Tokyo’s police authorities arrested two men last Wednesday, March 11, for keeping stolen NEMs (XEM) from the Coincheck hack of 2018. This follows the discovery of the Japanese crypto trading firm Coincheck about questionable transfers of US$534 million [AU$851 million] worth of XEM.

The Japanese residents who were arrested are Takayoshi Doi and Masaki Kitamoto, a doctor from Hokkaido and an executive from Osaka, respectively. The investigators also claimed that the alleged were already aware that the XEMs they held in their possession were illegally acquired.

Millions pocketed of ill-gotten XEM

Kitamoto had already admitted his guilt and pocketed around $19 million worth of stolen tokens. The XEMs that they bought were sold at a very low price on the dark web.

Tokyo police traced the trail of the fund transfers and got in touch with those who were suspected to have received some of the stolen XEM. Blockchain tracking tools might have also been used to track them down.

Prosecutors also said that they used over 100 investigators from their manpower in order to hunt down those who were involved in the Coincheck hack.

What happened in the Coincheck hack of 2018?

At the end of January 2018, Coincheck reported losing around $530 million worth of XEMs from hackers who stole from their network.

This prompted Coincheck to immediately inform 260,000 of their affected users about the security breach against its trading platform. Coincheck also promised to repay lost XEM from users at a value pegged at ¥88.549 (JPY) per XEM.

Shortly after, blockchain analysts and observers noticed that the XEM stolen from the network are being illicitly transferred. In March 2018, they recorded that a little over 40% of the stolen tokens from Coincheck had already been illegally processed.

The tokens that were stolen from the breach were exchanged for Bitcoin (BTC) and Litecoin (LTC) before they were transferred to more than 13,000 wallets.

bitcoin keys

A Nikkei report also revealed that almost all of the stolen XEM are being laundered through deep web channels. Those who sold XEM through these channels priced them at a very low rate in spot markets.

What many were unsure of is whether the hackers have been able to withdraw all of the stolen XEM. This is most probably because many crypto-exchange platforms heightened their security and monitoring measures following the aftermath of the hacking.

Is there anything to follow?

By March 2018, the NEM Foundation disabled the mosaic trackers of the stolen XEM because it proved to be ineffective after the hackers exchanged them for BTC and LTC.

Those who sold the stolen NEM even went as far as establishing a ticket system and only recognized BTC and LTC as their medium of exchange.

At present, the primary perpetrators of the hack might still be at large. But currently, Tokyo investigators seem to be looking on catching first those who purchased the stolen tokens.

In most countries, buying stolen goods for later reselling on a profitable margin is considered “fencing,” which is also a criminal act.

Micky is a news site and does not provide trading, investing, or other financial advice. By using this website, you affirm that you have read and agree to abide by our Terms and Conditions.
Micky readers – you can get a 10% discount on trading fees on FTX and Binance when you sign up using the links above.

Source link

Leave a Reply

Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App







National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.