $9 million. He also utilized “flash loans” to defraud the crypto exchange.

Utilizing his specialized skills as a senior security engineer, he forcefully carried out the attack by reverse engineering smart contracts and conducting rigorous blockchain audits.

After committing theft, he made the decision to return all of the stolen money except for $1.5 million to the Crypto Exchange, on the condition that they did not report the incident to law enforcement.

Ahmed concealed the source and ownership of the millions he stole from the Crypto Exchange by laundering them through fees, including (i) conducting token-swap transactions, (ii) “bridging” fraud proceeds from the Solana blockchain over to the Ethereum blockchain, (iii) exchanging fraud proceeds into Monero, an anonymized and particularly difficult cryptocurrency to trace, and (iv) using overseas cryptocurrency exchanges.

After this, he started to search online for these criminal accountabilities with similar previous attacks; he searched about ‘defi hack’ and search several news about these articles For example: searching for the term “wire fraud” and for the term “evidence laundering.”

Particularly he searched “can I cross the border with crypto,” “how to stop the federal government from seizing assets,” and “buying citizenship”; and he visited a website titled “16 Countries Where Your Investments Can Buy Citizenship.

“The case is being prosecuted by the Office’s Money Laundering and Transnational Criminal Enterprises Unit and Complex Frauds and Cybercrime Unit.  Assistant U.S. Attorneys David R. Felton and Kevin Mead are in charge of the prosecution.”

As a consequence of the attack, he was sentenced to 20 years in prison in New York.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Fake BSOD Attack Launched via Malicious Python Script

A peculiar malicious Python script has surfaced, employing an unusual and amusing anti-analysis trick...

SocGholish Malware Dropped from Hacked Web Pages using Weaponized ZIP Files

A recent wave of cyberattacks leveraging the SocGholish malware framework has been observed using...

Lazarus Group Targets Developers Worldwide with New Malware Tactic

North Korea's Lazarus Group, a state-sponsored cybercriminal organization, has launched a sophisticated global campaign...

North Korean IT Workers Penetrate Global Firms to Install System Backdoors

In a concerning escalation of cyber threats, North Korean IT operatives have infiltrated global...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Fake BSOD Attack Launched via Malicious Python Script

A peculiar malicious Python script has surfaced, employing an unusual and amusing anti-analysis trick...

SocGholish Malware Dropped from Hacked Web Pages using Weaponized ZIP Files

A recent wave of cyberattacks leveraging the SocGholish malware framework has been observed using...

Lazarus Group Targets Developers Worldwide with New Malware Tactic

North Korea's Lazarus Group, a state-sponsored cybercriminal organization, has launched a sophisticated global campaign...