Coincheck Hackers Have Already Laundered 40% of 500 Million Stolen NEM

Coincheck Hackers Have Already Laundered 40% of 500 Million Stolen NEM

The hackers behind the record-setting Coincheck theft have successfully laundered 40 percent of the approximately 500 million NEM tokens (XEM) they stole from the exchange in January, cybersecurity consultants say.

Citing research from Tokyo-based consultancy group L Plus, Nikkei reports that the hackers have laundered an estimated 200 million XEM, worth $79.3 million on the open market at the time of writing.

However, it is likely the hackers made far less than that figure, as evidence indicates the funds were likely laundered through dark web channels since the NEM Foundation and reputable cryptocurrency exchanges have been working together to blacklist the stolen funds.

The Tokyo Metropolitan Police Department has reportedly assigned about 100 police officers to investigate the Coincheck hack, and this task force has identified suspicious activity at the exchange in the weeks leading up to the theft.

Apparently, the hackers infiltrated Coincheck’s servers by hacking an employee’s email account, after which they were able to gain access to the private key to the platform’s NEM hot wallet, from which they stole 500 million XEM — worth $530 million at the time of the hack but just $198 million today.

An unnamed source familiar with the investigation told Nikkei that the laundered funds, which have largely been traded for Bitcoin, will likely eventually be converted into fiat currency. It is unclear whether any of stolen funds have already been cashed out.

The identity of the hackers also remains a mystery, although previous reports have said that the attack bore similarities to cyber attacks that have been linked to North Korean state-sponsored hackers.

Japanese financial regulators have ramped up their oversight of cryptocurrency exchanges in response to the hack, and the country’s licensed trading platforms have announced that they will form a self-regulatory body that, if approved by the government, will have enforcement power over its members.

As CCN reported, Coincheck intends to resume trading this week following a government-mandated overhaul of its security systems.

The exchange will also begin compensating the estimated 260,000 customers who lost funds as the result of the hack. Notably, users will be compensated in fiat at a rate of nearly 89 JPY (~$0.83) per token, which is more than double the present XEM/JPY exchange rate.

Featured image from Shutterstock.

12.03.2018 / 10:10 84
Japanese Exchange Coincheck Begins JPY Refunds for NEM Hack Victims Japanese Exchange Coincheck Begins JPY
As of today, Tokyo-based Coincheck has begun distributing reparations to users impacted by the infamous late January theft of some $530 million in
Coincheck Cryptocurrency Traders to Receive $230 Million Additional NEM Coincheck Cryptocurrency Traders to
The most recent news update on the Coincheck heist is better than expected for the 260,000 traders who lost money in the theft. The Japanese
Coincheck to Begin Compensating NEM Hack Victims Next Week Coincheck to Begin Compensating NEM
Japanese cryptocurrency exchange Coincheck has confirmed it will commence compensating users impacted by the $530 million NEM theft in January, from
Grand Theft Rigs: Icelandic Police Search for 600 Stolen Bitcoin Miners Grand Theft Rigs: Icelandic Police
Following a series of thefts involving hundreds of bitcoin miners, Icelandic police are investigating what is reportedly the biggest thieving spree
Coincheck’s $534M of Stolen NEM Found By Blockchain Forensics Firm Coincheck’s $534M of Stolen NEM Found
BIG Blockchain Intelligence Group has reported that its Forensic and Investigations Division has successfully followed the laundered proceeds from
Japan’s Cryptocurrency Exchanges Self-Regulate After $530 Million NEM Theft Japan’s Cryptocurrency Exchanges
A total of 16 registered Japanese cryptocurrency exchanges are establishing a self-regulatory body in April, within months of the infamous $530
Comments (0)
Add a comment
Comment on