Key Points:
The unknown individual used a feature in the Bitcoin blockchain’s transaction documentation to identify 986 wallets controlled by the Foreign Military Intelligence Agency (GRU), Foreign Intelligence Service (SVR), and Federal Security Service (FSB), according to Chainalysis, a company that works closely with the US government. The vigilante’s messages, written in Russian, accuse the wallets of being engaged in hacking operations.
The authenticity of the individual’s statements is yet unknown, and the three organizations have yet to reply to the news. If the claims are accurate, it is clear that the individual gained access to at least some of the addresses they allege are possessed by Russia, either via hacking or even an inside operation.
These charges, made in the weeks preceding Russia’s unprovoked invasion of Ukraine in February 2022, provided an unexpected crypto edge to a war already filled with interesting occurrences. The Ukrainian government has used cryptocurrencies to raise tens of millions of dollars for military purposes. Curiously, according to Chainalysis, some of the wallets ostensibly owned by Russia have already remitted payments to Ukraine.
Chainalysis reports that at least three of the reported Russian wallet addresses had already been identified with Russia by external parties, lending legitimacy to the mystery Bitcoiner’s assertions. Two of these wallets were allegedly engaged in the SolarWinds assault, while another supported servers used in Russia’s misinformation effort during the 2016 election.
According to Chainalysis, the mystery Bitcoiner’s spending habits add credence to their assertions. The person essentially destroyed almost $300,000 in Bitcoin while recording their claims on the blockchain, which is much more than is necessary for using the Bitcoin network’s OP RETURN field.
In a report, Chainalysis noted:
“The fact that the OP_RETURN sender was both willing and able to burn hundreds of thousands of dollars’ worth of Bitcoin in order to spread their message makes it more likely in our opinion that their information is accurate.”
The sender ceased producing the inscriptions when Russia invaded Ukraine. They thereafter restarted their operations by delivering Bitcoin related to Russia to Ukrainian charity accounts.
If the claims are genuine, the addresses and any Bitcoin they contain are effectively compromised from a security standpoint, as Chainalysis pointed out. The possibility that the OP RETURN sender gained private keys for Russian-controlled addresses casts doubt on the security of the Putin regime’s crypto activities.
DISCLAIMER: The Information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing.
Join us to keep track of news: https://linktr.ee/coincu
Harold
Coincu News
Here are the latest predictions for Dogecoin, Shiba Inu, and ETFswap.
Discover BlockDAG's 100% bonus and $110M presale surge that’s sparking interest among crypto enthusiasts. Also,…
Discover why crypto investors are moving to ETFSwap (ETFS) as $500 million liquidity injection is…
Learn about BlockDAG's $110M presale achievement and the whopping 100% bonus offer, alongside Ethereum's growth…
Thai police corruption exposed as officers extort millions in USDT from a Chinese man under…
SafePal Telegram Wallet allows 950 million users to create compliant crypto-friendly Swiss bank accounts, integrating…
This website uses cookies.