Opening the MtGox File - Part One - Communicating with the BTC-e Exchange

View this thread on: d.buzz | hive.blog | peakd.com | ecency.com
·@haji·
0.000 HBD
Opening the MtGox File - Part One - Communicating with the BTC-e Exchange
Opening the MtGox File - Part One - Communicating with the BTC-e Exchange

![Opening.jpg](https://steemitimages.com/DQmSwE5SeD9BbRUhhmd5nkscoDCsMJnimuj8JiZZwfUv9qq/Opening.jpg)

In this news, we will open the MtGox file and link it to the BTC-e exchange.

On Wednesday, August 4, 2009, an immediate report was issued on the arrest of a Russian-born in Greece. This person is suspected of doing massive money laundering activities through Bitcoin. The 38-year-old, formerly known as Alexander Vinnik, is said to have relocated $ 4 billion since 2011.

Although it's hard to say (according to the publisher's site), Vinnik is the main suspect of stealing MtGox site or money laundering. This is a result of a few years of research, and these findings are certainly independent of other research. All those who worked on this case sent their findings to law enforcement officials quietly and this was due to the suspicion of suspects and the increased chance of arrest.

With the arrests that took place today, we think it's time to talk about all aspects of the case and the work of research. Thanks already for your patience.

Summary of the situation

(According to the WIZSEC website), we will publish all the aspects of our research and findings in several different posts, and for the first time, we will have a quick look at the Big Bang on Bitcoin and its relationship with Vinnik:

• In September 2011, the key wallets of the MtGox site were stolen. It was entirely possible to copy the wallet.dat file very simply. By doing so, the hacker was able to instantly reach significant amounts of Bitcoin, but was able to send Bitcoin's blown winds to their preferred addresses.

• At the same time, the hacker could normally transfer all transactions generated on Bitcoin with keys to a wallet that was controlled by Vinnik. This continued for a long time, but it was interrupted for some time, and then the second phase of the theft took place in 2012 and 2013.

• By mid-2013, when the funds were shipped from the keys, the process slowed down and almost stopped, the thief hijacked some 630000 bitcoins from MtGox.

• On the other hand, due to the existence of a shared key repository in the wallet.dat file that allowed the reuse of the addresses, it triggered the MtGox system and interpreted some of the burglar's operations as a deposit to users' accounts incorrectly. With significant amounts of bitcoin charging, the MtGox fiscal collapse was around 40,000. A large portion of this figure has been rushed by users elsewhere without reporting this (system error).

• After the transfer of these kevins to Vinnik's bag, most of it was transferred to the BTC-e site or sold or washed up (through the famous BTC-E Code). A total of 300,000 Bitcoins were transferred to the BTC-e, and the rest were deposited in other accounts, including MtGox itself.

• The amount of capital transferred to the BTC-e instead of saving into the user's account was transferred directly to the BTC-e internal storage, indicating the relationship between Vinnik and BTC-e.

• Theft of Kevin MtGox is not the only Vinnik robbery. Robots from Bitcoinica, Bitfloor, and many others have been monetised through the same wallets throughout 2011 and 2012.

• Kevin's return to MtGox helped us identify Vinnik's identity, when the MtGox accounts used by him could be linked to his online identity under the WME name. Vinnik, with the WME identity, had already publicly objected to his Quinn bans (sent to Bitcoinica there and questioned them).

• Other robberies and other incidents occurred for MtGox and resulted in loss of capital on this site, which will be referred to in the next posts.

There are a lot of articles and posts detailing these issues, but this post is briefly cited only in focus on the subject of the recent arrest.

Money flow path

Actual transactions have been identified for the major retrieval of the robbery bitcoins from MtGox, we followed all of them and sorted out all the addresses involved, and we quickly realized that the stolen Quinns were the same as their wallets. In this figure, the path to these sturgeon funds was summed up in 2011.

Since some bitcoins returned to MtGox, we were able to determine which user accounts were received. Two of them are noteworthy and probably related to the WME. (Shown in red in the figure above). The WME was active for a long time and occasionally advertised cheap queens on Bitcointalk forums and traded with exchange of money codes. The BTC-E, by announcing that WME was very well known, guaranteed it.

The WME is involved in a Bitcoinica asset theft (pictured above), which is another strong proof of the correct identification of the main money launderer in the theft of MtGox. The end of the event comes with the disclosure of the name of Alexander Vinnik, at that time, having a lot of pseudonyms, we still do not think it's his real name. Arrest today confirms this name.

In order to clarify the issue, it is necessary to note that this arrest revealing the identity of Vinnik is not for theft or hacking, but for money laundering. However, his arrest has many speculations. He may have bought cheap money from robbers and money launderers. Vinnik is a very important piece of Pazli that shows that he is the one who deals with money laundering and is therefore a great success in the case. We think it's time to find out the legal pressure to take the next steps, and the hidden angles of this incident and the other people involved in the case.

.

BRO 🆔 @triplej
Me 🆔 @haji
👍 , , , , , , , , , ,