The global attack by hackers has Russia and Korea paying bitcoins – Quartz

[ad_2][ad_1]

Users with infected computers in Russia and South Korea are the two biggest redemption lenders to hackers who have mounted a global ransomware attack, called "Wannacry", yesterday, according to new data from Chainalysis, a software provider that works with the banks, the order forces and the bitcoin companies to analyze the blockchain for financial crimes.

All bitcoin transactions are permanently recorded on the blockchain and anyone can view them. Chainalysis crunches these transactions and assigns them to groups of "entities", which could be bitcoin exchanges, wallet suppliers or bitcoin miners. The company found that hackers, who demanded the ransom to be sent to three bitcoin addresses, received a total of nearly $ 23,000 so far in terms of dollars, converted at the time the transaction was made.

The two entities that sent the most money to the hackers were bitcoin exchanges serving the Russian and Korean markets. "If you look at infection rates, a lot is in Russia, so [the data] is completing this, "says Jonathan Levin, a co-founder of Chainalysis." Since we know that infections are also in Russia, I would say they are Russian users. "

The analysis of the computer security company Kaspersky Lab showed that Russia had the highest number of infections, even if South Korea does not appear among the first countries. Here is the list of where the ransom from Chainalysis originated:

Name of the counterparty Counterparty category Value in US dollars of bitcoins sent
BTC-e.com exchange $ 4,270.66
Bithumb.com exchange $ 2,163.48
Bitstamp.net exchange $ 2.012.15
Kraken.com exchange $ 1.917.03
Poloniex.com exchange $ 1,627.24
Unknown Uncategorized $ 1,526.32
Coinbase.com exchange $ 1.043.04
CoinPayments.net merchant services $ 849.30
Unknown Uncategorized $ 774.25
CoinOne.co.kr exchange $ 684.05
LocalBitcoins.com exchange $ 670.84
Gemini.com exchange $ 627.97
MaiCoin.com exchange $ 627.79
Unknown Uncategorized $ 576.62
CoinJar.com exchange $ 550.05
BitPanda.com exchange $ 375.71
Bitfinex.com exchange $ 313.63
Korbit.co.kr exchange $ 312.10
Bittrex.com exchange $ 295.78
Unknown Uncategorized $ 294.16
Unknown Uncategorized $ 253.50
Unknown Uncategorized $ 205.33
BitoEX.com exchange $ 168.11
Xapo.com hosted portfolio $ 165.39
Circle.com exchange $ 101.01
Bter.com exchange $ 91.42
Yunbi.com exchange $ 60.14
Unknown Uncategorized $ 45.28
Paxful.com exchange $ 44.24
Huobi.com exchange $ 43.28
Hashnest.com mining pool $ 20.88
OKCoin.com exchange $ 15.07
Unknown Uncategorized $ 14.56
Unknown Uncategorized $ 9.60
HaoBTC.com mining pool $ 7.21
Unknown Uncategorized $ 5.82
AlphaBay market Tor market $ 5.41
Unknown Uncategorized $ 2.80
ANXPro (Payout wallet) Uncategorized $ 2.07
Silk market Tor market $ 1.85
Total $ 22.775.16
Source: Chainalysis

There are some data warnings. Levin emphasizes that the payments attributed to the "Tor markets", the term used by Chainalysis to describe the darknet markets, are probably "noise" generated by his analysis and should be ignored. The low payment amount also suggests that it is not connected to the ransomware. Each entity could use thousands of addresses, and it is up to Chainalysis to group them carefully. For example, Levin says that an exchange, Poloniex, uses 376,000 bitcoin addresses, all grouped by Chainalysis, allowing proper attribution.

Moreover, just because a payment comes from an exchange that serves Korean or Russian customers does not necessarily mean that the infected users are actually in Korea or in Russia, although this is a reasonable inference. Finally, little is known about BTC-E, the exchange at the top of the list, except for the fact that its operators are anonymous, is one of the longest bitcoin exchanges, and notoriously does not perform the identity checks that regulated exchanges must respect and take care of the ruble-bitcoin market.

[ad_2]Source link