• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2023
  • January
  • 20
  • China-Based Hydra-Linked Cryptocurrency Exchange Taken Down

China-Based Hydra-Linked Cryptocurrency Exchange Taken Down

January 20, 2023 Comments Off on China-Based Hydra-Linked Cryptocurrency Exchange Taken Down
China-Based Hydra-Linked Cryptocurrency Exchange Taken Down

The United States Department of Justice(DOJ) in cooperation with international law enforcement agencies shutdown Bitzlato Limited, a Hong Kong-based cryptocurrency exchange, and arrested its founder and major shareholder for facilitating the transfer of illicit funds.

Seizure banner uploaded on Bitzlato’s website.

According to an announcement by the DOJ, Bitzlato was founded in 2016, by 40-year-old Anatoly Legkodymov, a Russian citizen who resides in China. Legkodymov and his co-founder run Bitzlato with minimal Know Your Customer (KYC) requirements.
Bitzlato’s lack of effective anti-money laundering requirements made it a favorite among crypto users who engaged in illicit activities. The exchange allegedly received hundreds of millions of dollars from suspected criminals such as ransomware attackers and users of dark web marketplaces such as the now-defunct Hydra Market.

The Connection Between Bitzlato and Hydra

According to the Criminal complaint, investigations into Bitzlato’s operations reportedly revealed that a majority of the exchange’s users were also Hydra users. Bitzlato was Hydra’s second largest counterparty. Hydra buyers funded their purchases from accounts at Bitzlato, while the vendors on Hydra cashed out via accounts at Bitzlato. A total of approximately $700 million in cryptocurrency was exchanged between the two platforms.
Blockchain analysis revealed that between May 2018 and Hydra’s shutdown in April 2022, Hydra users sent approximately $170 million in cryptocurrency to Bitzlato wallets. In the same period, Bitzlato received an additional $218 from non-Bitzlato addresses that had received funds from Hydra users.
During the same period, Bitzlato users sent over $124.4 million to Hydra. An additional $191 million was sent to Hydra from addresses that had received funds from Bitzlato wallets.
In addition to facilitating Hydra transactions, Bitzlato was reportedly used to cash out more than $15 million in crypto received from addresses that had received proceeds of ransomware attacks.

Bitzlato’s Personnel Role in Illicit Transactions

Bitzlato’s employees sometimes blocked accounts of users suspected of engaging in illicit activities but in most cases let the customers be. Communications between Bitzlato’s customers and support representatives reportedly showed that the employees knowingly helped the customers transfer funds to Hydra.
In one such case, a customer who contacted Bitzlato’s support on October 18, 2020, and asked if he could transfer funds from his Bitzlato wallet to Hydra was told, “you can transfer BTC to any actual address. There are no restrictions for any individual services.”
Bitzlato’s support also knew that most of their customers used accounts created under the identities of other individuals. The support representatives allowed such customers to continue using the exchange without restrictions.
Legkodymov and his co-founder were aware of the high volume of illicit funds transferred through the exchange but decided that blocking users who engaged in illicit activities would hurt the exchange’s bottom line.
Bitzlato’s role in illicit activities was highlighted in a document titled “Competitor Analysis,” made by Bitzlato’s marketing director, and shared with the platform’s management. The document included “no KYC” as one of Bitzlato’s pros while “dirty money” and “lots of scams” were listed as some of the exchange’s cons.

US-based Customers on Bitzlato

Bitzlato is also accused of offering its services to US customers even though it was not based in the US. In cases where Bitzlato provided data regarding customers placed under investigation by US authorities, the data showed that the customers had been accessing the exchange from IP addresses in the US.
Information received from an undisclosed US-based cryptocurrency exchange reportedly showed that 1,600 of the exchange’s US-based customers had transferred a total of approximately $2.4 million to Bitzlato.
Legkodymov also managed the exchange while he was in the US. Legkodymov entered the US in October 2022 and had been residing in Miami, Florida. Information acquired from his ISP in Florida showed that he had been accessing Bitzlato’s management server.
Legkodymov was arrested on January 17, 2023, by US authorities in Miami. During Legkodymov’s arrest, an international operation led by French authorities in partnership with law enforcement agencies in Spain, Portugal, the Netherlands, and Cyprus under Europol’s coordination took down Bitzlato and seized its crypto assets.

Post navigation

ulexecve: Execute dynamic or statically compiled ELF Linux binaries without ever calling execve()
Ghauri – An Advanced Cross-Platform Tool That Automates The Process Of Detecting And Exploiting SQL Injection Security Flaws

Related Articles

Former Doctor Imprisoned for Attempting to Hire Hitmen

Former Doctor Imprisoned for Attempting to Hire Hitmen

- Dark Web News
January 26, 2023
Counterfeit Oxycodone Vendor “MadHatterPharma” Pleads Guilty

Counterfeit Oxycodone Vendor “MadHatterPharma” Pleads Guilty

- Dark Web News
January 22, 2023
International Counterfeit Banknotes Vendor Busted

International Counterfeit Banknotes Vendor Busted

- Dark Web News
January 17, 2023
hacker gadgets
hacker phone covers

Recent Posts

Octosuite v3.0.4 releases: Advanced Github OSINT Framework

Octosuite v3.0.4 releases: Advanced Github OSINT Framework

January 28, 2023
firebaseExploiter: discovers open and exploitable Firebase Database

firebaseExploiter: discovers open and exploitable Firebase Database

January 28, 2023
CISA Warns of Hackers Exploiting CVE-2017-11357 Vulnerability

CISA Warns of Hackers Exploiting CVE-2017-11357 Vulnerability

January 27, 2023
BlueHound - Tool That Helps Blue Teams Pinpoint The Security Issues That Actually Matter

BlueHound – Tool That Helps Blue Teams Pinpoint The Security Issues That Actually Matter

January 27, 2023
CVE-2022-29841: RCE flaw found in Western Digital My Cloud OS

CVE-2022-29841: RCE flaw found in Western Digital My Cloud OS

January 27, 2023
CVE-2023-22482: Critical-Severity Flaw in Argo CD

CVE-2023-22482: Critical-Severity Flaw in Argo CD

January 27, 2023

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW