Securing the Weakest Link U.S. Government’s Cryptocurrency Tracing Capacity on Full Display in Civil Forfeiture Action

Polsinelli
Contact

Polsinelli

The U.S. Department of Justice (“DOJ”) filed a civil forfeiture complaint detailing two hacks of virtual currency exchanges by North Korean actors. These actors stole millions of dollars’ worth of cryptocurrency or other digital assets and ultimately laundered the funds through Chinese and other over-the-counter (“OTC”) cryptocurrency traders.[1] The complaint filed in United States Federal Court in the District of Columbia identified 280 accounts that were used to launder the stolen assets.

The complaint details two related hacks of digital assets allegedly orchestrated by North Korea. In the summer of 2019, a virtual currency exchange was hacked by an actor tied to North Korea, who stole over $250 million worth of alternative cryptocurrencies and tokens, including Proton Tokens, PlayGame tokens, and IHT Real Estate Protocol tokens. The funds were laundered over several months through multiple intermediary addresses and other virtual currency exchanges in a process known as “chain-hopping.” In an effort to obfuscate the transaction path, the defendants converted the traceable cryptocurrency into Bitcoin, Tether, or other forms of cryptocurrency that are more difficult to trace. Despite the sophisticated laundering techniques used, law enforcement was able to trace the illicit transactions.

The second hack, which involved a U.S. based company (possibly an investment fund) focused on the Algorand blockchain, occurred in September 2019. In this instance, the North Korea associated hacker gained access to the virtual currency wallets, held by the company on other platforms, and digital assets held by the company’s partners. The hacker stole nearly $2.5 million and laundered it through more than 100 different accounts at another virtual currency exchange. The funds from both of the hacks were allegedly laundered by the same group of Chinese OTC actors.

DOJ’s announcement last month reveals two noteworthy developments in this type of investigations: U.S. Cyber Command will now be a player in similar investigations and the Cryptocurrency Strike Force’s expertise and skill in tracing and seizing virtual currency are beyond what criminals previously thought possible. This case is the most recent example of the U.S. government’s use of sophisticated tracking tools to identify and take action against parties that are using blockchain technology for nefarious purposes.

These cases serve as good reminders of the old adage that you are “only as strong as your weakest link,” which is particularly true of blockchain technology. Even if a blockchain has perfect internal security the data, and the value tied to that data, can be stolen by hacking an exchange, which has often been a weak point of digital asset security. Exchanges and other “off chain” transactions, such as personal wallets in the case of the second hack, are proving to be the Achilles heel of blockchain networks.

 

[1] In cryptocurrency markets, over-the-counter trades are also facilitated by OTC brokers who negotiate directly with the buyer and seller. The OTC broker finds buyers and sellers for a trade. OTC trades are thought to offer greater liquidity and increased anonymity.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Polsinelli | Attorney Advertising

Written by:

Polsinelli
Contact
more
less

Polsinelli on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.