A recent article published by Forbes claims that the United States Drug Enforcement Administration (DEA) accidentally sent a hacker who quickly accumulated hundreds of thousands of dollars worth of Ethereum (ETH) fifty thousand dollars worth of cryptocurrencies the agency had seized.
Tether is a stable coin that is linked 1:1 to the US dollar. Earlier this year, the Drug Enforcement Administration (DEA) seized approximately $500,000 worth of Tether from two Binance accounts suspected of being involved in illegal narcotics operations.
The funds were protected within a Trezor hardware-based wallet while kept at a "highly secure" location. These accounts were controlled by the Drug Enforcement Administration (DEA). However, a con artist who made money from a well-known crypto scam quickly undermined the agency's vigilance.
THE CRYPTOCURRENCY AIRDROP SCAM
Keeping a tight eye on the blockchain, the con artist spotted a golden chance when the Drug Enforcement Administration (DEA) attempted to make a test payment of $45.36 in Tether to the United States Marshals Service as part of the routine asset forfeiture procedure.
As soon as the opportunity presented itself, the con artist quickly set up a Bitcoin address that "mimicked" the account of the Marshals by matching the first five and the last four characters.
The con artist took advantage of the widespread practice of copying and pasting lengthy cryptocurrency addresses when they dropped a token into the account of the DEA using the "airdrop" method, giving the appearance that the payment was sent to the Marshals. As a direct result of this error, the Drug Enforcement Administration (DEA) transferred over $55,000 to the con artist in a single transaction.
As soon as the Marshals became aware of the fraudulent transaction, they immediately reported it to the DEA, which then started an investigation in conjunction with the FBI.
According to the article, it was discovered that the ill-gotten gains had been changed into Ethereum and moved to a different wallet.
Investigators noticed that two Binance accounts had been covering the fraudster's "gas fees," which are charges for using the computational power of the Ether network. The identity of the wallet's owner is still unknown, but they did notice that the scammer had been using those fees.
Agents depend on Google to give possible leads through the two Gmail addresses associated with the Binance accounts.
TAKING THE DIGITAL TRAIL
The analysis of the transactions made with the scammer's wallet reveals substantial activity, as stated in the report. Since June, the wallet has received an additional $425,000 in cryptocurrency, bringing the total value of the Ether it stores to about $40,000.
An amazing $300,000 was dispersed among seven different wallets throughout the previous three weeks, making it even more difficult to identify the assets and track down the criminal.
It was discovered that the cryptocurrency seized by the DEA had been misplaced, highlighting the growing incidence of cryptocurrency scams. Customers' reliance on their wallet addresses' first and last characters is regularly taken advantage of in these scams.
Even though tools are available to detect bad addresses, such as Chainalysis' Address Screening, it is still being determined whether the Drug Enforcement Administration (DEA) applies such techniques when dealing with the seizure of Bitcoin assets.
Despite this, cybercriminals continue to exploit vulnerabilities in digital systems, which means that government agencies have no choice but to adopt more stringent verification procedures and use more sophisticated tools to reduce the likelihood of crime and fraud.
The investigation into this high-profile case is ongoing, and the investigators are still working toward finding the criminals and bringing them to justice while pushing law enforcement agencies to upgrade their cybersecurity measures. This investigation has received a great deal of media attention.
Reviewed by cryptopotato
on
August 25, 2023
Rating:



No comments: