{"id":94859,"date":"2025-05-20T05:15:32","date_gmt":"2025-05-20T05:15:32","guid":{"rendered":"https:\/\/neclink.com\/index.php\/2025\/05\/20\/crypto-crooks-now-eating-their-own-as-crypto-holders-targeted-in-crime-even-violent-coinbase-hack-an-inside-job-and-highly-damaging-to-wallet-holders\/"},"modified":"2025-05-20T05:15:32","modified_gmt":"2025-05-20T05:15:32","slug":"crypto-crooks-now-eating-their-own-as-crypto-holders-targeted-in-crime-even-violent-coinbase-hack-an-inside-job-and-highly-damaging-to-wallet-holders","status":"publish","type":"post","link":"https:\/\/neclink.com\/index.php\/2025\/05\/20\/crypto-crooks-now-eating-their-own-as-crypto-holders-targeted-in-crime-even-violent-coinbase-hack-an-inside-job-and-highly-damaging-to-wallet-holders\/","title":{"rendered":"Crypto Crooks Now Eating Their Own as Crypto Holders Targeted in Crime, Even Violent; Coinbase &#8220;Hack&#8221; an Inside Job, and Highly Damaging to Wallet-Holders"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Our early observation that crypto = prosecution futures is playing out, including along some lines we had not anticipated. <a href=\"https:\/\/archive.is\/b5tXu#selection-921.523-921.624\" rel=\"nofollow noopener\" target=\"_blank\">The New York Times<\/a> and Wall Street Journal each have major stories that ran over the weekend on coordinated criminal action against large crypto holders. So far, these are perpetrated by members of the crypto community, but the increased role of violence indicates organized crime are watching these comparative amateurs and looking for ways in. <\/p>\n<p>Keep in mind that being a crypto-asset-holder makes you more likely to be pilfered in a big way. <a href=\"https:\/\/archive.is\/b5tXu#selection-1001.131-1001.162\" rel=\"nofollow noopener\" target=\"_blank\">From the New York Times<\/a>:<\/p>\n<blockquote>\n<p>Although just 10 percent of all financial fraud complaints [to the FBI\u2019s Internet Crime Complaint Center] were crypto-related, the losses associated with those complaints accounted for nearly 50 percent of the total.<\/p>\n<\/blockquote>\n<p>The real picture is sure to be worse. A crypto-heist victim who was engaged in illicit activity, or mere garden-variety bad conduct like not reporting income on crypto sales to the IRS is pretty certain not to talk to the FBI and potentially open up other cans of worms. <\/p>\n<p>These stories are appearing shortly after a major Coinbase \u201chack,\u201d which appears to be anything but. Even though Coinbase maintains no wallets were compromised, the company offered to reimburse any impacted customers, which says the reverse.<sup>1<\/sup> Regardless of the state of compromised 97,000 customers\u2019 wallets, the information grabbed was considerable (including potentially biometric ID), offering ample opportunity for mischief like targeting other financial accounts for pilferage and identity fraud.<\/p>\n<p>But let\u2019s start with the big weekend stories first. Both feature violence in the perpetration of these crimes; the Wall Street Journal makes that the focus of its account. Both illustrate how readily some very young men have slid from small bore crimes that started with another crimogenic community. The monetization of video game assets like desirable names moved into the crypto-sphere as a result of thefts and other abuses when trying to complete transactions using more traditional payment mechanisms like PayPal. <\/p>\n<p>Both <a href=\"https:\/\/archive.is\/b5tXu#selection-921.523-921.624\" rel=\"nofollow noopener\" target=\"_blank\">the New York Times<\/a> and Wall Street Journal stories are hum-dingers. I urge you to read them in full.<\/p>\n<p>First to the Gray Lady, <a href=\"https:\/\/archive.is\/b5tXu#selection-921.523-921.624\" rel=\"nofollow noopener\" target=\"_blank\">They Stole a Quarter-Billion in Crypto and Got Caught Within a Month<\/a>. <\/p>\n<p>The story lovingly chronicles the wild spending spree that followed the heist, including an over $569,000 tab in one evening at a nightclub. It starts with a kidnapping in tony and normally staid Danbury Connecticut, of Sushil and Radhika Chetal, driving  a $240,00 Lamborghini Urus. Witnesses called police, who were flummoxed that the perps has abandoned the vehicle. They managed to catch one of them, enabling them to unravel the case. <\/p>\n<p>It turns out the Chetals are the parents of one 19 year old Veer Chetal, who was one of the actors in the heist of $243 million of Bitcoin. The crime ring, astonishingly, had conned the Bitcoin holder into taking a call from someone who pretended to be from Google\u2019s security team.<sup>2<\/sup><\/p>\n<p>The information extraction on this conversation facilitated a second call, this time supposedly from Gemini, where the victim had a small (well, small for him at $4.5 million) account:<\/p>\n<blockquote>\n<p>Like the supposed Google employee, he had the man\u2019s personal information; he explained that his Gemini account, which held about $4.5 million worth of coins, had been hacked and that the man needed to reset his two-factor authentication and transfer the Bitcoin in his account to another wallet to keep it safe.<\/p>\n<p>The person on the phone then suggested that the account holder download a program that would provide additional security. The man agreed, not knowing that he was downloading a remote-desktop app, which would give the caller access to his computer \u2014 and access to a second crypto account.<\/p>\n<\/blockquote>\n<p>So the crooks got to the big stash entirely by accident.<\/p>\n<p>The New York Times waxes heavy on the role of crypto sleuth ZachXBT, but does seem deserving of accolades; for instance, his monitoring tools enabled him to see the draining of the $243 million Bitcoin wallet, one where there would be no obvious reason for that activity. The showy spending called attention to the monster theft. In internet bragging, Veer Chetal mistakenly included a shot of his own computer screen, which enabled him to be identified. Other crooks decided to kidnap his parents to get Veer to turn over his ill-gotten lucre. <\/p>\n<p>But the part I found interesting was not the crime drama of the tracking of the baddies or the salaciousness of their spending spree, but (to put it in stereotyped terms), how these kids came to embrace a life of crime:<\/p>\n<blockquote>\n<p>Classmates remember Chetal as shy and a fan of cars\u2026one day in the middle of his senior year, when he showed up at school driving a Corvette\u2026.Soon Chetal rolled up in a BMW, and then a Lamborghini Urus. <\/p>\n<p>Chetal said that he had made his money trading crypto\u2026<\/p>\n<p>Independent investigators say Chetal was secretly a member of the Com, also referred to as the Comm or the Community, an online network of chat groups that has its roots in the hacking underground of the 1980s and functions as a kind of social network for cybercriminals or aspiring ones\u2026According to the F.B.I. affidavit and experts who study the Com, the various subgroups\u2019 activities include swatting, which entails making false reports to emergency services or institutions like schools to trigger a police response; SIM swapping, when hackers take over a target\u2019s phone number, sometimes by tricking customer-service representatives; ransomware attacks, using a malware that denies users or organizers access to computer files; cryptocurrency theft; and corporate intrusions.<\/p>\n<p>Allison Nixon, the chief research officer of\u2026a collective of cybersecurity experts\u2026says most Com members are young men from Western countries\u2026The gateway for many is through video games like RuneScape, Roblox and Grand Theft Auto.<\/p>\n<p>By the mid-2010s\u2026Minecraft evolved into a highly competitive battle zone. With that came opportunities to monetize and scam. Servers soon began to introduce in-game purchases that gave players upgrades, like the ability to fly and to fight with more powerful weapons and armor. Other in-game purchases bought users stylish character outfits, which were wielded to show status online.<\/p>\n<p>As players gravitated toward these competitive servers, a large black market for in-game items and valuable user names started to blossom on Discord. With Minecraft dominated by young players, the black market became ripe for fraud. Users agreed to trade in-game items for real money via PayPal, but once the money was received, scammers would block the user\u2019s account\u2026<\/p>\n<p>One prized possession in this world is high-value user names\u2026which could go for upward of $10,000.<\/p>\n<p>As faction-based servers and the Minecraft black market thrived, so did cryptocurrencies, which eventually supplanted PayPal on these servers. It was this combination of a consequence-free training ground for competition, gambling and fraud, with a growing familiarity with crypto, that turned Minecraft servers into a cesspool for budding cybercriminals.<\/p>\n<\/blockquote>\n<p>I hate to sound like an old fart, but I have always harbored doubts about the online gaming world. Even from a considerable distance, it seems to attract a cohort that has an addictive attachment. Compulsions are not only bad for the subject, but can be exploited. <\/p>\n<p>The account continues:<\/p>\n<blockquote>\n<p>A common tactic used by the Com today to steal cryptocurrency is what\u2019s called social engineering, which entails manipulating users into divulging sensitive information\u2026.Sometimes, Com members will then return to the Minecraft black market to launder their stolen crypto by buying valuable game items and selling the items for real dollars using PayPal.<\/p>\n<\/blockquote>\n<p>The article continues with the spending spree of the thieves, in particular one Malone Lam, who left a money trail so big it could be detected from space. Another track of the story is how the Feds found the members of a group out of Florida that kidnapped the Chantal parents:<\/p>\n<blockquote>\n<p>The six Florida men reflect a growing faction of the Com, those less interested in online schemes and more concerned with using brute force..<\/p>\n<p>In the F.B.I. affidavit, an agent said the Com regularly commits \u201cbrickings, shootings and firebomb attacks.\u201d In 2022, according to reporting from Brian Krebs, an independent investigative journalist, a young man who went by the moniker Foreshadow was kidnapped and beaten by a rival SIM-swapping gang and held for a $200,000 ransom. In October 2023, a 22-year-old named Patrick McGovern-Allen of Egg Harbor Township, N.J., was sentenced to 13 years in prison for participating in violence-for-hire jobs after being contracted by a group of cybercriminals. Last November, it was reported that the chief executive of a Toronto-based crypto company was kidnapped and held for a $1 million ransom. A few weeks later, after a 13-year-old known as the Gen Z Quant Kid created a crypto coin and inflated its value, the crypto community responded by doxxing him and his family and, it is rumored, kidnapping his dog. In January this year, a founder of the French crypto company Ledger was kidnapped with his wife; the kidnappers mutilated his hand and demanded a multimillion-dollar ransom in cryptocurrency.<\/p>\n<\/blockquote>\n<p>And Com is also breeding recidivists:<\/p>\n<blockquote>\n<p>The twin episodes \u2014 the crypto heist and the kidnapping \u2014 suggest that the complete lawlessness of Com members\u2019 online lives allowed them to imagine that they could get away with similar exploits in the real world. \u201cI don\u2019t think they really learn,\u201d ZachXBT says. \u201cI\u2019ve seen a lot of them, after they either get either arrested, have assets seized, et cetera \u2014 I see a lot of them go back to what they were doing before.\u201d<\/p>\n<\/blockquote>\n<p>The Wall Street Journal focuses on violent crypto crimes, with the graphic headline <a href=\"https:\/\/archive.is\/cdEkW\" rel=\"nofollow noopener\" target=\"_blank\">Severed Fingers and \u2018Wrench Attacks\u2019 Rattle the Crypto Elite<\/a>. Key bits:<\/p>\n<blockquote>\n<p>Three men in black masks had jumped on a 34-year-old woman whose father runs Paymium, a French cryptocurrency exchange\u2026the assailants bludgeoned the husband\u2026.<\/p>\n<p>With other neighbors closing in, and a shopkeeper readying to throw a fire extinguisher, the would-be abductors jumped in the back of their van and sped off. <\/p>\n<p>The brazen attack was the latest in a wave of violent abductions around the world, including several in the U.S., targeting crypto executives and their families. Victims have been pistol whipped, abducted, and\u2014in two cases\u2014had fingers severed.<\/p>\n<p>The criminals\u2019 goal: millions of dollars in ransom in cryptocurrency. <\/p>\n<p>The assaults are often called \u201cwrench attacks\u201d because they rely on simple tools for inflicting pain to coerce victims, rather than sophisticated tools for hacking them. <\/p>\n<p>\u2026to thwart hackers, savvy cryptocurrency investors have increasingly taken their digital wallets offline in favor of physical devices, making remote theft more difficult. Real-world crypto crime bypasses those safeguards.<\/p>\n<\/blockquote>\n<p>After more examples, plus the statement that there have been \u201cdozens\u201d more instances around the world, the article ominously notes: <\/p>\n<blockquote>\n<p>Some of the assaults have been clumsy, with the criminals quickly caught. But there are signs that organized-crime rings see major profit potential. <\/p>\n<\/blockquote>\n<p>But fortunately, at least for now, the victims have been high profile. <\/p>\n<p>But will the recent Coinbase misnamed \u201chack\u201d<sup>3<\/sup> of 97,000, which exposed information that would greatly assist actual hackers, lead to much smaller and\/or secretive fry being targeted? The Journal notes that in addition to the Coinbase information breach, officials are also concerned about a hack of 272,000 at Ledger, a company that makes devices for storing cryptokeys off the Internet, and Kroll, which exposed information about creditors in the Gemini bankruptcy (notice the role that seems to have played in the big Bitcoin heist profiled in the New York Times).  <\/p>\n<p>More on Coinbase:<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Coinbase hackers weren\u2019t after funds, they were after identities. <\/p>\n<p>How are we okay with still trusting these 3rd party companies with our info \u2013 info that becomes more and more sensitive as more of our lives move online (and on chain) ?<\/p>\n<p>\u2014 Anna Rose (@AnnaRRose) <a href=\"https:\/\/twitter.com\/AnnaRRose\/status\/1923109418217988352?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"nofollow noopener\">May 15, 2025<\/a><\/p>\n<\/blockquote>\n<p>And they appear to have gotten quite the information haul: <a href=\"https:\/\/www.sec.gov\/Archives\/edgar\/data\/1679788\/000167978825000094\/coin-20250514.htm?7194ef805fa2d04b0f7e8c9521f97343\" rel=\"nofollow noopener\" target=\"_blank\">From the Coinbase 8-K<\/a>:<\/p>\n<blockquote>\n<p>While the Company is still investigating the affected data, it included:<\/p>\n<blockquote>\n<p>\u2022Name, address, phone, and email;<br \/>\u2022Masked Social Security (last 4 digits only);<br \/>\u2022Masked bank-account numbers and some bank account identifiers;<br \/>\u2022Government\u2011ID images (e.g., driver\u2019s license, passport);<br \/>\u2022Account data (balance snapshots and transaction history); and<br \/>\u2022Limited corporate data (including documents, training material, and communications available to support agents).<\/p>\n<\/blockquote>\n<\/blockquote>\n<p>Name, address, phone, e-mail, and government ID images???? That alone is an identity theft party even before getting to the other details. In addition, US passport photos are now required to be at biometric ID standards. If the images at Coinbase were high enough fidelity, that creates additional exposure.  Keep in mind quite a few Social Security numbers are already for sale on the dark web. And the 8-K wording indicates there could be more.<\/p>\n<p>It should come as no surprise that crypto, whose main use case has been the illicit movement of funds to facilitate crime, including tax evasion, would become a criminogenic environment. But that makes it even more startling to see governments still promoting crypto as some sort of \u201cinnovation\u201d in the face of that. And there are many many true believers:<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">JUST IN: Coinbase is joining the S&amp;P 500. <a href=\"https:\/\/t.co\/Ufi5ONr6sc\" target=\"_blank\" rel=\"nofollow noopener\">pic.twitter.com\/Ufi5ONr6sc<\/a><\/p>\n<p>\u2014 Brew Markets (@brewmarkets) <a href=\"https:\/\/twitter.com\/brewmarkets\/status\/1922040768086118907?