It won’t be easy to hide the Bitcoin stolen through Twitter

Bitcoin is a great currency to use for criminal transactions because it has no central bank or overarching authority to resolve disputes or combat fraud. One thing it does have in its favor, however, is that the ledger of all Bitcoin transactions is public, and searchable. Which means that, while difficult, it’s entirely possible to follow the source and destination of the money handed over. 

In this, like with every other major Bitcoin scam, it’s relatively easy to trace the source of any transaction back to an exchange. That’s the place where people can turn their US dollars into Bitcoin (or back again), which can then be investigated by authorities. This is how the Department of Justice tracked down the Russian agents involved in the 2016 elections. 

For the individual, or individuals, who have scored $118,000 as part of this audacious hack, what now? At the time of writing, all but $114 of that $118,000 haul has been transferred to other wallets. But those transactions are still just as visible as the current ones, so how can a person get that cash out of the system without getting a visit from the feds?

Dominik Schiener is co-founder of IOTA, a distributed ledger technology that enables feeless micropayments. He said that while people believe Bitcoin is anonymous, it is really, at best, pseudonymous, since you need a real identity to collect your money. Schiener said that the easiest way to launder Bitcoin is with a Mixing Service, which works in a similar way to traditional money laundering, and is called a Bitcoin Tumbler. Essentially, a Tumbler takes coins from a variety of sources, both clean and dirty, and mixes them up. Then, it pays out small amounts — the Bitcoin equivalent of small change — until you’ve got clean cash. 

Unfortunately, that doesn’t necessarily mean that your ill-gotten gains are entirely free from their history. Schiener explained that, broadly, Bitcoin offers you security through obscurity — the process of making things secure by making them hard to find, rather than anything else. Which means that any well-resourced and committed investigator could keep delving until they find you.

It’s worth noting, too, that operators of Tumbling operations are in the sights of various law-enforcement agencies. In February, the Department of Justice arrested a 36-year-old Ohio resident who ran Helix, a service that’s said to have laundered $300 million worth of Bitcoin. 

So even if you’ve tumbled your Bitcoin, you’re still left with the risk that, when you suddenly withdraw a large sum of cash from an exchange, you’ll be caught. “Exchanges are a single point of failure,” said Schiener, since cashing out instantly ties you to a real-world bank account, name and address. 

That’s why it’s equally plausible that, once you’ve tumbled your money, you would then use it not to buy USD, but a different cryptocurrency. For instance, taking your ill-gotten gains to a foreign crypto exchange that doesn’t have the same reporting requirements. There, you can buy a more privacy-focused token, like Monero, which has an obfuscated public ledger. All you do then is wait for a while and buy goods and services with your Monero, or cash out when the coast is clear.

Another way of laundering ill-gotten cryptocurrency is with gambling, visiting any crypto casino and putting it all on red, or black. Obviously there’s still a lot of risk involved, but then if you’re already committing to a high-profile Twitter hack, you’re clearly feeling lucky. It helps, of course, if you have connections to a gambling site, exchange or any other institute that will be able to facilitate your laundering. Otherwise you’re just hitting and hoping that you’ll be able to walk away with your cash at the end of it. 

Of course, hackers gaining what is known within industry circles as “God Mode” access to any online platform is troubling. Moreso because Twitter can be used to move markets, make massive political declarations and get people fired. A number of people believe that, because of the sophistication of the hack, the intended goal was not to earn as paltry a sum as $118,000. 

The value of the access to Twitter’s highest-profile accounts, and the ability to tweet as these major business people, would be priceless in the right hands. Imagine announcing, with Jeff Bezos’ voice, some imagined initiative that would tank Amazon’s stock. Or using the content of their direct messages to blackmail or otherwise intimidate another high-profile figure. 

Ray Walsh, at ProPrivacy, said that the hackers were “either highly unimaginative or extremely restrained.” Essentially, he believes that this scam may have been a ruse, “simply a distraction from the real hack.” Selling admin access to Twitter on the dark net, for instance, would have likely been far more valuable while attracting far less attention. 

The alternative explanation, of course, is that the hacker was great at gaining access but did it more for the kudos than any financial gain. But whichever way, whoever committed the hack has offered a timely wake-up call to Twitter’s security team. With the 2020 elections racing toward us, it’s probably smart for the company to lock the stable door before any more horses bolt.