$3.5M Worth BTC Stolen From Coinsecure Exchange

CEO of exchange believes that it was the inside job and suspects the CSO of the company
13 April 2018   1675

The CEO of the Indian cryptoexchange Coinsecure, accused the head of the security department of his company of stealing 438 bitcoins or about $ 3.5 million at today's rate.

Coinsecure reported the incident on its website, laying out 2 images on the main page. The first image represents a message from the exchange team, the second is a scanned copy of a statement that CEO Coinsecure Mohit Carla sent to the police in New Delhi.

Our system itself has never been compromised or hacked, and the current issue points towards losses caused during an exercise to extract BTG [Bitcoin Gold] to distribute to our customers. Our CSO, Dr. Amitabh Saxena, was extracting BTG and he claims that funds have been lost in the process during the extraction of the private keys.
 

Coinsecure Team

According to the second statement, Saxena told the team that the funds were stolen from the bitcoin wallet of the company.

However, the head of the exchange does not believe the words of his subordinate, which he indicated in a statement sent to the police.

Saxena is "making a false story to divert [his] attention and might have a role to play in this entire incident," Karla said.

The CEO demands that the police seize Saxena's passport, because he believes that his employee "might fly out of the country soon".

Carla founded Coinsecure in 2014. According to him, only he and Saxena had access to private keys from the main wallet of the exchange.

China to Finance Hacker Attacks on Exchanges, - FireEye

Experts believe that the victims of APT41 are industry participants, the development of which is a priority in the current Chinese five-year period
08 August 2019   388

The hacker group APT41 attacks companies in the areas of healthcare, telecommunications, fintech, media, and cryptocurrency exchanges. This activity is funded by the Chinese government, according to analysts of cybersecurity company FireEye.

Experts believe that the victims of APT41 are industry participants, the development of which is a priority in the current Chinese five-year period.

Industries Targeted by APT41
Industries Targeted by APT41

At the same time, APT41 pursues its own goals, extracting financial benefits from attacks, which is unusual for other groups under the Chinese government, according to FireEye.

APT41 is known to include at least two people with the pseudonyms Chzan Xuiguan and Wolfji. The group probably has connections with other hacker organizations like BARIUM and Winnti.

FireEye also evaluated at what time of the day the APT41 attacked the gaming industry (its core target) and businesses from other areas. It turned out that this was happening outside the framework of a standard working day - probably these people, among other things, have the main job.

APT41 Operational Times
APT41 Operational Times

According to the UN Security Council, hackers under the DPRK government stole about $ 2 billion from banking institutions and cryptocurrency exchanges.