Curriculum
Course: What is Crypto
Login
Video lesson

Hacking $4.5 billion of BTC

Can Bitcoin Be Hacked? Lessons from the Bitfinex Saga

How the Bitfinex Hack Changed Everything

Imagine waking up one morning to find that $4.5 billion worth of Bitcoin has been stolen—yet those responsible can’t spend a single dime. This is the paradox of cryptocurrency security, where the technology is both impenetrable and transparent, but human error and centralized exchanges create cracks in the armor. In a world where Bitcoin thefts grab headlines, like the infamous 2016 Bitfinex hack, it’s easy to see why the idea of safeguarding crypto assets has become a hot topic in finance and technology. As the industry matures, it’s crucial to understand not just the technicalities of blockchain security, but the wider implications for personal and institutional investments.

This lesson will critically analyze the lessons from a notorious crypto heist, exploring the security measures that are transforming the finance industry and the future role of decentralized solutions like DeFi (Decentralized Finance). Moreover, we’ll draw connections to broader financial systems and provide insight into how the Crypto Is FIRE (CFIRE) training program can equip you with the tools needed to navigate these challenges.

Private Keys: The True Guardians of Your Wealth

The heart of this lesson we’re analyzing lies in the 2016 Bitfinex hack, where 120,000 Bitcoin—worth $71 million at the time—were stolen. Fast forward to 2022, and that stolen stash had ballooned to a jaw-dropping $4.5 billion. Yet, the thieves found themselves in a financial straitjacket. Why? Because Bitcoin’s ledger is a transparent public record, meaning every move those hackers made was under the watchful eyes of law enforcement. The thieves attempted to launder the funds through thousands of smaller transactions, purchasing altcoins and NFTs along the way, but their efforts ultimately led to their arrest.

The main thesis of the video emphasizes that while blockchain itself is virtually unhackable, the same cannot be said for exchanges. This distinction between blockchain’s security and the vulnerability of crypto exchanges is vital to understanding the risks and responsibilities of being in the crypto space. The video underscores that if someone gets access to your private keys, your crypto is gone—forever. Thus, the core message here is about safeguarding your digital assets, primarily through practices like using cold wallets and multi-signature protections.

Critical Analysis

Strengths of the Video’s Arguments

One of the strongest points made in the video is the explanation of private keys. The analogy is simple yet powerful: private keys are the master password to your crypto funds. The importance of this concept cannot be overstated. If someone gains access to your private key, they own your funds. Unlike a bank PIN, which can be reset or recovered by your bank, private keys cannot be restored. This highlights the decentralized nature of crypto—you are your own bank, for better or worse.

A second compelling argument is the warning about centralized exchanges. The Bitfinex hack is just one in a long line of crypto exchange breaches that illustrate the dangers of leaving assets on platforms that remain central points of failure. The video points out that exchanges like Coinbase use cold storage to safeguard most of their assets, but it’s important to remember that even the most secure exchanges are still vulnerable to attack. This is a critical point for newcomers to the CFIRE training program: leaving large amounts of crypto on an exchange is risky, and taking ownership through cold storage is a safer route.

Another strong argument comes from the video’s explanation of cold vs. hot wallets. The breakdown is effective: cold wallets are secure but less convenient, while hot wallets are easily accessible but exposed to internet-based threats. The advice to move significant holdings into cold storage—offline hardware wallets—is sound for both beginners and seasoned investors alike. This concept mirrors traditional financial advice to keep only what you need for daily expenses readily accessible, while stashing long-term savings in a secure location.

Potential Weaknesses and Limitations

While the video does an excellent job of outlining the importance of security, it could delve deeper into multi-signature wallets. Multi-signature (or “multi-sig”) wallets require more than one private key to authorize a transaction, adding an extra layer of security, particularly for businesses or joint accounts. This concept wasn’t explored as fully as it could have been, despite its growing importance in both personal and institutional crypto security.

Additionally, the video lightly glosses over the broader legal implications of recovering stolen Bitcoin. While it’s true that law enforcement can track Bitcoin movements through the public ledger, there’s no guarantee that stolen funds can be returned to their rightful owners. The Bitfinex case is unique in its partial recovery, but it’s worth noting that many victims of exchange hacks never see their assets again. A deeper discussion of crypto’s legal grey areas, particularly in international cases, would have enriched the content.

Finally, while the video mentions decentralized solutions like cold storage, it doesn’t touch on the broader potential of DeFi. In a decentralized finance ecosystem, users can interact with financial services without relying on a central authority. DeFi protocols eliminate the need for exchanges that are prone to hacking, creating safer, peer-to-peer methods of storing and transacting crypto. This omission is a missed opportunity to connect the issue of centralized exchange vulnerabilities with the innovative solutions offered by the DeFi space.

Connections to Cryptocurrency and Blockchain

The video’s discussion of centralized exchanges and their vulnerabilities perfectly illustrates the need for decentralized alternatives in the crypto world. Blockchain technology was designed to decentralize power, taking the middleman (like banks and exchanges) out of financial transactions. But by storing large amounts of assets on centralized platforms, crypto users are ironically reintroducing these central points of failure.

DeFi steps in as a solution. Projects like Aave and Uniswap offer decentralized trading platforms that eliminate the risk of exchange hacks because there’s no central authority holding onto your funds. DeFi’s use of smart contracts—automated programs that run on the blockchain—means that users can interact directly with the protocol without needing to trust a central entity. This decentralization of financial services is at the heart of the crypto revolution and something learners in the CFIRE program should watch closely.

Another concept worth exploring is NFT laundering, which the video briefly touches on. The thieves in the Bitfinex hack tried to hide their stolen Bitcoin by converting it into NFTs and altcoins. This practice of using decentralized assets to “wash” dirty money is a growing problem in the crypto world. Blockchain’s transparency is a double-edged sword: while it helps track illicit activity, it also provides new avenues for laundering money through digital art and assets. This is an area where crypto’s innovation can also pose risks, and one that regulators will need to address in the coming years.

Broader Implications and Future Outlook

The lesson from the Bitfinex hack extends beyond the crypto ecosystem and speaks to the future of financial security more broadly. As more people and institutions move their assets into digital forms, the need for robust, decentralized security becomes paramount. We’re already seeing the development of more advanced forms of cryptographic security, from multi-sig wallets to zero-knowledge proofs, which could play a major role in making crypto more secure.

Looking ahead, the integration of quantum computing could introduce both challenges and opportunities for crypto security. While quantum computers could theoretically break current cryptographic algorithms, they could also be used to develop even more secure systems. The race between encryption and decryption technologies will likely define the next decade of crypto security.

On a societal level, the rise of crypto crime raises important questions about law enforcement’s ability to adapt. Governments worldwide are grappling with how to regulate and police a decentralized world, and the Bitfinex hack is a prime example of how these efforts will evolve. The transparency of blockchain means that criminals may find it increasingly difficult to hide, but without proper regulation, the lines between privacy and surveillance will continue to blur.

Personal Commentary and Insights

As someone who has been closely following both the tech and finance spaces for years, I’ve seen first-hand how the crypto ecosystem has evolved from a niche hobby to a multi-trillion-dollar market. What strikes me most about cases like the Bitfinex hack is the human element—no matter how sophisticated the technology, it’s often human error or greed that creates the biggest vulnerabilities. The lesson for me is that self-custody is not just a buzzword in the crypto world; it’s a necessity. If you don’t hold your private keys, you don’t truly own your crypto.

Moreover, the rise of DeFi is exciting because it presents a viable alternative to the centralized systems we’ve relied on for centuries. But with that comes new challenges, especially around user education. As the CFIRE program emphasizes, understanding these tools is essential for navigating the increasingly complex world of crypto finance. It’s one thing to know how to buy Bitcoin, but quite another to understand the nuances of wallet security, smart contracts, and decentralized governance.

Conclusion

The Bitfinex hack serves as both a cautionary tale and a learning opportunity for anyone venturing into the crypto space. It highlights the vulnerabilities of centralized systems and the importance of self-custody and decentralized solutions. As crypto continues to evolve, so too will the tools and strategies for securing our assets. The key takeaway here is clear: you are your own bank, and with that comes immense responsibility. For those following the CFIRE training program, this lesson is just the beginning. As we move forward, the focus will shift towards more advanced topics like DeFi, smart contracts, and the future of blockchain technology—so stay tuned for more insights and strategies to keep your crypto safe.

Quotes:

  1. “You are your own bank in crypto, and with that comes immense responsibility.”
  2. “Blockchain itself may be unhackable, but centralized exchanges remain a weak link.”
  3. “Cold storage is the key to long-term crypto security—because if you don’t own your keys, you don’t own your coins.”

 

 

Unhackable or Untraceable? Safeguarding Your Crypto Assets

In the world of cryptocurrencies, the security of your assets is a major concern. While blockchain technology itself is secure and practically unhackable, crypto exchanges—where people often store their tokens—are a different story. In this lesson, we’ll explore how crypto security works, from private keys and wallets to infamous hacks, such as the 2016 Bitfinex breach. We’ll compare traditional finance’s security measures with those of the crypto world and guide you on how to keep your funds safe. This lesson fits into the Crypto Is FIRE (CFIRE) training plan, designed to empower you with the knowledge and skills to navigate and protect your crypto journey.


Core Concepts

  1. Private Key

    • Traditional Finance: Similar to a PIN or password for your bank account, a private key is required to access and manage funds.
    • Crypto: It grants control over the funds in a crypto wallet, allowing the owner to send assets. If lost or stolen, your funds are gone forever.
    • Importance: Understanding private keys is crucial, as they are the gateway to your assets. In crypto, unlike a bank, no one can restore access for you.
  2. Cold Wallet

    • Traditional Finance: Like storing gold or cash in a safe deposit box, cold wallets are secure offline storage for crypto.
    • Crypto: Cold wallets are devices that store crypto offline, minimizing the risk of hacks.
    • Importance: Cold storage is essential for long-term savings and large amounts of crypto to avoid hacks and theft.
  3. Hot Wallet

    • Traditional Finance: This can be compared to keeping a small amount of cash in your wallet for daily use.
    • Crypto: A hot wallet is connected to the internet, making it easy to access but more vulnerable to hacks.
    • Importance: Beginners need to balance convenience with security when deciding how much to keep in hot wallets.
  4. Multi-Signature Wallet

    • Traditional Finance: Similar to requiring multiple signatures to authorize a wire transfer or withdrawal in a business account.
    • Crypto: Requires multiple private keys to approve a transaction, adding an extra layer of security.
    • Importance: Multi-signature wallets are crucial for businesses or joint ownership, preventing any one party from moving funds alone.
  5. Exchange

    • Traditional Finance: A stock exchange facilitates buying and selling securities but is regulated by centralized authorities.
    • Crypto: Crypto exchanges act similarly but are less regulated, and they are frequent targets for hackers.
    • Importance: Understanding the risks and security practices of exchanges will help you choose a safe platform to trade on.

Key Sections

1. The Nature of Cryptocurrency Security

  • Key Points:

    • Blockchain technology is virtually unhackable.
    • Crypto exchanges are vulnerable due to their centralized nature.
    • Storing assets on an exchange is risky.

    Explanation: While the blockchain itself is secure, crypto exchanges are centralized points of vulnerability. Hackers target these exchanges because they hold vast amounts of cryptocurrencies. For example, the infamous 2016 Bitfinex hack saw the theft of 120,000 BTC, which were worth $71 million at the time and now stand at a staggering $4.5 billion. These kinds of breaches highlight the need for security awareness in crypto.

    Crypto Connection: In traditional finance, institutions like banks are responsible for keeping your money safe, often backed by government insurance schemes. In crypto, you are responsible for your assets, and if stolen, they’re likely gone for good. Blockchain’s transparency means that all transactions are publicly visible, so while funds can’t be spent anonymously, stolen crypto is incredibly hard to recover.

2. Private Keys and Their Importance

  • Key Points:

    • Private keys are like your crypto password.
    • Without a private key, you cannot access or recover your funds.
    • If someone else gets your private key, they control your funds.

    Explanation: The private key is the most critical component of crypto security. It’s a long string of letters and numbers, and if anyone obtains it, they can access and transfer your crypto. This is different from traditional finance, where if you forget your PIN or password, the bank can help you recover access. In crypto, you are your own bank.

    Crypto Connection: Managing private keys introduces a unique responsibility not seen in traditional banking. Beginners in CFIRE need to ensure they have a secure backup of their keys, whether on paper, hardware devices, or even by splitting the key into multiple pieces for added security. Losing your key means losing your crypto forever, as seen in high-profile cases of lost millions.

3. Cold vs. Hot Wallets

  • Key Points:

    • Cold wallets are offline and secure.
    • Hot wallets are connected to the internet and more convenient.
    • The balance between security and convenience is critical.

    Explanation: Cold wallets offer the highest level of security because they are disconnected from the internet. Hot wallets, on the other hand, are useful for daily transactions but are exposed to cyber-attacks. The key for any crypto user is deciding how much to keep in a hot wallet versus cold storage.

    Crypto Connection: This is similar to keeping a small amount of cash for daily expenses and storing the rest in a safe. For CFIRE learners, moving your savings or long-term holdings into cold storage and only keeping a small operational amount in a hot wallet is a wise strategy.

4. Exchange Security and Hacks

  • Key Points:

    • Exchanges can be hacked.
    • Crypto exchanges store some funds in cold wallets, but much remains in hot wallets.
    • Hacked funds are rarely recoverable.

    Explanation: Exchanges like Coinbase implement multiple layers of security, including cold storage for the majority of their assets. However, history has shown that even these measures aren’t foolproof. The Bitfinex hack is just one of many high-profile examples of crypto theft that underline the risks of using exchanges.

    Crypto Connection: Unlike traditional banks, exchanges are not insured by the government. If an exchange is hacked, your funds could be lost, as seen with Mt. Gox, where customers never recovered their money. CFIRE students should learn how to assess exchange security before entrusting their funds to any platform.


Examples

  • Hypothetical Example 1 (Traditional Finance): If a bank is hacked, the government often insures depositors up to a certain limit. Customers don’t lose all their money.

  • Hypothetical Example 2 (Crypto): If a crypto exchange is hacked, such as the Mt. Gox incident, users lose their funds with no recourse.


Real-World Applications

  • The recovery of 94,000 BTC from the Bitfinex hack demonstrates that while blockchain is transparent, recovering funds is still complicated. This is relevant because hackers often move stolen funds through various crypto channels, like NFTs or altcoins, to hide their tracks.

Challenges and Solutions

  • Challenge: The lack of a central authority means there’s no way to undo a transaction if someone steals your private key.
  • Solution: Multi-signature wallets and cold storage can help mitigate risks by adding extra layers of security.

Key Takeaways

  1. Private keys are your crypto lifeline—protect them.
  2. Cold storage is the safest way to hold long-term crypto.
  3. Exchanges, though convenient, pose significant risks.
  4. Multi-signature wallets can provide an added layer of protection.
  5. Once crypto is stolen, it’s nearly impossible to recover.

Discussion Questions

  1. How does the security of a crypto exchange compare to that of a traditional bank?
  2. What are the risks of keeping large amounts of crypto in a hot wallet?
  3. How does the Bitfinex hack reflect the potential vulnerabilities in the crypto ecosystem?
  4. Compare and contrast the role of private keys in crypto and passwords in traditional finance.
  5. What would you do to secure your crypto holdings if you had a significant amount?

Additional Resources and Next Steps

  • Further Reading: “Mastering Bitcoin” by Andreas Antonopoulos, “Cryptoassets” by Chris Burniske.
  • Tools: Explore Ledger and Trezor for cold wallet solutions.
  • Next Topic: Explore the nuances of DeFi and its implications on traditional banking models in the next CFIRE lesson.

Glossary

  • Private Key: The code that grants access to your crypto funds.
  • Cold Wallet: An offline storage method for cryptocurrencies.
  • Hot Wallet: A wallet that is always connected to the internet for crypto transactions.
  • Multi-Signature Wallet: A wallet that requires multiple private keys to authorize a transaction.
  • Exchange: A platform where cryptocurrencies are bought, sold, and traded.

Congratulations on completing this lesson! You’re now ready to dive deeper into the world of crypto security and learn how decentralized finance (DeFi) is reshaping the future. Stay curious, stay cautious, and see you in the next CFIRE training session!

Read Video Transcript
Back in 2016, somebody stole 120,000 bitcoins worth $71 million from the Bitfinex  exchange by accessing the private keys of users. Today, those bitcoins are worth $4.5 billion,  making the hackers some of the richest people on the planet. But there’s just one problem.
 Bitcoin is a giant public ledger, and you can’t move your money around without the  feds watching your every move. And last week, they recovered 94,000 of the stolen bitcoins  and arrested the husband and wife duo of Ilya Lichtenstein and Heather Morgan. Ladies and gentlemen, we got him.  The saddest part of this story is that Heather was an up-and-coming rapper.
 At least now she does know where she’s headed. The couple is facing up to 20 years in prison  for attempting to launder the stolen Bitcoin. It’s not clear if they’re the ones that actually  performed the hack back in 2016 though. Documents from the Department of Justice break down how they  would move the currency with a diverse array of transactions, like purchasing altcoins and NFTs,  and then breaking everything down into thousands of smaller transactions, where the funds would eventually flow into a business that could fund Heather’s music videos.
 They get an A for effort, but Bitcoin’s not like a gold bar that you can just melt down  and sell on the black market. On the bright side though, many of my favorite rappers have  done time in prison. Another big question here is will the original owners be able to recover  their funds? Bitfinex already attempted to make customers whole by crediting them with a different  token when the hack occurred. They are working with the Department of Justice, but it will likely be a very long and complicated process before anyone gets their Bitcoin back, if it happens at all.
 But what about your Bitcoin? Is it safe in an exchange right now?  Well, the blockchain network itself is virtually unhackable with current technology.  Crypto exchanges, on the other hand, are very much hackable.  The thing about cryptocurrency is that when someone obtains your private key, they have access to all of your money and can send it wherever they want.
 There’s no  central authority to detect or stop fraudulent transactions, but they do implement other  measures to keep your tokens safe. One is multi-signature wallets that require multiple  private keys to send a transaction. The other thing they do is try to keep as much crypto in  cold storage as possible.
 There are two types of crypto wallets, a hot wallet, which is always connected to the internet and ready to send transactions,  and the other is a cold wallet, which is offline and generally used for long-term storage of your  money. A cold wallet can only be hacked if you have physical possession of the device.  Exchanges like Coinbase keep 90% of your crypto in cold storage, and because they’re a big  centralized authority, if they ever got hacked, they’d have enough money to pay everybody off.
 There are stories of crypto exchanges being  hacked all the time, but it is pretty safe for most people today. But if you’re really attached  to your tokens, the safest thing to do is get them out of an exchange into your own cold storage  wallet. Then move out of the city and learn how to grow your own food, dig a bunker on your property,  and store the wallet there alongside your gold and ammo. 
 
Married Couple Steals $4.5 Billion in Bitcoin Heist [Bitfinex]
https://www.youtube.com/watch?v=GR3rUlDiMxY
Transcript:
 Hi, welcome to another episode of ColdFusion, where I cover anything in science, technology,  business or history.  In 2016, a large amount of Bitcoin was stolen from an exchange.  The event was considered as one of the biggest mysteries in crypto.  But who stole the money, and where were they?  Some answers would come in February of 2022, when a New York-based former Forbes contributor  turned amateur rapper as seen here.
 And her husband was just arrested and charged with stealing $4.6 billion in Bitcoin.  This morning, the Justice Department announcing the largest single seizure of funds in the department’s history, recovering billions of dollars in missing Bitcoin.  This story has everything, right? You have a big hack, you have a big theft,  you have a very colorful couple at the center of all of this.
 This is a bizarre story.  So sit back, relax and enjoy as we take a ride through the blockchain  to chase down a married couple’s attempt at a multi-billion dollar heist.  You are watching TellFusion TV.  The story starts with the place that the Bitcoin was stolen from, Bitfinex.  Since its founding in 2012, the Bitfinex exchange has had a shady history.
 From hacks to covering up losses, being unable to find banks,  and fines by the CFTC were all par for the course.  But the biggest disaster happened in 2016 when  their Hong Kong exchange was hacked. Almost 120,000 Bitcoin was stolen  directly from users wallets. It was pandemonium.
 Withdrawals were halted and  trading was stopped. Once the news of the hack spread, Bitcoin dropped by over 20%.  To be clear, it wasn’t the Bitcoin blockchain that was hacked, but just the Bitfinex  exchange where people traded Bitcoin. As a reaction to the hack, Bitfinex customers had  their balance reduced by 36% and would receive tokens in proportion to their loss.
 The crypto  community was on the case. Everyone was curious as to who the hackers were, but it would take a number of years to finally track them down.  Details of exactly how the hack happened aren’t 100% clear yet, even after all of these years,  but one of the lead theories is something like this. The hack was possible because Bitfinex was using a third-party service called BitGo to secure its users’ wallets.
 It was BitGo’s  servers that got hacked, and the hacker ordered  the system to send all of the Bitcoin to an account of their choosing. For years after the  hack, the crypto community had a hawk eye on the movements of the stolen coins through the  blockchain.
 Everybody could see where the coins were going, but nobody knew who the owners of  the coins were. Before long, these coins became banned and blacklisted from other crypto exchanges all over the blockchain. This meant that the hackers couldn’t convert  the Bitcoin into fiat currency. They needed another way.  25,000 coins out of the 120,000, or about 21% of them, were shuffled around in a  complex laundering process.
 The coins were split into tiny pieces and  exchanged for other cryptocurrencies  and spread around. Bizarrely, some of the purchases included gift cards for Uber, Walmart,  and PlayStation. Some of the laundered Bitcoin was even used to buy some gold and NFTs.  It was all very curious.
 Some keen blockchain analysts think that other parts of the stolen  Bitcoin were paid to a so-called cash-out service on the darknet.  This is where a user would pay someone on the darknet with Bitcoin.  The user would receive an equivalent amount of cash, minus a fee, that was put in a vacuum-sealed bag and left in a secret location.  The user would then be given the exact GPS coordinates as to where to pick it up.
 As for the rest of the stolen Bitcoin, it just sat there for another 4.5 years due to all of the blacklisting. It was too risky to move. There were just too many eyes on it.  That was until August of 2021, when suddenly $760 million moved from the original hacker’s wallet  to a new crypto wallet. It looked like the perpetrators had finally gotten tired of sitting on the coins and they wanted to make a run for it.
 They used a complicated method of transactions that split the coins up into many pieces,  but eventually all of the coin movements landed them back into the same wallet. It was a very interesting development.  The movements of funds alerted the authorities and the chase was on.  The movements of funds alerted the authorities, and the chase was on.
 With special tools like Elliptic, the complicated movement of coins was tracked.  After an investigation, it was found that the crypto wallet belonged to 34-year-old startup founder, Ilya Lichtenstein.  Lichtenstein and his wife, Heather Morgan, aged 31, allegedly conspired to launder the money according to the Department of Justice. Authorities managed to link the stolen coins to crypto exchange accounts owned under the couple’s names. So who were these two? Now this is where things get really interesting, ironic,
 and just downright bizarre. Lichtenstein was a Russian US national. He grew up in Chicago and attended the University of  Wisconsin. According to those who knew him, he was described as quiet and observant,  but he had a guarded wall around him. While Lichtenstein was the co-founder of a blockchain  startup, since the arrest, most of the focus has been on his wife, Heather Morgan.
 And if you don’t know about me, I’m a serial software entrepreneur who started  multiple successful companies.  One is a multimillion dollar profitable one that I started by myself when I was  23.  She’s a former Forbes contributor who ironically wrote articles on how to  protect your business against cyber criminals and talked with crypto exchange  owners on how to prevent fraud.
 She even did a cybersecurity talk with BitGo, which was the very same third-party platform that failed to  protect the Bitfinex wallets during the hack. But that was only the start of the weirdness.  Morgan, who calls herself the Crocodile of Wall Street, was actually making a name for herself  on social media.
 She was an amateur rapper by the name Razzle Khan, a name she came up with  that was supposed to be a reference to Genghis Khan, but, quote, with more pizzazz.  Her music videos, TikToks and rapping can only be described as fit for North Korean torture.  I’m me. Crazy outlier, notoriety. Real icebreaker, no one cruder’s me. Not a peacemaker, bring the anarchy. Big booty shaker, coming from the black sea, major earth quaker. Give no apology.
 Goofy as her social media posts were, it seemed like she had a skill for social engineering. She gave a seminar in 2019 about how to socially engineer yourself into anything.  Tips included, while at an event, pretend to use your phone to call a fake friend.  While you’re doing this, eavesdrop in on important names to gain entry into exclusive  parties.
 Other tips included, follow closely and listen and learn about your target.  Name dropping was another hot tip.  The seminar description says, she used social engineering to navigate and infiltrate black markets and shadow economies in her previous career.  Perhaps these skills were helpful to gain a foothold into the inner workings of Bitfinex’s security.
 During her 20s, Heather would travel the world and learned multiple languages including Japanese,  Korean, Russian, Turkish, Arabic and Cantonese. In 2014, she incorporated Salesfolk, a company  that aims to help other firms improve their efficiency when it comes to sales pitches.  It was later found that Salesfolk was involved in the money laundering scheme.  Heather wrote  47 articles for Forbes as a quote Forbes woman and this was between December 2017  and September 2021.
 According to Vice interviewed people who knew Heather they  were all shocked at the news. They called Heather a nice person and they also said  that she was very driven. Though on the other hand the Department of Justice  tells people not to be fooled. They state that Heather, quote, played an integral role in the money laundering  and fraud scheme, end quote.
 They also say she had extensive knowledge and used a variety of  cryptocurrency protocols to launder money. They state she was not an unwitting bystander.  In 2019, the couple traveled to Ukraine to set up false identities and create fake  passports. They established financial accounts in Russia and Ukraine and appear to have been  setting up a contingency plan to leave the U.S. and flee over east if things got too hot.
 Unfortunately for them, COVID put an end to those plans. Federal agents would remark that  the Ukrainian activities look like something out of a spy novel.  US law enforcement obtained a search warrant for Lichtenstein’s digital wallet.  They were able to seize $3.6 billion left in that wallet.  They did this by managing to decrypt a file in his cloud storage account.
 The encrypted file on the cloud had 2,000 crypto wallet addresses and their corresponding private keys.  A pretty sloppy move.  There’s been no explanation of how exactly law enforcement decrypted the file.  Though, through blockchain analysis, authorities could link those wallets directly to the original Bitfinex hack all those years ago.
 Other incriminating documents were found.  Dark websites that sold fake IDs and passports. The couple did use a VPN,  but they used their real name, email, home address, and used the stolen Bitcoin to purchase it.  The game was up, and in total, only about 4% of the Bitcoin was successfully laundered.  The couple were arrested on Tuesday morning, February 8th, 2022, in New York.
 According to  the Department of Justice, the two have been  charged with conspiracy to commit money laundering, which carries a maximum sentence of 20 years in  prison, and conspiracy to defraud the US, which brings a maximum sentence of five years.  A Manhattan judge has set Lichtenstein’s bail at $5 million and Heather Morgan’s at $3 million.
 Some people have raised some doubts. Could this couple really pull off a $4.6 billion heist?  Although the Department of Justice has not publicly linked them to the actual hacking  of the cryptocurrency exchange, they were heavily implied to have done it.  Since the stolen coins were recently directed to a wallet that they owned and the money was  not split up between anyone else, it’s believed that they at least had a large involvement.
 With that being said, this does still leave the door open to the possibility that others  may have been involved.  Some of the online doubters cite a 2019 arrest of two Israeli brothers in relation to the  hack, but no further information on legal proceedings have taken place since then.  Others say that the married couple were just set up as patsies.
 It was a set up by the FBI or another government body,  but we have no evidence for anything like that so far.  So while there is some ambiguity here,  looking at the charges brought by the Department of Justice,  it seems that all the evidence points to the eccentric married couple.  In the court proceedings, it was revealed that they had a bag labelled, quote,  burner phones under their bed, and a computer folder labelled, fake passport ideas.
 So there you go.  That’s the story of how an eccentric married couple started a digital manhunt through the blockchain and cyberspace that lasted six years.  The two suspects were not only bizarre, but also hiding in plain sight.  So what do you guys think of this story? Let me know in the comment section below.
 If you want to discuss this episode in more detail, or suggest a future video,  head on over to the ColdFusion Discord. If you want to listen to the podcast versions of these  videos, they’re now available on Spotify and other streaming platforms. My name is Dagogo,  and you have been watching ColdFusion.
 Feel free to subscribe and have a look around on the channel, there’s a bit of something  for everyone.  And I’ll catch you again soon for the next episode.  Cheers guys.  Have a good one. Cold fusion.  It’s new thinking.