ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Catch Cheater
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Bug Sweep TSCM Investigation
      • Workers Compensation Fraud Investigation
      • Asset and Hidden Finances Investigations
    • Cyber Security
      • DIGITAL EVIDENCE AUTHENTICATION
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Assets Search 
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Blog Details

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > News > Investigations > No credible evidence US authorities hacked Chinese Bitcoin wallets to “rob” $13 billion BTC
    No credible evidence US authorities hacked Chinese Bitcoin wallets to “rob” $13 billion BTC
    11
    Nov
    • ForensicsS
    • 0 Comments

    No credible evidence US authorities hacked Chinese Bitcoin wallets to “rob” $13 billion BTC

    Cybercrime

    China’s National Computer Virus Emergency Response Heart lawful accused the USA of conducting the 2020 LuBian Bitcoin exploit.

    Nonetheless, Western compare ties the event to a wallet random-amount flaw and does no longer title a insist actor.

    Cybercrime Birth-provide forensics on the LuBian drain

    The core info of the episode are of path smartly documented across open sources. Per Arkham, roughly 127,000 BTC were moved out of wallets linked to the LuBian mining pool over a duration of about two hours on December 28–29, 2020, thru coordinated withdrawals across a total bunch of addresses.

    Per the MilkSad compare group and CVE-2023-39910, those wallets were created with machine that seeded MT19937 with handiest 32 bits of entropy, which lowered the search home to roughly 4.29 billion seeds and uncovered batches of P2SH-P2WPKH addresses to brute-drive attacks.

    MilkSad’s Replace #14 hyperlinks a cluster holding roughly 136,951 BTC that used to be drained origin on 2020-12-28 to LuBian.com thru on-chain mining exercise and paperwork the mounted 75,000 sat price pattern on the sweep transactions. Blockscope’s reconstruction shows the massive majority of the funds then sat with minimal motion for years.

    Those same money now take a seat in wallets managed by the U.S. authorities. Per the U.S. Department of Justice, prosecutors are pursuing the forfeiture of roughly 127,271 BTC as proceeds and instrumentalities of alleged fraud and money laundering tied to Chen Zhi and the Prince Community. The DOJ states that the assets are in the intervening time in U.S. custody.

    Elliptic shows that addresses in the DOJ complaint plot onto the LuBian susceptible-key cluster that MilkSad and Arkham had already identified, and Arkham now tags the consolidated destination wallets as U.S. authorities-managed. On-chain sleuths, including ZachXBT, agree with publicly renowned the overlap between the seized addresses and the earlier susceptible-key insist.

    Cybercrime What the forensic epic shows regarding the LuBian exploit

    Concerning attribution, technical teams that first identified the flaw and traced the flows pause no longer utter recordsdata of who accomplished the 2020 drain. MilkSad consistently refers to an actor who chanced on and exploited susceptible non-public keys, declaring they pause no longer know the identity.

    Arkham and Blockscope list the entity because the LuBian hacker, specializing in formulation and scale. Elliptic and TRM confine their claims to tracing and to the match between the 2020 outflows and the later DOJ seizure. None of these sources names a insist actor for the 2020 operation.

    CVERC, amplified by the CCP-owned World Times and native pickups, advances a determined yarn.

    It argues that the four-year dormancy duration deviates from total felony money-out patterns and attributable to this truth aspects to a insist-level hacking group.

    It then hyperlinks the later U.S. custody of the money to the allegation that U.S. actors accomplished the exploit in 2020 before changing it into a legislation enforcement seizure.

    The document’s technical sections monitor carefully with fair open compare on susceptible keys, MT19937, contend with batching, and price patterns.

    Its attribution leap rests on circumstantial inferences about dormancy and final custody as a replace of contemporary forensics, tooling ties, infrastructure overlaps, or utterly different usual indicators utilized in insist actor attribution.

    Cybercrime What we of path know regarding the LuBian Bitcoin drain

    There are no longer much less than three coherent readings that fit what’s public.

    1. One is that an unknown occasion, felony or otherwise, chanced on the susceptible-key pattern, drained the cluster in 2020, left the money mostly dormant, and U.S. authorities later obtained the keys thru seizures of devices, cooperating witnesses, or linked investigative formulation, which culminated in consolidation and forfeiture filings in 2024–2025.
    2. A 2d treats LuBian and linked entities as segment of an inner treasury and laundering network for Prince Community, the assign an apparent hack could had been an opaque inner motion between susceptible-key-managed wallets, constant with DOJ’s framing of the wallets as unhosted and at some level of the defendant’s possession, even though public paperwork pause no longer fully detail how Chen’s network came to wait on an eye on the explicit keys.
    3. The third, evolved by CVERC, is that a U.S. insist actor used to be in cost for the 2020 operation. Per chance the dear two align with the evidentiary posture introduced in the filings of MilkSad, Arkham, Elliptic, TRM, and the DOJ.

    The third is an allegation no longer substantiated by fair technical evidence in the overall public arena.

    A transient timeline of the uncontested occasions is below.

    Date (UTC)OccasionApprox. BTCSource2020-12-28/29Coordinated drains from LuBian-managed addresses~127,000–127,426Arkham; Blockscope; MilkSad Replace #142021–2022OP_RETURN messages from LuBian-linked addresses pleading for returnN/AMilkSad Replace #14; Blockscope2023-08Disclosure of CVE-2023-39910 (susceptible MT19937 seeding in Libbitcoin Explorer)N/ANVD CVE-2023-399102024Consolidation of dormant money into contemporary wallets~127,000Blockscope; Arkham2025DOJ forfeiture action and public statements of U.S. custody~127,271DOJ; CBS News; Elliptic; TRM

    From a capability standpoint, brute forcing a 2^32 seed home is smartly inner reach for motivated actors. At about 1 million guesses per 2d, a single setup can traverse the home in a number of hours, and distributed or GPU-accelerated rigs compress that extra.

    Feasibility is central to the MilkSad-class weak spot, explaining how a single actor can sweep hundreds of susceptible addresses concurrently. The mounted-price pattern and contend with derivation info revealed by MilkSad and mirrored in CVERC’s technical write-up strengthen this sort of exploitation.

    The last disputes lie in possession and wait on an eye on at every step, no longer in the mechanics. DOJ frames the wallets as repositories for felony proceeds tied to Chen and states the assets are forfeitable below U.S. legislation.

    Chinese authorities body LuBian as a victim of theft and accuse a U.S. insist actor of the authentic exploit.

    Honest blockchain forensics groups join the 2020 outflows to the 2024–2025 consolidation and seizure, and stay in need of naming who pressed the button in 2020. That is the plight of the epic.

    Mentioned in this text

    Read Extra

    • Tags

    • credible cybercrime digital-forensics email-fraud Evidence forensics|digital-forensics Investigation investigationhacker malware malwarefraud online-scam private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker

    Recent Posts

    • FBI Deputy Director Dan Bongino says he plans to resign next month as bureau’s No 2 decent
    • Anna Kepner’s family’s ‘hurt control’ texts sent after her death existing desperation to protect her suspect stepbrother
    • 4 indicted in foiled New Year’s Eve alarm bombing space focusing on Southern California corporations
    • FBI Investigating Case of 2 Attorneys Who Vanished on Boat That Modified into as soon as Found Working & Empty
    • U.Okay. Police Plunge Investigation Into Bob Vylan’s Controversial Glastonbury Chants

    Recent Comments

    No comments to show.

    Categories

    • cybersecurity
    • Investigations
    • Uncategorized

    Recent Posts

    FBI Deputy Director Dan Bongino says he plans to resign next month as bureau’s No 2 decent
    December 24, 2025
    FBI Deputy Director Dan Bongino says he plans to resign next month as bureau’s No 2 decent
    Anna Kepner’s family’s ‘hurt control’ texts sent after her death existing desperation to protect her suspect stepbrother
    December 23, 2025
    Anna Kepner’s family’s ‘hurt control’ texts sent after her death existing desperation to protect her suspect stepbrother
    4 indicted in foiled New Year’s Eve alarm bombing space focusing on Southern California corporations
    December 23, 2025
    4 indicted in foiled New Year’s Eve alarm bombing space focusing on Southern California corporations

    Popular Tags

    administration calls Crypto Cyber cybercrime cybercrimefraud cybercrimehacker cybercrimephishing-attack cybersecurity Department deputy digital-forensics email-fraud Epstein FBI’s Florida forensics|digital-forensics Former fraud hacker hackers Investigation investigationcybersecurity Justice Korean Launches malware malwarefraud malwarephishing-attack Microsoft North online-scam online-scamphishing-attack orders Patel phishing-attack Police private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker probe Trump warns

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO