{"id":14963,"date":"2024-11-17T17:49:47","date_gmt":"2024-11-17T17:49:47","guid":{"rendered":"http:\/\/thisbiginfluence.com\/?p=14963"},"modified":"2024-11-17T17:49:47","modified_gmt":"2024-11-17T17:49:47","slug":"bitfinex-hacker-gets-5-years-for-10-billion-bitcoin-heist","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=14963","title":{"rendered":"Bitfinex Hacker Gets 5 Years for $10 Billion Bitcoin Heist"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>In maybe essentially the most lovely hacker story of the yr, a trio of technologists in India discovered an modern solution to <a href=\"https:\/\/www.wired.com\/story\/apple-airpods-hearing-aid-hack\/\">circumvent Apple\u2019s location restrictions on AirPod Pro 2s<\/a> so they may allow the earbuds\u2019 listening to help characteristic for his or her grandmas. The hack concerned a home made Faraday cage, a microwave, and plenty of trial and error.<\/p>\n<p class=\"paywall\">On the opposite finish of the tech-advancements spectrum, the US army is at present testing <a href=\"https:\/\/www.wired.com\/story\/us-military-robot-drone-guns\/\">an AI-enabled machine gun<\/a> that&#8217;s able to auto-targeting swarms of drones. The Bullfrog, constructed by Allen Management Techniques, is one in every of a number of superior weapons applied sciences within the works to fight the rising risk of low-cost, small drones on the battlefield.<\/p>\n<p class=\"paywall\">The US Division of Justice introduced this week that an 18-year-old from California has <a href=\"https:\/\/www.wired.com\/story\/alan-filion-torswats-guilty-plea-federal-charges-swatting\/\">admitted to making or orchestrating more than 375 swatting attacks<\/a> throughout america.<\/p>\n<p class=\"paywall\">Then, after all, there\u2019s the Donald Trump of all of it. This week, we revealed <a href=\"https:\/\/www.wired.com\/story\/the-wired-guide-to-protecting-yourself-from-government-surveillance\/\">a practical guide to protecting yourself from government surveillance<\/a>. WIRED has lined the hazards of presidency surveillance for many years, after all. However when the president-elect is explicitly threatening to jail his political enemies\u2014whoever which may be\u2014now\u2019s most likely an excellent time to brush up in your digital finest practices.<\/p>\n<p class=\"paywall\">Along with potential dragnet surveillance of US residents, US Immigration and Customs Enforcement <a href=\"https:\/\/www.wired.com\/story\/ice-surveillance-contracts-isap\/\">started ramping up its surveillance arsenal<\/a> the day after Trump received reelection. In the meantime, specialists expect the incoming administration to <a href=\"https:\/\/www.wired.com\/story\/trump-administration-cybersecurity-policy-reversals\/\">roll back cybersecurity rules instituted under president Joe Biden<\/a> whereas taking a more durable line in opposition to adversarial state-sponsored hackers. And if all this political upheaval has you within the temper to protest, beware: An <a href=\"https:\/\/www.wired.com\/story\/the-real-problem-with-banning-masks-at-protests\/\">investigation copublished by WIRED and The Marshall Project<\/a> discovered that masks bans instituted in a number of states add a sophisticated new layer to exercising freedom of speech.<\/p>\n<p class=\"paywall\">And that\u2019s not all. Every week, we spherical up the privateness and safety information we didn\u2019t cowl in depth ourselves. Click on the headlines to learn the total tales, and keep secure on the market.<\/p>\n<p class=\"paywall\">In August 2016, roughly 120,000 bitcoin\u2014on the time price round $71 million\u2014have been stolen in a hack on the Bitfinex cryptocurrency alternate. Then in 2022, as the worth of cryptocurrency had rocketed skywards, regulation enforcement officers in <a href=\"https:\/\/www.wired.com\/story\/bitcoin-seizure-record-doj-crypto-tracing-monero\/\">New York arrested husband and wife Ilya Lichtenstein and Heather Morgan<\/a> in relation to the hack and laundering the much-inflated $4.5 billion of stolen cryptocurrency. (On the time, $3.6 billion of the funds have been recouped by regulation enforcement investigators.)<\/p>\n<p class=\"paywall\">This week, after pleading responsible in 2023, Lichtenstein was <a href=\"https:\/\/www.bbc.co.uk\/news\/articles\/c2dl70wed1lo\">sentenced to five years of jail time<\/a> for conducting the hack and laundering the earnings. With subsequent cryptocurrency spikes and extra seizures associated to the hack, the US authorities has now been in a position to recuperate greater than <a data-offer-url=\"https:\/\/www.trmlabs.com\/post\/ilya-lichtenstein-sentenced-for-role-in-bitfinex-hack-in-razzlekhan-case-as-government-recovers-about-10-billion-in-stolen-funds\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.trmlabs.com\/post\/ilya-lichtenstein-sentenced-for-role-in-bitfinex-hack-in-razzlekhan-case-as-government-recovers-about-10-billion-in-stolen-funds&quot;}\" href=\"https:\/\/www.trmlabs.com\/post\/ilya-lichtenstein-sentenced-for-role-in-bitfinex-hack-in-razzlekhan-case-as-government-recovers-about-10-billion-in-stolen-funds\" rel=\"nofollow noopener\" target=\"_blank\">$10 billion in assets<\/a>. A <a href=\"https:\/\/www.wired.com\/story\/bitcoin-seizure-record-doj-crypto-tracing-monero\/\">series of operational security failures<\/a> by Lichtenstein made a lot of the illicit cryptocurrency simple for officers to grab, however investigators additionally utilized refined crypto-tracing strategies to unpick how the funds had been stolen and subsequently moved round.<\/p>\n<p class=\"paywall\">Apart from the brazen scale of the heist, Lichtenstein and Morgan gained on-line prominence and mock after their arrests attributable to a sequence of Forbes articles written by Morgan and <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-66390639\">rap videos posted to YouTube<\/a> below the identify of \u201cRazzlekhan.\u201d Morgan, who additionally pleaded responsible, is because of be sentenced on November 18.<\/p>\n<p class=\"paywall\">Scammers are more and more adopting AI as a part of their felony toolkits\u2014utilizing the expertise to <a href=\"https:\/\/www.wired.com\/story\/yahoo-boys-real-time-deepfake-scams\/\">create deepfakes<\/a>, <a href=\"https:\/\/www.wired.com\/story\/pig-butchering-scams-go-high-tech\/\">translate scripts, and make their operations more efficient<\/a>. However synthetic intelligence can be being turned in opposition to the scammers. British telecoms agency Virgin Media and its cell operator O2 have created a brand new \u201cAI granny\u201d that may reply <a data-offer-url=\"https:\/\/www.theregister.com\/2024\/11\/15\/o2_ai_granny\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.theregister.com\/2024\/11\/15\/o2_ai_granny\/&quot;}\" href=\"https:\/\/www.theregister.com\/2024\/11\/15\/o2_ai_granny\/\" rel=\"nofollow noopener\" target=\"_blank\">phone calls from scammers and keep them talking<\/a>. The system makes use of totally different AI fashions, in line with The Register, that hearken to what a scammer says and reply instantly. In a single case, the corporate says it stored a scammer on the road for 40 minutes and has fed others pretend private info. Sadly, the system (at the least in the meanwhile) can\u2019t immediately reply calls made to your telephone; as a substitute, O2 created a particular telephone quantity for the system, which the corporate says it has managed to get positioned in lists of numbers that scammers name.<\/p>\n<p class=\"paywall\">In a brand new authorized technique for these making an attempt to carry business adware distributors accountable, lawyer Andreu Van den Eynde, who was allegedly hacked with NSO Group adware, is immediately accusing two of the corporate\u2019s founders, Omri Lavie and Shalev Hulio, and one in every of its executives, Yuval Somekh, of hacking crimes in a lawsuit. The Barcelona-based human rights nonprofit Iridia introduced this week that it filed the grievance in a Catalan courtroom. Van den Eynde was reportedly a sufferer of a hacking marketing campaign that used NSO\u2019s infamous Pegasus adware in opposition to at the least 65 Catalans. Van den Eynde and Iridia initially sued NSO Group in a Barcelona courtroom in 2022 together with associates Osy Applied sciences and Q Cyber Applied sciences. \u201cThe folks chargeable for NSO Group have to elucidate their concrete actions,\u201d a authorized consultant for Iridia and Van den Eynde wrote within the grievance, which was written in Catalan and translated by TechCrunch.<\/p>\n<p class=\"paywall\">Analysis revealed this week by the cell gadget administration agency Jamf discovered that hackers who&#8217;ve been linked to North Korea have been working to implant malware inside macOS functions constructed with a specific open-source software program improvement equipment. The campaigns centered on cryptocurrency-related targets and concerned infrastructure just like techniques which have been utilized by North Korea\u2019s infamous Lazarus Group. It\u2019s unclear if the exercise resulted in precise sufferer compromise or if it was nonetheless in a testing section.<\/p>\n<p class=\"paywall\">Financially motivated and state-backed hackers have much less event to make use of malware concentrating on Apple\u2019s Mac computer systems than hacking instruments that infect Microsoft Home windows or Linux desktops and servers. So when Mac malware crops up, it\u2019s sometimes a distinct segment level, however it may also be a revealing indicator of tendencies and priorities amongst hackers.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/bitfinex-hacker-gets-5-years-for-10-billion-bitcoin-heist\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In maybe essentially the most lovely hacker story of the yr, a trio of technologists in India discovered an modern solution to circumvent Apple\u2019s location restrictions on AirPod Pro 2s so they may allow the earbuds\u2019 listening to help characteristic for his or her grandmas. The hack concerned a home made Faraday cage, a microwave, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14965,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[4089,11,11287,6481,7332,1049],"class_list":["post-14963","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-billion","tag-bitcoin","tag-bitfinex","tag-hacker","tag-heist","tag-years"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/14963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14963"}],"version-history":[{"count":0,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/14963\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/14965"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}