Criminal Gang Physically Assaulting People for Their Cryptocurrency

This is pretty horrific:

…a group of men behind a violent crime spree designed to compel victims to hand over access to their cryptocurrency savings. That announcement and the criminal complaint laying out charges against St. Felix focused largely on a single theft of cryptocurrency from an elderly North Carolina couple, whose home St. Felix and one of his accomplices broke into before physically assaulting the two victims—­both in their seventies—­and forcing them to transfer more than $150,000 in Bitcoin and Ether to the thieves’ crypto wallets.

I think cryptocurrencies are more susceptible to this kind of real-world attack because they are largely outside the conventional banking system. Yet another reason to stay away from them.

Posted on July 18, 2024 at 11:33 AM27 Comments

Comments

TomS. July 18, 2024 2:44 PM

From the DOJ release [1]

10 months, 4 states, multiple violent home invasions.

Assailants compromised victims’ email.

Nothing in a quick perusal about how the specific victims were initially targeted. Ignoring wired’s “untraceable” commentary, assailants were identifed through cryptocurrency transactions including laundering exchanges and mistakes attempting secure messaging.

I don’t see this as a particular risk confined to cryptocurrency. Any person(s) who can be targeted because of disclosure of assets, cultural tendencies [2], legal or illegal activities, is at some degree of risk from criminal actors. Some attention and discretion are required in life, because bad actors are always looking and probing, in person and online.

I hope the judge imposes significant, severe sentences on the assailants and wish comfort, and a restoration of the victims’ peace of mind and freedom to enjoy life.

P.S. Violent home invasions aside, I find plenty of other risks keeping me away from cryptocurrencies.

[1] https://www.justice.gov/usao-mdnc/pr/man-convicted-violent-home-invasion-robberies-steal-cryptocurrency
[2] neighbor was burglarized of Christmas cash saved in the residence

Clive Robinson July 18, 2024 3:00 PM

@ Bruce, ALL,

Re : Easily Transportable value.

“I think cryptocurrencies are more susceptible to this kind of real-world attack because they are largely outside the conventional banking system.”

It’s a lot more than just “outside the conventional banking system”.

In the UK and other places hogh end cars were “grabbed off the street” and gone before the authorities could do anything about it.

Before that there were the “Rolex grabbers” who would just grab the watches and again they would be gone before the authorities could do anything about it.

As far as has been said the valuables were out of the country legitimised and sold on.

Then high end cars were stolen from peoples homes, in some cases because of poor security in the vehicles.

Also there was a gang in London that were targeting people in their homes with a level of violence via torture etc that few recovered from.

The problem is the mentality of the thrives and the fact of easy “grab and run” with value.

So it’s not just Crypto-coins that are going to come under this sort of attack it’s what gives apparently easy gain of value.

However it appears the physical attacks were far less successful than the online attacks for this gang.

So I suspect that we will soon be reading about a new form of home invasion or similar physically violent attack on things that have high value but are easy to transport away and beyond current recovery.

Because the only way to stop it is to stop those with the mentality for this type of violent crime. How you do that is currently an open question as the “old fashioned ways” are considered abhorrent to modern society.

Andy July 18, 2024 3:29 PM

So the jury (?) convicted him guilty but the judge will decide sentencing: the minimum 7 or the maximum life?

Scott N Kurland July 18, 2024 7:18 PM

“I think cryptocurrencies are more susceptible to this kind of real-world attack because they are largely outside the conventional banking system.”

Right; robbers would never go after cash.

Ron Helwig July 18, 2024 8:08 PM

“I think cryptocurrencies are more susceptible to this kind of real-world attack because they are largely outside the conventional banking system. Yet another reason to stay away from them.”

That’s pretty poor logic. We should be staying away from conventional banking because not only can it be stolen by physically assaulting you, but it can also be done systematically by the banking system itself.

That’s the whole reason cryptocurrency was invented, to stop the theft that was happening as part of the system.

The fact that the victims in this case weren’t able to defend themselves was a major problem. The thieves also shouldn’t have known they had any crypto to steal in the first place.

A primary lesson of cryptocurrency is that you are responsible for your security. You cannot help but lose some security and safety when you outsource the risk management. The fact is that crypto allows for relatively easy security of wealth, so no third party is needed.

John Smith July 18, 2024 8:16 PM

This kind of theft has been happening since the dawn of time. How did they know these people had crypto? They probably shouldn’t have been advertising that.

The fact that crypto is outside the conventional banking system is exactly why people should use it, for too long the banks have taken advantage of people while making huge profits off them. Then there’s inflation & other methods of government theft.

You should really research a good cryptocurrency like Bitcoin and why we need one before you condemn it.

Winter July 19, 2024 5:44 AM

I think cryptocurrencies are more susceptible to this kind of real-world attack because they are largely outside the conventional banking system.

The main factor is that it is possible to irreversibly transfer unlimited amounts of value in minutes from your home or even mobile phone.

Although coins can be traced, it is generally very difficult, even in the best of circumstances, to get the money back.

Also, while people are generally careful to keep the amount and location of their capital private, they tend to do so less well with crypto wealth.

That makes crypto wealth easy to lose by accident, fraud, or violence.

Clive Robinson July 19, 2024 8:25 AM

@ Bruce, ALL,

Update on CrowdStrike-Harm,

Apparently news organisations have pushed “OMG End of the World” type news.

So people have tried to go out and stock up on food and water etc.

Only they can not because the tills won’t work, so even “cash buyers” are being rejected… Not good as most by their food for the week coming on a friday evening or during the weekend.

CrowdStrike are already being called CrowdStroke and CrowdStruck amongst the usual plethora of uncomplimentary names and bad wishes and apparently their share price is now only 4/5ths of what it was before and still descending. Some one joked the only reason it’s not lower is the stock exchange computers are affected…

Apparently 60% of “Fortune 500” corps are CrowdStrike customers.

The good news is there is a simple manual fix…

The bad news is it’s “manual” which means a tech support bod has to tippy-tappy on every keyboard, if they can. Not all effected systems have keyboards and there are a lot of those bill-board Displays advertising via the Microsoft BSoD.

But the problem is all those computers with encrypted hard drives… In many cases the BitLocker keys are on a system that can not be accessed any longer…

It’s just coming up to lunchtime in the UK, I think I’m going to make a nice big bowl of popcorn and then set the “out of office” message and have a snooze then go down to the sea-side with a pop-up tent and catch some fish with a “long shore line” to have a barbie and stock up the freezer 😉

There is a song from 1966 by John Denver originally called “Babe I Hate to Go”. Three years later as “Leaving on a Jet Plane” released by “Peter, Paul and Mary” it became the song that most should know (yup even Mos-Def has covered it). It was used by a well known US Airline in their adverts during the 1970’s and still gets used by other airlines etc. Well apparently most are not leaving on their planes as they should because check-in systems are not working.

But as the words auto-played in my mind I found myself changing them 😉

All my bags are packed, I’m ready to fly,
I’m standing here at the end of the line,
I hate to stand in que to just check-in.
But the dawn is long gone,
it’s nearly mid day,
the que is waiting it’s hardly moved,
the ACs down and were all starting to fry,
Already I’m so hot and dry I could die.

Yup I know it needs a bit of work 😉

Snarki, child of Loki July 19, 2024 11:23 AM

THIS is why you cryptocurrency is an insecure scam, and you should keep your assets in Giant Stone Wheels.

Peter A. July 19, 2024 11:52 AM

Individually held funds like cash, crypto, precious metals etc. are more susceptible to individual criminals (gangsters). Collectively held funds like bank money, stock shares, investment certs etc. are more susceptible to collective criminals (banksters). The former are sometimes violent, but you might potentially defend against them with (a threat of) violence. The latter are most often non-violent, but you can’t defend against them, neither with violence or without (by the purportedly civilized way of suing them).

Tough choice.

Bob July 19, 2024 1:20 PM

How do they know who has crypto? Even I don’t even remember I have a cold wallet day to day.

If you’ve got a stockpile, whether it’s crypto, gold, ammo, or rations, don’t talk about it.

Mexaly July 19, 2024 3:41 PM

I’m interested in the details of how crypto owners were targeted, especially if they were filtered by demographics.
But I don’t want to subscribe to WIRED.

JonKnowsNothing July 19, 2024 3:56 PM

@Andy

re: So the jury (?) convicted him guilty but the judge will decide sentencing: the minimum 7 or the maximum life?

IANAL

In USA, we have a detailed document called Sentencing Guidelines. It’s a pretty complex SS of all sorts of variations on the charges.

  • The Prosecution always asks for the worst case, longest term, most difficult sentences.
  • The Defense always asks for the lowest terms, least difficult, best case sentences.

These fall somewhere within this Guideline chart, as a Min-Max (threshold and ceiling) in each area of the chart.

Sentencing Guidelines are detailed documents created by committee of Federal and Judicial branches members.

The judge in the case, does not have to use the sentences suggested by the attorneys or those listed in the document.

Marcy Wheeler often provides analysis on Sentencing Guidelines when the charge matrix is complex.

US States do not have to use the Federal Guidelines, they may have their own matrix settings.

===

Search Terms

United States Federal Sentencing Guidelines

United States Sentencing Commission

  • Three of the members must be federal judges, and no more than four may belong to the same political party. The Attorney General or his designee and the chair of the United States Parole Commission sit as ex officio, non-voting members of the Commission.

Emptywheel .net

Jonathan Golden Harris July 19, 2024 7:42 PM

What is the risk of such an incident targeting firms that custody huge amounts of crypto? E.g. taking hostages to force certain people to grant access to private keys. The countermeasures of having multiple people required to access the keys won’t totally prevent this. If crypto ETFs get big could terrorists use such a strategy to wipe out a large amount of people’s so called wealth.

RAND Corporation July 20, 2024 11:59 AM

@ Mr. Clive Robinson

You forget that CrowdStrike was founded by Russian, Alperovich.
No matter if he lives in U.S., he is still RUSSIAN, by homeland,
by mentality, by education. Nobody knows what kind of levers KGB/FSB
has on him but because of his background he has weak points and they
can be exploited.

If Kaspersky AV is banned, why is not CrowdStrike? There is a clear
RUSSIAN connection and that software and company should not be trusted,
by any means, especially by the government.

Winter July 21, 2024 2:33 AM

@RAND

No matter if he lives in U.S., he is still RUSSIAN, by homeland, by mentality, by education.

In the USA, you should be judged by your actions, not your ancestry.

If Kaspersky AV is banned, why is not CrowdStrike?

Because Kaspersky is in the Russian Federation and is, therefore, beholden to instructions by the Russian state.

CrowdStrike is in the USA and beholden to follow the instructions by US courts.

It is that simple.

Marco Charlin July 21, 2024 1:03 PM

So this is different from hoarding Cash How? I’m not a security expert by any means but I see no difference in this scenario to someone who has a bunch of cash in a home safe. Both are outside the banking system and both are susceptible to the same type of risk. Just that Crypto you do have a better chance of tracing it unless you wrote down all the serial numbers of the Cash bills you had. OF course in both cases you would have been better off with the funds in a Bank, but then you have different risks in place. It is a matter of choice as to the amount of risk and the risk profile you are willing to tolerate. NOTHING is %100 secure.

JonKnowsNothing July 21, 2024 3:23 PM

@Winter, @RAND

re: beholden to laws of state and international laws

This is true of every country and every resident of that country as well as visitors. There really isn’t any differences other than Political Maneuverings.

  • When in Rome do as the Romans

This tiny issue is ignored by everyone that travels outside of their home area. It captures lots of people into legal criminal and civil proceedings based on rules and laws that are not equivalent in your home country. A small deviation can result in years of prison time.

  • After stopping at a light, making a Right Turn while the light is red.

It’s legal in some US States (California) and illegal in many others.

  • Turning onto the wrong side of the roadway

International incidents have happened because someone turned into the correct side of the roadway for their home but the wrong side of the roadway where they were driving.

These are common problems.

The implied issue is

  • Can a government or agency demand compliance or clandestine compliance

The answer is YES.

The USA is not an exception to such activities. The USA does not necessarily require a specific court declaration, as such declarations have been made “generic” in application. You do not get a choice to say No. Your choice is comply or go to jail.

Well… jail is the equivalent of No

Clive Robinson July 22, 2024 7:30 AM

@ Bruce, ALL,

Re : ICT Six degrees of separation and the critical path to Hades.

When people are taught about computer communications networks they get taught that the ICT world is like the roots of a tree. Or even a bunch of chains hanging from a single point. Thus data traverses up then down, with the failing that there is only one path between any two points. Hence every link forms part of a “Critical Path” for one or more points so there is always a “Single Point of Failure” in all the communications paths and actually many. Thus such networks are very fragile and increasingly so as you go up the hierarchy, with one link breaking at the top taking out half the tree from the other half.

Anthropologists and Sociologists get taught early on that people form clusters that form communications nets with multiple cross links giving a multidimensional arrangement that gives rise to the

“Six Degrees of Separation[1].”

But importantly no single path thus “critical path” or “Single Point of Failure”. Thus are usually very robust.

The reality is that in all large communications networks it’s a mixture of both types of networks.

With humans in social groups it’s small multidimensional groups or “tribes” linked by less dimensional paths between “tribes” to form larger social groupings.

With ICT it’s almost the opposite, for reliability the top levels in the hierarchy are almost always linked in a multidimensional way and at the bottom for low cost and simplicity they are linked in simple stars or chains with almost every link being a single point of failure, hence are fragile.

What is not much thought about outside of network engineering is that with data communications networks there is a middle layer where chains/stars become aggregated around local servers or services and these services have two or more connections upwards to increase reliability. It’s this third layer where from an attack point of view the most advantage for an attacker can be found.

I was reminded of this over the weekend with the fall out effects from the CrowdStrike Update “patch” released on Friday.

The reality which will surprise many is that not that many computers were actually “patched” thus “directly effected”.

Yes there were quotes floating around of 20% of computers world wide were effected but that gave the incorrect impression to most people and that in turn caused more problems[2].

What happened was that computers that were not “patched” thus not “directly effected” were “indirectly effected” because they could not “communicate” with services their users wanted to. Because either the service was “Directly Effected” or some intermediary service was “Directly Effected”. Though on reading the MSM it sounded like all major services were Directly Effected, the reality is most major service providers were not. It was mid to small corporate and consumer company “business support services” that got hit (ie organisations who see ICT as a necessary evil not a core business who buy-in rather than develop their ICT solutions).

The reason this CrowdStrike patch caused such wide spread effects is that in many cases it was the “third layer” services and systems that had been patched with it. And they in effect broke the communications links between low reliability chain and star networks connections to the high reliability multiple linked networks.

From a “maximum disruption” perspective hitting this third layer is probably the most advantageous for an attacker.

Especially if they have a certain type of intent, such as getting people to pull in malware[2].

Whilst we have seen similar malware pushing during “lockdown” with “home working” being done on the cheap this is effectively a first.

That is whilst some were aware that “theoretically” the same disruption as lockdown could be done by an attack on third layer systems, I doubt many linked it with using it to push malware.

Well this CrowdStrike “Friday Patch” caused those “weekend worker/users” at home to do the wrong things and we will be seeing the malware fall-out still being cleaned up for months if not a year or so to come.

But the real concern from a “security economics” perspective, is how many “toe-holds” have been created that will cause future abuse of commercial and corporate systems as they are now effectively unlocked “backdoors”.

[1] It’s the notion that socially there are very short chains of no more than six people between you and every one else in your country, continent, or the world,

https://en.wikipedia.org/wiki/Six_degrees_of_separation

But not explicitly stated is that the shorter the chains the more of them there are hence the multidimensional topology that gives multiple chains between any two points. Thus the very high degree of reliability of communication results, as the expression “Gossip spreads faster than weeds” implies. Scientific investigation into “fake news” has shown this to be probable because we all have a threshold where the more people we hear something from, we reach a point where we in turn will tell it to others and so it quickly “snowballs”.

[2] One problem that has been seen is that as the patch went out on a Friday the number of people available to work on it was reduced and so an information vacuum developed. Unfortunately this opened up an opportunity.

Since lockdown people “working from home” over the weekend has increased significantly. These people because they have career effecting deadlines were to put it politely in a form of desperation / panic mode. The vacuum of information allowed those pushing malware to put out “fake news” fixes and “How-Tos”.

Thus desperate people not understanding the problem dropped protections and pulled in malware onto their computers. How many backdoors and toe-holds this will give into corporate networks in the future I’ve no idea, nor has anyone else currently. But I suspect that as with the older APT attacks that were in place for years we will still be seeing the after effects for months if not years.

RAND July 22, 2024 8:19 AM

@ Mr. Winter

Next time Russian embassy contacts Mr. Alperovich and says – “We kidnapped your family member. Please provide us access to this and and this and that system and we release she without any harm. If you won’t obey, you get her back in pieces”.

They have levers. CrowdStrike is a huge security risk in govt systems thanks to the Russian ties.

Clive Robinson July 22, 2024 9:39 AM

Marco Charlin,

Re : Information is not physical.

With regards,

So this is different from hoarding Cash How?

Well cash is physical and bulky and not something you would want to try carrying around in any great quantity. As a rough idea $1million in single bills is about twenty five cubic feet and weighs about a ton. And why only idiots try to do stick-up robberies on banks or shops.

It does not matter if the crypto coin value is $1 or $billion it’s just ones and zeros whizzing down a wire after you push the enter key. There is no staggering around the streets under the weight of it.

But also consider the information about who has or has not got cash is usually quite private. Also people who keep tokens –valuables– of high value but small size tend to keep them locked up in safes that are not in view by anyone. Some even have multiple safes, one with small value items in a wall with a picture or similar over it “just in case” they get raided or for small “day to day stuff” and one longterm safe somewhere else that holds the high value items[1].

One of the problems with these “Public Ledgers” like Blockchains is that they are “public” and whilst they pretend to have anonymity in that personal details are not as such held, transactions are there for all to see and analyse as is the total number of tokens held in a wallet.

So unless the holder of the wallet is extraordinarily careful with how they use it these wallets become traceable back to individuals and any raiders will know exactly how much they are getting.

So contrary to what many think crypto coins really are very bad for your health.

[1] Such hide aways have been found In garage floors with a large steel plate over the top with a 4×4 on top jacked up as though having engine work being done on it or a boat on a trailer etc. Some have been cemented over with a “float coat” over the whole garage floor, so you would beed a Ground penetrating radar to find it. I’m aware of one criminal who built a hidey hole in his garden under a composting bin on a wooden plinth made of shipping pallets that you’d need a fork lift to shift. But also one that made the news in NI who hid a large amount of stolen money in a large “wheely-bin” down the bottom of his garden. But the one that made me laugh was back in the 1980’s the executive of a foreign oil company in Nigeria who whilst kneeling praying at his mothers grave was quietly burying the money he had embezzled. But the best was yet to be, because when the police arrested him and dug the money up it filled four large suitcases… Due to one thing or another by the time the Nigerian Police had escorted him to the near by police station three of the suitcases and two police officers had vanished. One of the missing police officers was later detained at the boarder with a suitcase of money that somehow became miraculously only a quarter full by the time it got to “head quarters”… As expected the executive was finally brought to court and found guilty and jailed… But the bit that made me smile was on being released the oil company gave him his old job back, because they had not been able to find anyone who could run the operation as profitably as he could…

Clive Robinson July 22, 2024 5:45 PM

@ Bruce, ALL,

Re : Microsoft blaim the EU fot this past weekends Blue Screens of Death.

I kid you not Microsoft say it’s all the fault of the EU because the EU came to an arrangement with Microsoft, that let Microsoft off of the hook for it’s multiple anticompetitive blatant attempts to form a monopoly…

Yup, have a read of,

https://www.macrumors.com/2024/07/22/microsoft-blames-european-commission-for-outage/

I thought initially it was a joke, but apparently not…

A little more nuanced background is given in,

https://www.techradar.com/pro/security/microsoft-blames-eu-rules-for-its-inability-to-lock-down-windows-following-crowdstrike-incident

Oh what’s not being said is why Microsoft can not have a “Walled Garden” App-Store like Google and Apple and why Microsoft can not put “jails” oh hardware like Google and Apple can.

My view is the EU is right and should force the same on both Google and Apple.

Locking the kernel to stop the sort of nonsense CrowdStrike and others have caused (even with App-Stores) should be the consumers choice. Not that of the OS and App developers and supposed IP Rights holders.

Because they all have shoddy development practices with next to zero real interest in providing secure systems. And they all want to go back to the age of “Big Iron Licencing” that totally stifled innovation and did not really provide any worth while security benefit for the end users who they were stiffing.

The blaim should ve put fair and square where it belongs,

1, Microsoft for their well out of date bug ridden kernel and other software. Designed to be incomprehensible to other developers not privy to certain “information”[1]
2,

[1] I won’t go into the details but Microsoft used to have two API’s to there OS’s the internal to Microsoft that had all sorts of advantages, and the deliberately tortuous public API that non Microsoft software developers were supposed to use called “Microsoft Foundation Class”(MFC) that caused real issues.

Put simply the Far East Culture of Knowledge is Power and should never be shared with others became very Westernised. Put simply older developers who had had to go through beds of coals to get their “knowledge” went out of their way to stop newer developers benefiting from the information.

The result was in effect a war, that had the look of a “Guild System” but in practice was a “Closed Shop” pretending to emulate a “Profession” such as Religion, Law, Accountancy, or Medicine.

I fought with others to keep it out of other forms of Engineering, which made me quite unpopular with certain types.

As people are realising about ICT style certifications, a piece of paper does not make you a competent practitioner and never will.

The fact that we now have restricted versions of the AI LLM and ML systems that can trivially pass the certificate examinations with the highest marks should make people sit up and think.

Because it means that, the exams are designed by the “software vendors” either as “rote systems”, or “for raising revenue”, or more likely both.

Neither of which the industry needs.

Then there are the other “institution certificates” / “entry exams” these are designed just as Historic Guilds were, to keep money for the accredited members only. That is designed to only let certain types of people in, thus create artificial scarcities of those with “signing off power” and thus very high levels of income. Where often the work is actually done by those who are “apprentices to a master” for nearly a decade, to work 20,000 hours or more at a pittance…

Clive Robinson July 22, 2024 6:38 PM

@ Bruce, Nicholas Weaver, ALL

Re : Formalising block chain proof of work trilemma.

Back over a half decade ago in a blog post it was posited –as was fashionable at the time– that with blockchains there were three desirable factors,

1, Decentralisation
2, Scalability
3, Security

With the usual “You can not have all three…” type comment.

Whilst most accepted it as was, there was no mathematical or logical basis by which it could be proved.

Well the IEEE have provided a paper that goes some way to providing a mathematical formalisation,

T. Nakai, A. Sakurai, S. Hironaka and K. Shudo
“A Formulation of the Trilemma in Proof of Work Blockchain,”
IEEE Access, vol. 12, pp. 80559-80578, 2024,
doi: 10.1109/ACCESS.2024.3410025.

https://ieeexplore.ieee.org/document/10549891

Abstract :

“The blockchain trilemma, introduced in 2017 on a blog post authored by Vitalik Buterin, one of Ethereum’s co-founders, asserts that achieving decentralization, scalability, and security simultaneously within a blockchain is unattainable. While this concept has garnered empirical support through extensive analyses of blockchain performance, it remains unproven theoretically. In this study, we establish a formula representing the trilemma within a Proof of Work blockchain and validate it through theoretical and experimental analyses”

Robin July 23, 2024 3:23 AM

@Winter, @RAND

“CrowdStrike is in the USA and beholden to follow the instructions by US courts.”

Maybe so, but as @RAND says in the OP, “Nobody knows what kind of levers KGB/FSB has on him”.

Those potential levers can be far-reaching, as numerous Russian exiles have found out to their (sometimes fatal) cost. That is irrespective of the jurisdiction.

Nevertheless, every organisation has multiple weak points. A good organisation has ways to expose and cope with them.

Winter July 24, 2024 11:50 AM

@Mr/Ms RAND

Next time Russian embassy contacts Mr. Alperovich and says – “We kidnapped your family member.

Your idea of how big companies work might be a little off.

In companies the size of Kaspersky, the CEO cannot meddle with low level operations without raising suspicion from employees. Employees who will with high probability cooperate with law enforcement.

The ideology that people are beholden to their birthplace is a very questionable one.

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.