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"nofollow noopener\">May 12, 2025<\/a><\/p>\n<\/blockquote>\n<p>____<\/p>\n<p><sup>1<sup> Not the only seemingly legit complaint on Twitter:<\/sup><\/sup><\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">\ud83d\udea8 My Coinbase account was hacked \u2014 and right after I tried to buy Toshi Coin! In this video, I break down the nightmare experience, what went wrong, how much I lost, and what you need to know to protect yourself. \ud83d\udca5 What You\u2019ll Learn: How the hack happened (step-by-step) What <a href=\"https:\/\/t.co\/XyDJPXH1bq\" target=\"_blank\" rel=\"nofollow noopener\">pic.twitter.com\/XyDJPXH1bq<\/a><\/p>\n<p>\u2014 Jay talks Crypto (@jaytalkscrypto) <a href=\"https:\/\/twitter.com\/jaytalkscrypto\/status\/1924053489669271901?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"nofollow noopener\">May 18, 2025<\/a><\/p>\n<\/blockquote>\n<p><sup>2<\/sup> Being a Bitcoin whale may create an undue sense of self-importance. Since when does Google have live people call individual users?  I\u2019ve been called only for harassment as a company owner, and then only automated ones based on an obvious lack of comprehension (Local ads? Seriously?) <\/p>\n<p><sup>3<\/sup> More detail:<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">It&#8217;s clear Coinbase was not &#8220;hacked&#8221; reading the 8-K Material Facts statement they made to the SEC: <a href=\"https:\/\/twitter.com\/coinbase?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"nofollow noopener\">@Coinbase<\/a> employees sold customer data. People\/media need to stop referring to it as a hack, as it minimizes blame<\/p>\n<p>Take this as another data point for 3rd party custodian risks <a href=\"https:\/\/t.co\/RSMbbQ9BS5\" target=\"_blank\" rel=\"nofollow noopener\">pic.twitter.com\/RSMbbQ9BS5<\/a><\/p>\n<p>\u2014 MAGS \ud83d\udd11\u26cf\ufe0f\ud83d\ude92 (@Crypto_Mags) <a href=\"https:\/\/twitter.com\/Crypto_Mags\/status\/1923500737079935171?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"nofollow noopener\">May 16, 2025<\/a><\/p>\n<\/blockquote>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Coinbase outsourced jobs to overseas contractors. Some of them took bribes from hackers and sold sensitive customer data. This is what happens when companies offshore just to save a buck. <a href=\"https:\/\/t.co\/RQ1RFh2ZSx\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/t.co\/RQ1RFh2ZSx<\/a><\/p>\n<p>\u2014 U.S. Tech Workers (@USTechWorkers) <a href=\"https:\/\/twitter.com\/USTechWorkers\/status\/1923157115020931334?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"nofollow noopener\">May 15, 2025<\/a><\/p>\n<\/blockquote>\n<div class=\"printfriendly pf-alignleft\"><a href=\"#\" rel=\"nofollow\" onclick=\"window.print(); return false;\" title=\"Printer Friendly, PDF &amp; Email\"><img decoding=\"async\" style=\"border:none;-webkit-box-shadow:none; -moz-box-shadow: none; box-shadow:none; padding:0; margin:0\" src=\"https:\/\/cdn.printfriendly.com\/buttons\/print-button-gray.png\" alt=\"Print Friendly, PDF &amp; Email\"\/><\/a><\/div>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/www.nakedcapitalism.com\/2025\/05\/crypto-crooks-now-eating-their-own-as-crypto-holders-targeted-in-crime-even-violent-coinbase-hack-an-inside-job-and-highly-damaging-to-wallet-holders.html\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our early observation that crypto = prosecution futures is playing out, including along some lines we had not anticipated. The New York Times and Wall<\/p>\n","protected":false},"author":1,"featured_media":94860,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[153,183],"tags":[],"class_list":["post-94859","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-economy","category-spotlight"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts\/94859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/comments?post=94859"}],"version-history":[{"count":0,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts\/94859\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/media\/94860"}],"wp:attachment":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/media?parent=94859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/categories?post=94859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/tags?post=94859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}