Sunday, July 14, 2024

Police Seize $60 Million of Bitcoin That Generated Via Installing Malware But Fraudster Refused to Say Password

The officials of Germany have recently seized a digital wallet that was assumed to carry $60 million in bitcoins; all these bitcoins were acquired through fraudulent online activity. 

Bitcoin has many excellent apparent benefits, like the ability to be anonymously controlled and securely transferred. But cybercriminals used bitcoins frequently for all kind of fraudulent activities. 

But in this case, the main problem is that the experts can’t unlock the wallet because the attacker is not revealing the password to the officials.

The man was sentenced to jail due to his die-hard silence, as the officials found the man unresponsive throughout the whole interrogation. 

“The prosecutor in the Bavarian town of Kempten affirmed that the police officials had made several efforts to crack the code so that they can obtain access to more than 1,700 bitcoins, but they failed in every attempt. 

Where’s the password?

Bitcoins are always stored on software that are known as a digital wallet, and it has been secured through encryption. In every case, a password is used as a decryption key to open the wallet and to access the bitcoin. 

If the user lost the password or forget it, then the user cannot open the wallet anymore. But in this case, the culprit is not giving the password to the officials, and he has been stick to his words of not revealing the password.

However, the fraudster had been sentenced to jail for more than two years for covertly installing software on others’ computers to control their power so that he 

can “mine” or produce bitcoins illegally.

When he was taken to jail, all his stored bitcoin would have been worth a fraction of the current value, which is around $37,400, according to the Coindesk portal. 

It has seen a significant increase in recent month, approaching a record high of $42,000 in January. While apart from this, if the authorities do gain access to the wallet, the bitcoins would be sold and the cash would directly go into the state treasury. 

This will happen because, all these bitcoins were not stolen from any particular person, rather it was freshly mined with all hacked computing methods and power.  

Here, the officials have gained access to the wallet, but they have gained only 86 bitcoins that were not guarded by a password.

Moreover, the government can’t manage to gain access to the remaining 1,700 bitcoins; but, the officials also asserted that the original owner would even not able to access them, either.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.


Latest articles

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data breach, exposing...

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has...

Hackers Using ClickFix Social Engineering Tactics to Deploy Malware

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new method of malware delivery,...

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept...

Hackers Created 700+ Fake Domains to Sell Olympic Games Tickets

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity threat has...

Japanese Space Agency Spotted zero-day via Microsoft 365 Services

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersecurity incident that...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles