The post South Korea Extradites Hacker Accused of Stealing Bitcoin via Wallet Malware appeared on BitcoinEthereumNews.com. South Korea extradited a 29-year-old The post South Korea Extradites Hacker Accused of Stealing Bitcoin via Wallet Malware appeared on BitcoinEthereumNews.com. South Korea extradited a 29-year-old

South Korea Extradites Hacker Accused of Stealing Bitcoin via Wallet Malware

  • Suspect used KMSAuto malware, disguised as Windows activation tool, downloaded over 2 million times globally.

  • Hacking technique altered memory to redirect crypto transfers to thief’s wallets automatically.

  • Over 840 successful intercepts; eight South Korean victims lost 16 million won combined.

South Korea extradites Lithuanian hacker in major crypto theft case worth $1.8M. Discover the malware scheme, investigation details, and enhanced police measures against cybercrime. Stay secure—read now!

What is the South Korea extradition of Lithuanian crypto hacker case?

South Korea extradites Lithuanian crypto hacker Marius P., a 29-year-old national, following a multi-year probe into thefts exceeding 1.7 billion won in digital assets. The National Office of Investigation under the Korean National Police Agency announced the extradition from Georgia, where he was detained after entering the country. This operation highlights international cooperation in combating cross-border cybercrimes targeting cryptocurrency users.

How did the malware enable the crypto wallet thefts?

The hacker distributed KMSAuto, malicious software masquerading as a legitimate Microsoft Windows activation tool, which was downloaded more than 2 million times worldwide between April 2020 and January 2023. Once installed, primarily on systems without licensed activation software, it exploited a memory hacking method to secretly replace victims’ cryptocurrency wallet addresses with the perpetrator’s during transactions. This technique allowed for seamless redirection of funds without alerting users. Reports from the National Office of Investigation indicate over 3,100 wallets were compromised globally, resulting in 840 intercepted transactions totaling 1.7 billion won. Among these, eight South Korean nationals suffered losses amounting to 16 million won. The scheme’s sophistication evaded detection initially, but a pivotal report in August 2020 from a victim who lost one Bitcoin—valued at 12 million won—triggered the investigation. Traces led stolen assets to exchanges in six countries, uncovering seven additional Korean victims. Cybersecurity experts note this method preys on unsuspecting users seeking free software, underscoring vulnerabilities in crypto handling.

Frequently Asked Questions

Who is the Lithuanian hacker extradited by South Korea for crypto theft?

The 29-year-old Lithuanian national, identified through joint operations, stands accused of orchestrating a malware-based crypto theft ring affecting users in Korea and abroad. Extradited from Georgia after a five-year investigation, he faces charges in South Korea for stealing over 1.7 billion won via wallet address manipulation.

What steps did South Korean police take to extradite the crypto hacker?

South Korean authorities, via the National Office of Investigation, collaborated with Lithuania’s Ministry of Justice, prosecutors, and police, raiding the suspect’s home in December and seizing 22 items like laptops and phones. An Interpol red notice followed, leading to his arrest in Georgia in April and successful extradition after court approval.

Key Takeaways

  • Malware distribution scale: KMSAuto infected 3,100+ wallets worldwide, demonstrating risks of unverified software downloads.
  • Investigation success: Five-year probe involving multiple nations resulted in seizure of evidence and extradition, tracing funds across six countries.
  • Stronger enforcement: Police commit to global partnerships; users urged to use licensed tools and report thefts promptly.

Conclusion

The South Korea extradition of Lithuanian crypto hacker marks a significant victory against sophisticated cyber threats in the digital asset space, with the malware scheme’s details revealing critical security gaps. Led by the National Office of Investigation and supported by international allies, this case exemplifies robust responses to borderless crimes. Park Woo-hyun, head of cyber investigations at the Korean National Police Agency, emphasized continued firm action through global collaboration. As cryptocurrency adoption grows, users must prioritize vigilance with wallet verification and official software to mitigate such risks, ensuring a safer ecosystem ahead.

South Korea’s law enforcement demonstrated unwavering resolve in this case. The operation began with a single Bitcoin theft report in August 2020, evolving into a comprehensive probe that pinpointed the suspect through blockchain analysis and international intelligence sharing. Assets were funneled to domestic and foreign exchanges, complicating recovery but not halting justice.

The malware’s memory manipulation technique represents an advanced persistent threat, often overlooked in favor of phishing awareness. By targeting clipboard or memory buffers, it intercepts addresses in real-time, a method increasingly seen in crypto scams. Data from the investigation shows the attacker’s focus on non-licensed systems maximized reach without sophisticated entry vectors.

Cooperation with Lithuania yielded critical evidence: 22 seized devices containing transaction logs and propagation tools. Georgia’s swift action post-Interpol notice expedited the process, culminating in the suspect’s arrival in Korea for formal charges under a warrant.

In parallel, South Korean authorities addressed related threats, convicting a local collaborator with North Korean hackers in a separate gaming server case, where $16,300 was paid for disabling software. This underscores the nexus between state-sponsored actors and opportunistic criminals.

Police statements reassure the public: cyber units will intensify patrols, urging avoidance of pirated tools and immediate reporting of anomalies. As digital assets permeate finance, such precedents bolster investor confidence and deter future perpetrators through demonstrated accountability.

Source: https://en.coinotag.com/south-korea-extradites-hacker-accused-of-stealing-bitcoin-via-wallet-malware

Market Opportunity
Octavia Logo
Octavia Price(VIA)
$0.0078
$0.0078$0.0078
-8.23%
USD
Octavia (VIA) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.