‘Bitcoin Bonnie & Clyde’ Go To Jail 

A husband and wife cyber crime team have pleaded guilty to trying to launder $4.5bn (£3.5bn) of Bitcoin that he had stolen in a hack in 2016. This was the US’s biggest-ever crypto-currency theft case.

Heather Morgan and Ilya Lichtenstein were arrested last year in Manhattan, New York after police traced their riches back to the crypto heist. While evading police, Morgan masqueraded as a rapper and tech entrepreneur. As part of a plea deal, Lichtenstein admitted he was behind the hack.

US Deputy Attorney General Lisa Monaco said, “Today’s arrests, and the department’s largest financial seizure ever, show that cryptocurrency is not a safe haven for criminals... In a futile effort to maintain digital anonymity, the defendants laundered stolen funds through a labyrinth of cryptocurrency transactions. Thanks to the meticulous work of law enforcement, the department once again showed how it can and will follow the money, no matter what form it takes.”

Lichtenstein has pleaded guilty to conspiracy to commit money laundering, which could land him a maximum sentence of 20 years in prison. His wife has also pleaded guilty to one count of money laundering conspiracy and one count of conspiracy to defraud the United States. Both counts carry a max of five years in prison, which means that Morgan could serve up to 10 years in jail.

The couple both pleaded guilty to money laundering, but Morgan pleaded guilty to an additional count of conspiracy to defraud the United States.

In spite of attempting to cover up her crimes, Morgan published dozens of expletive-filled music videos and rap songs filmed in locations around New York, under the name Razzlekhan.

Morgan also had sidelines in the painting, fashion design and writing worlds, where she pitched herself as a kind of corporate coach. One of her recent pieces was titled, in part, “Tips to Protect Your Business from Cybercriminals” and featured an interview with a cryptocurrency exchange owner about how to prevent fraud. In her lyrics she called herself a "bad-ass money maker" and "the crocodile of Wall Street".

Morgan also claimed to be a successful tech businesswoman, calling herself an "economist, serial entrepreneur, software investor and rapper". But while developing her rapping and tech persona, she and her computer programmer husband were attempting to cash out their fortune stolen from the crypto firm Bitfinex.

The couple now face prison sentences with Lichtenstein in line for a possible maximum 20 years in prison and Morgan a possible 10.

At the time of their arrest their theft of 119,000 Bitcoins was worth about $4.5bn, making it the US Department of Justice's largest single financial seizure in its history. When the hack was carried out, the Bitcoins were worth about $71m.

Court documents showed in detail how the couple cashed out millions of dollars of the Bitfinex Bitcoins into traditional money using sophisticated techniques to try to stay under the radar. The successful police operation is the latest case to utilise tools able to analyse transactions on Bitcoin's public blockchain ledger. One of the couple's key mistakes was shopping with Walmart supermarket vouchers paid for with the stolen funds.

Police successfully decrypted a spreadsheet meticulously detailing the couple's intricate methods for laundering the stash, allowing them to recover nearly the full amount.

Prosecutors say they uncovered communication records that indicate Morgan and Lichtenstein were planning to flee the US for Russia, which is his country of birth. If successful, they would have probably lived a billionaire lifestyle, safe from arrest by the US.

BBC:     Yahoo:     The Guardian:     U.S. Dept of Public Affairs:     The Times:     Yahoo:     Metro

 

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« EvilProxy Hits Microsoft 365 Business Accounts
X Will Fund Claims Made By Unfairly Treated Users »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

Academic Centres of Excellence in Cyber Security Research

Academic Centres of Excellence in Cyber Security Research

The ACE-CSRs scheme is part of the UK Government’s National Cyber Security Strategy, working with academia and industry to make the UK more resilient to cyber attacks.

Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich & Rosati (WSGR)

WSGR is the premier provider of legal services to technology, life sciences, and growth enterprises worldwide. Practice areas include cybersecurity and data protection.

Assured Information Security (AIS)

Assured Information Security (AIS)

AIS is committed to providing our customers with critical information security products, services, and training. We support diverse needs throughout business and industry.

Neupart

Neupart

Neupart provides Information Security Management System, Secure ISMS, allowing organisations to automate IT Governance, Risk and Compliance management.

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

Yellow Brand Protection

Yellow Brand Protection

Yellow Brand Protection operates 24/7 to protect brands' Intellectual Property (IP) from infringements on all kinds of online distribution channels.

PizzlySoft

PizzlySoft

PizzlySoft is a global company that is seeking convergence of network and security / software and hardware. We put our value on creating the best security.

Finnish Security & Intelligence Service (SUPO)

Finnish Security & Intelligence Service (SUPO)

The Finnish Security and Intelligence Service is a government agency tasked with combating serious threats to national security in Finland.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

Ministry of Electronics & Information Technology (MeitY)

Ministry of Electronics & Information Technology (MeitY)

The Ministry of Electronics & Information Technology is an executive agency responsible for IT policy, strategy and development of the electronics industry.

NREL Clean Energy Cybersecurity Accelerator (CECA)

NREL Clean Energy Cybersecurity Accelerator (CECA)

The Clean Energy Cybersecurity Accelerator advances cyber innovation to defend modern, renewable energy technologies against high-priority cybersecurity risks to the energy sector.

Endure Secure

Endure Secure

Endure Secure is a managed cyber security & information security consultancy. Our passion for IS and our understanding of the threat landscape is reflected in the services that we provide.

Canadian Cyber Threat Exchange (CCTX)

Canadian Cyber Threat Exchange (CCTX)

The CCTX is Canada’s not-for-profit, private-sector cyber threat sharing hub and collaboration centre.