$90M in stolen crypto seen shifting

Blockonomics is a decentralized and permissionless bitcoin payment solution
7601ce0a-a47e-46d8-9476-f5c9f9d6b9a7.jpg
Bybit

[ad_1]

A hacker dubbed the “Blockchain Bandit” has finally woken from a six-year slumber and has started to move their ill-gotten gains.

According to Chainalysis, around $90 million in crypto pilfered from the attacker’s long-running string of “programmatic theft” since 2016 has started moving over the past week.

This included 51,000 Ether (ETH) and 470 Bitcoin (BTC) — worth a total of around $90 million — leaving the bandit’s address for a new one. Chainalysis noted:

“We suspect that the bandit is moving their funds given the recent jump in prices.”

The hacker was dubbed the “Blockchain Bandit” due to being able to empty Ethereum wallets protected with weak private keys in a process termed “Ethercombing.”

Binance

The attacker’s “programmatic theft” process has drained more than 10,000 wallets from individuals across the globe since the first attacks were perpetrated six years ago.

In 2019, Cointelegraph reported that the Blockchain Bandit managed to amass almost 45,000 ETH by successfully guessing those frail private keys.

A security analyst said he discovered the hacker by accident while researching private key generation. He noted at the time that the hacker had set up a node to automatically filch funds from addresses with weak keys.

The researchers identified 732 weak private keys associated with a total of 49,060 transactions. It is unclear how many of those were exploited by the bandit, however.

“There was a guy who had an address who was going around and siphoning money from some of the keys we had access to,” he said at the time.

6543edc7 5c47 4a0a bc7c 3a052a9ed1c7
Blockchain Bandit crypto movements. Source: Chainalysis

Chainalysis produced a diagram depicting the flow of the funds, however, it did not specify the target address, only labeling them as “intermediary addresses.”

To avoid having weak private keys, Chainalysis advised users to use well-known and trusted wallets and consider moving funds to hardware wallets if large amounts of cryptocurrency are involved.

Related: Hackers keeping stolen crypto: What is the long-term solution?

Also in 2019, a computer researcher discovered a wallet vulnerability that issued the same key pairs to multiple users.

[ad_2]

Source link

[wp-stealth-ads rows="2" mobile-rows="3"]