• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Cybercrime

The Popcorn box and the second largest bitcoin seizure of history

The U.S. Department of Justice revealed that the robber admitted to stealing more than 50,000 bitcoins from Silk Road marketplace in 2012.

Gert Van de VenbyGert Van de Ven
December 7, 2022
in Cyber Attacks, Cybercrime, News, Scams
0
The Popcorn box and the second largest bitcoin seizure of history

The U.S. Department of Justice revealed the 7th of november 2022 that a man named James Zhong admitted to stealing more than 50,000 bitcoins from the popular Silk Road darkweb marketplace in 2012. He had hidden his crypto wallet in a popcorn box stored in a bathroom closet. This is the second largest bitcoin seizure in Department of Justice history.

The seizure of the 51,676 bitcoins would have taken place in November 2021, when they were worth over $3.36 billion at the time, compared to “approximately $620,000” in 2012, and $1.02 billion at the current price.

“Specifically, law enforcement located 50,491.06251844 bitcoins: a) in a safe located in the basement; and b) on a single-board computer that was hidden under blankets in a popcorn box stored in a bathroom closet.”

Law enforcement also recovered $661,900 in cash, 25 Casascius coins (physical bitcoins) worth approximately 174 bitcoins, an additional 11.116 bitcoins, as well as four one-ounce silver bars, three one-ounce gold bars, four 10-ounce silver bars and one gold coin during the search.

Zhong further “voluntarily surrendered an additional 1,004.14621836 bitcoins” to authorities, and admitted his guilt on November 4. He faces a maximum sentence of 20 years in prison.

According to BBC, Zhong was able to steal money from Silk Road by exploiting a flaw in the website’s payment system. He created several accounts on Silk Road and deposited a small amount of bitcoin into his digital wallets in September 2012. He then withdrew a large amount of cryptocurrency so as not to draw attention. It is the DOJ’s second-largest financial seizure to date, following its seizure of $3.6 billion in allegedly stolen cryptocurrency from the 2016 hack of the crypto exchange Bitfinex, which it announced in February.

The robber have been catch thanks to state-of-the-art blockchain tracing technology. It allows law enforcement to trace back the stolen bitcoin that have been transferred to 10 addresses each containing 1,000 BTC, one of which was associated with the IP address of James Zhong’s computer.

Did you said popcorn time ?

Tags: BitcoinBlockchainDarknet & DarkwebLaw EnforcementSilkroad

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}