Inside the $90M Nobitex hack: a layer-by-layer breakdown – CoinJournal


Nobitex hack exposes $90 million loss, links emerge to Israeli spy arrests
  • Hacking group Gonjeshke Darande leaked sensitive user data.
  • Israeli authorities arrested three citizens for spying for Iran.
  • Past Nobitex transactions show signs of money laundering activity.

The fallout from the Nobitex hack is expanding beyond missing funds.

The $90 million breach of Iran’s largest cryptocurrency exchange, which took place on 18 June, has now been linked to a potential espionage case involving Israeli and Iranian operatives.

According to blockchain intelligence firm TRM Labs, three Israeli citizens were arrested on 24 June for allegedly spying for Iran, and the hack may have played a key role in their exposure.

The suspects, aged between 19 and 28, are believed to have been recruited by Iranian handlers and were reportedly paid in cryptocurrency.

Their tasks included photographing military sites, tagging pro-Iranian graffiti, tracking the movements of senior officials, and gathering surveillance data.

Israeli authorities claim that some of the crypto transactions linked to the suspects were traceable on-chain and may have been identified using data leaked from Nobitex.

Gonjeshke Darande claims responsibility for breach

The attack on Nobitex was carried out by the pro-Israeli hacking group Gonjeshke Darande, also known as Predatory Sparrow.

The group, known for targeting Iranian-linked infrastructure, has previously engaged in cyber operations believed to serve intelligence purposes.

Following the June 18 breach, Nobitex’s internal systems were compromised, and over $90 million in digital assets were drained.

The attackers subsequently leaked sensitive data, including potential wallet details, Know Your Customer (KYC) records, and internal communications.

This leak was published just one day after the hack, suggesting a high level of access and coordination.

Although there is no confirmed direct link between the Nobitex breach and the arrests, TRM Labs indicated that leaked data from the exchange may have assisted Israeli authorities in identifying crypto payments and associated user data linked to the espionage case.

Crypto payments, on-chain tracking, and evidence

According to TRM Labs, the arrested individuals received thousands of dollars in cryptocurrency in exchange for carrying out intelligence tasks.

These payments were channelled through anonymised systems but eventually traced using blockchain analysis.

The crypto transfers formed a crucial part of the evidence used in the investigation.

At the same time, investigators uncovered suspicious historical fund flows from Nobitex.

These included structured transactions designed to bypass detection and linkages to wallets previously flagged for illicit activity.

The extent of the exchange’s exposure has raised questions about Nobitex’s internal controls and compliance practices.

The TRM analysis indicates that the same infrastructure used by operatives to receive payments may have been exposed during the hack.

This suggests that the breach’s consequences go beyond financial loss and extend into national security territory.

Nobitex faces scrutiny over past transfers

As investigations into the breach deepen, analysts have noted that some of Nobitex’s past transactions reveal potential ties to money laundering schemes.

Funds were reportedly routed through multiple wallets and exchanges to obscure their origin, with certain patterns matching known tactics used by threat actors.

While the exchange has not issued a detailed breakdown of the losses or the leaked data, the rapid emergence of evidence supporting the Israeli arrests suggests that Gonjeshke Darande may have targeted more than just user balances.

The operation could have been designed to expose hidden relationships between Iranian state-linked crypto channels and individuals operating abroad.

The dual impact of the attack — financial damage and intelligence exposure — is drawing renewed attention to the vulnerability of cryptocurrency exchanges in geopolitically sensitive regions.

Nobitex now finds itself at the centre of a growing web of suspicion involving cybercrime, espionage, and sanctions evasion.



Source link

Similar Posts

  • 第三部分:杯形和肩形交易 | BitMEX Blog

    本文将进一步探讨领口延续模式,包括杯柄模式和头肩模式,以及它们的独特布局对任何交易者来说都至关重要。本博客是系列文章的一部分,该系列已经涵盖了图表模式基础知识、延续模式指南和三角形的作用。 什么是杯柄模式? 杯柄图表是一种看涨模式。它在视觉上类似于一个茶杯,资产价格会形成一个圆形的底部(称为“杯”),然后是短暂的盘整(称为回调),这将在看涨突破之前发生。 关于趋势线 杯形形成: 杯形底部是识别过程的第一阶段。它的特点是 U 形或 V 形的圆形,价格先逐渐下降,然后逐渐上升,从而形成杯底的弧度。然而,杯的深度可以变化——它通常应该具有平滑、圆润的形状,而不是突然的反转,例如 V 形走势。 柄形形成: 一旦杯形被识别,应在杯的顶点附近观察到短暂的盘整期,这构成了柄。通常,柄表现为价格相对较小的向下或横向移动。 成交量:在杯形形成期间,交易量下降,表明卖压减少。在柄形形成期间,成交量略有增加是模式确认指标。一旦价格开始突破柄,交易量应大幅增加,表明兴趣重新燃起并确认突破强度。 突破确认: 从柄的上方阻力位突破是确认模式的主要信号。突破后应伴随着交易量的增加。这表明买盘兴趣增加,并确认模式的上涨潜力。 对称性:杯的左右两侧应在形状和长度上对称。对称性增强了模式的可靠性。 支撑位和阻力位: 模式的主要支撑位和阻力位可用于确定突破和确认点的可能性。阻力位通常位于杯和柄的顶点。突破水平用作阻力,突破后转化为支撑. 如何确认杯柄模式: 模式结构: 确保杯柄模式遵循其特征结构。杯应呈圆润的U形或V形,表明从下跌趋势到上涨趋势的逐渐转变。柄应在杯的上部显示出轻微的向下或横向移动,代表一个盘整阶段。 成交量趋势: 突破后,观察成交量趋势。突破后几天持续高成交量表明市场仍对该模式感兴趣,并确认该模式具有上涨潜力。 什么是头肩模式? 头肩是一种常见的技术图表模式,用于金融市场中表示趋势反转。它由三个峰组成,中央峰形成头部,两个较小的峰形成肩部。这种模式最常在趋势从上涨趋势转变为下跌趋势时观察到。当它出现在上涨趋势之后时,它通常被认为是看跌模式,并且由于其独特的形状,初学者很容易识别。 头肩模式的指标是什么? 三个峰:该模式由三个峰组成:一个中央峰(头部)和头部两侧的两个较低峰(肩部)。左右肩应对称,头部是身体的最高点。 谷(颈线):模式的颈线由两个谷组成。这些谷连接左肩的最低点到头部,以及头部到右肩。这条颈线是水平或略微倾斜的。 成交量: 在左肩形成和头部形成期间,交易量趋于增加,然后在右肩形成期间下降。颈线突破后交易量显著增加,增加了反转的可能性。 如何使用延续模式进行交易: 上涨趋势背景: 重要的是要确保模式出现在长期上涨趋势之后。头肩等反转模式表明上涨趋势可能正在减弱。 颈线突破:模式的确认发生在价格跌破颈线时。这表明模式已完成,并且可能正在形成新的下跌趋势。 成交量确认: 颈线突破期间的成交量激增使模式更强劲。 理论之外,如果您希望开始在 BitMEX 交易加密衍生品或现货,您可以在此处找到我们所有现有产品。有关 BitMEX 交易(尤其是衍生品)的更多教育资源,请访问此页面。 要第一时间了解我们的新上架、产品发布、豪礼大放送等,我们邀请您加入我们的一个在线社区并与其他交易者联系。要获取最新消息,您还可以在 Twitter 上关注我们,或阅读我们的博客和网站公告。 Related Source link

  • Bitcoin tops $98,000 as rally gains momentum – CoinJournal

    Bitcoin has jumped to $98,370, its highest-ever price as bulls target $100,000. The flagship cryptocurrency has rallied higher since Donald Trump’s re-election on Nov. 5 Bitcoin’s march towards $100,000 continued Thursday as the benchmark crypto asset broke past $98,000 for the first time ever. Having hit $97k earlier in the day, BTC showed no mercy…

  • Malaysia’s Largest Energy Firm Reports 300% Rise in Crypto-Linked Power Theft – Decrypt

    In brief Electricity theft cases jumped from 300% in 2018 to 2024 as crypto mining in the country grows. Joint operations with authorities have shut down numerous illegal mining operations nationwide. Some property owners report bills of up to $278,400 as tenants set up unauthorized mining rigs. Malaysia’s largest national electric utility company, Tenaga Nasional…

  • Cross-Chain Restaking Protocol, StakeLayer, Set to Launch $STAKELAYER Token – Crypto-News.net

    London, UK, October 8th, 2024, Chainwire StakeLayer has announced the launch of its Cross-Chain Restaking Protocol, a solution which offers users the ability to restake their assets across multiple blockchains, including Bitcoin, Ethereum, Solana, TON, and more.  StakeLayer’s native token, $STAKELAYER, is set to debut on Wednesday, October 9th at 2 PM UTC. The team…

  • Warning Sign for Crypto: Stablecoins See Historic $7B Weekly Dip

    Binance saw its largest weekly net outflows since Nov 2025, with over $6B leaving across BTC, ETH, and USDT. Stablecoin supply on the Ethereum network fell by roughly $7 billion over the past week, dropping from $162 billion to $155 billion, according to on-chain data shared by analyst Darkfost. The move stands out because…

  • Enhancing Large Language Models with NVIDIA Triton and TensorRT-LLM on Kubernetes

    Iris Coleman Oct 23, 2024 04:34 Explore NVIDIA’s methodology for optimizing large language models using Triton and TensorRT-LLM, while deploying and scaling these models efficiently in a Kubernetes environment. In the rapidly evolving field of artificial intelligence, large language models (LLMs) such as Llama, Gemma, and GPT…

Leave a Reply

Your email address will not be published. Required fields are marked *