What happens when the hacked cryptocurrency is hacked again? How did government-secured Bitfinex funds return to the blockchain maze?
Here we go again…
Surprisingly, a crypto wallet controlled by the US government that holds over $20 million in seized digital assets made an unexpected move on the blockchain on October 24.
The wallet, which was linked to the infamous Bitfinex hack in 2016, had been dormant for months until yesterday. Within minutes, blockchain analysts at Arkham Intelligence flagged unusual transfers, raising questions about a possible security breach.
𝗨𝗣𝗗𝗔𝗧𝗘: 𝗨𝗦 𝗚𝗼𝘃𝗲𝗿𝗻𝗺𝗲𝗻𝘁 𝗹𝗶𝗻𝗸𝗲𝗱 𝗮𝗱𝗱𝗿𝗲 𝘀𝘀 𝗮𝗽𝗽𝗲𝗮𝗿𝘀 𝘁𝗼 𝗵𝗮𝘃𝗲 𝗰𝗼𝗺𝗽𝗿𝗼𝗺𝗶𝘀𝗲𝗱 𝗳𝗼𝗿 𝗳𝗼𝗿 𝟮𝟬𝗠 𝟮𝟬𝗠.
$20 million USDC, USDT, aUSDC and ETH were moved from address 0xc9E6E51C7dA9FF1198fdC5b3369EfeDA9b19C34c, suspiciously linked to USG, to the following address: pic.twitter.com/UXn1atE1Wx
— Arkham (@ArkhamIntel) 24 October 2024
Let’s rewind. In 2016, crypto exchange Bitfinex suffered a major attack, resulting in the theft of a large amount of Bitcoin (BTC).
After a lengthy investigation, authorities tracked down the stolen assets, which led to the arrest of Ilya Lichtenstein and Heather Morgan.
But the story doesn’t end there. This latest activity has brought the Bitfinex hack into the spotlight once again, with more than $20 million in compromised funds seemingly out of government control.
What happened to these assets and why are analysts calling this a “possible theft”? Here’s what we know so far about this mysterious multi-million dollar stablecoin and Ethereum (ETH) transfer, the wallets in question, and how it may have happened under the government’s nose.
Digital robbery has come full circle
To solve the mystery of the missing millions, let’s go back to where it all began: the Bitfinex hack in 2016. At the time, Bitfinex was one of the world’s largest crypto exchanges holding large amounts of Bitcoin for its users.
On a typical August day, the platform suffered a massive breach, allowing hackers to seize approximately 120,000 Bitcoins; This marked one of the largest heists in crypto history, valued at around $72 million at the time but worth over $8 billion today.
The story took an unexpected turn in 2022 when US authorities tracked down two suspects: a New York couple, Ilya Lichtenstein and Heather Morgan.
While Morgan’s alter ego as a rapper and social media figure attracted attention, the real shock came when authorities recovered a significant portion of the stolen assets.
These assets were then secured in government-controlled wallets, marking the largest digital asset seizure in the history of the Department of Justice.
But on October 24, another development emerged when $20 million in crypto assets (funds tied to the original Bitfinex hack) were mysteriously moved from one of these secure wallets.
Blockchain analysts at Arkham Intelligence noticed the unusual activity within minutes, raising alarms about what appeared to be a possible theft.
Labeled “0x348” and only five days old, this wallet has become the holding point for a mix of stablecoins and Ethereum.
From there, the assets were dispersed through smaller transactions and routed to various other wallets, possibly as part of a broader strategy to disguise the original source and destination.
Don’t follow your footsteps
The move began with a large withdrawal of funds from the popular DeFi platform Aave (AAVE). Approximately $1.1 million in Tether (USDT) and $5.5 million in USD Coin (USDC) were initially withdrawn.
Shortly after, the largest portion (about $13.7 million in USDC, a token representing USDC deposits on Aave) was also withdrawn.
These amounts and $446,000 in ETH were transferred to a new wallet labeled “0x348,” an address with no prior transaction history, raising immediate suspicions of immediate involvement in the management of the seized funds.
From there the complexity grew. The person behind these transfers used an exchange aggregator called 1inch (1INCH), a platform that finds the best rates across multiple exchanges, to convert stablecoins to Ethereum; It was a deliberate effort to cover the tracks, as Ethereum’s fluidity on the chain makes it easy to split. and move funds in smaller amounts.
Ethereum chunks worth around $40,000 each began leaking into deposit addresses associated with major exchanges, including Binance, which was flagged as potentially suspicious by ZachXBT.
funds will be exchanged instantly, looks bad
— ZachXBT (@zachxbt) 24 October 2024
Although Binance is not directly involved, these “nested exchanges” are dependent on Binance for liquidity, effectively hiding funds within Binance’s broader network.
This technique, often used for laundering, allows significant amounts of cryptocurrencies to be “washed” and quietly reintroduced into circulation, avoiding detection on major exchanges.
Inside work or security breach
Speculation is inevitable when $20 million worth of cryptocurrency escapes from a government-controlled wallet. Was this an inside job involving someone with access to private keys? Or did an outside party exploit a vulnerability in the government’s crypto storage system?
One theory suggests an insider breached. Crypto wallets rely entirely on the security of their private keys. The capture of these keys (by phishing, hacking, social engineering, or someone with direct insider access) could explain how such a large sum was transferred quickly and covertly.
Historically, private keys have been the Achilles heel of crypto wallets. Control of keys implies control over assets, and the planned transfers of this event to specific wallets, exchange aggregators, and intertwined exchanges indicate the presence of a sophisticated actor familiar with crypto transactions and laundering tactics.
Another possibility is that there is a lack of government security protocols for storing digital assets.
Traditional financial institutions often use multiple layers of security for high-value assets, such as multi-signature wallets (requiring multiple transaction confirmations) or offline hardware wallets.
While it is unclear what protocols the U.S. government applies to seized digital assets, any failure in multi-signature processes or custody storage could result in funds being compromised.
According to Arkham Intelligence, these wallets had been dormant for approximately eight months before the sudden move, raising questions about what might have triggered the transfer after such a long period of inactivity.
Finally, external hackers have a chance to target the wallet remotely. This will likely involve exploiting known vulnerabilities in DeFi platforms like Aave or weaknesses in the security of the wallet itself.
Advanced hacking methods can allow hackers to compromise or control wallets remotely; but these require complex planning and technical skill.
For now, we expect investigators to work to establish stronger standards to recover funds and protect both government assets and the broader crypto ecosystem from similar breaches in the future.