Return to Videos
Crypto Fraud
Video Transcript
Lately our forensic firm has been dealing with a lot of crypto theft, mainly because of the “Myth of Security” , crypto trading is not secure or safe.
The 2025 Fraud Surge:
In 2025 alone, cryptocurrency scams and fraud raked in an estimated $17 billion, with impersonation scams growing by 1400% year-over-year.
The “Insider” Threat:
While everyone fears external hackers, a major portion of theft comes from trusted insiders. For example, in May 2025, a major exchange suffered a significant breach due to compromised insider credentials.
The “One-Click” Vulnerability:
You don’t need to break the blockchain’s encryption to steal funds; you just need one compromised private key. In 2025, 88% of stolen funds in the first quarter came from attacks on centralized services where private keys were breached.
Here is a summary of our latest case, where we tracked the crypto fraud and secured the funds in a cold wallet.
- A successful digital asset trading firm, “Crypto Corp.,” suddenly finds itself with a $40 million hole in its books and millions more missing in Bitcoin.
- : This wasn’t an external hack by a hooded figure in a dark room. It was an insider job—a complex scheme of whitelisted wallets, fake internal labels, and sophisticated laundering loops.
- We will break down exactly how crypto trading works, the specific assets involved, and the forensic trail that exposed how the money was stolen and hidden.
II. Educational Context: How Crypto Trading & Custody Works
- 1. What is a Crypto Exchange?
- Explain that companies like “Crypto Corp.” often trade on centralized exchanges (like Binance, Kraken, or HTX).
- Think of these exchanges like the New York Stock Exchange but for digital assets. They hold the funds and match buyers with sellers.
- 2. The Two Types of Wallets (The “Checking” vs. “Savings” Accounts)
- Hot Wallets: Connected to the internet. Used for daily trading and quick liquidity. High speed, higher risk.
- Cold Wallets (Cold Storage): Offline storage (like a digital vault or a USB stick in a safe). Used for long-term security. These are harder to access but much safer.
- Analogy: You don’t walk around with your life savings in your pocket (Hot Wallet); you leave it in a bank vault (Cold Wallet).
- 3. The Assets Involved
- Bitcoin (BTC): The “Digital Gold.” Used here as the primary store of value for the stolen funds.
- Stablecoins (USDT/USDC): “Digital Cash.” Tokens pegged 1:1 to the US Dollar. Used for stability and easy transfer between exchanges.
III. The Theft: How “Crypto Corp.” Was Drained
- 1. The “Whitelisted” Trojan Horse (The Main mechanism)
- The Concept: Exchanges use “Whitelists”—a security feature where you can only withdraw money to approved addresses.
- The Exploit: The insiders at Crypto Corp. added their own personal wallet to the company’s whitelist on the HTX exchange.
- The Trick: They labeled this personal wallet “DERIBIT_IP” in the internal system.
- Why it worked: “Deribit” is a legitimate options exchange. The company thought this wallet was just a bridge to a trading sub-account. In reality, it was a trapdoor. The contract said funds sent there belonged to Crypto Corp., but the blockchain shows they were immediately funneled out.
- 2. Client Diversion (The “Skim”)
- One executive personally gave a wealthy client a Bitcoin address that looked like a Crypto Corp. deposit address but was actually a personal wallet.
- The Evidence: A recording exists where the executive admits, “I did the work, so I kept it”.
- 3. The “Peel Chain” Technique
- They didn’t just empty the accounts at once. They embedded small, automated withdrawals (“peel chains”) inside legitimate internal transfers to avoid triggering large-transfer alarms.
IV. The Cover-Up: Laundering & Obfuscation
- 1. The “Loopback” (Washing via Liquidity)
- The Move: Funds were sent from the theft wallet into a massive “Hot Wallet” at Binance (the world’s largest exchange).
- The Wash: Inside Binance, the funds were mixed with millions of other transactions.
- The Loop: They then withdrew the money back out to new, clean addresses. This “round trip” is designed to break the forensic link between the victim and the thief.
- 2. Mixers & Tumblers
- The forensic trace shows funds moving through specific “Mixer” wallets. These are services designed solely to scramble coins—taking 400 BTC from ten people and spitting out random amounts to different addresses so no one knows whose coin is whose.
- 3. Layering
- They moved the money through at least 5 different exchanges (Binance, Bybit, OKX, etc.) to create a dizzying web of transactions.
V. The Discovery: How Forensics Caught Them
- 1. The “Sitting Duck” Cold Wallet
- Despite all the mixing and looping, the thieves made a mistake. They consolidated the stolen Bitcoin into one final “Cold Storage” wallet.
- The Status: That wallet currently holds nearly 100 Bitcoin (~$40M) and hasn’t moved a single coin since January 2025.
- Forensic Win: We can see the money sitting there on the public blockchain.
- 2. The Password Vault Error
- Investigators found a saved password list (LastPass) linked to the insiders’ email address (ip_Ndod…).
- This list contained the login credentials for the exact exchange accounts used to launder the money, proving who was behind the anonymous keyboards.
VI. Conclusion
- The Takeaway: “Crypto Corp.” fell victim to a breach of trust, but the immutable nature of the blockchain meant the crime couldn’t be hidden forever.
- Final thought: While cold storage is secure for the thief, it also preserves the evidence for the victim. The money is there; now it’s a legal battle to force them to hand over the keys.