Key Points:
The unknown individual used a feature in the Bitcoin blockchain’s transaction documentation to identify 986 wallets controlled by the Foreign Military Intelligence Agency (GRU), Foreign Intelligence Service (SVR), and Federal Security Service (FSB), according to Chainalysis, a company that works closely with the US government. The vigilante’s messages, written in Russian, accuse the wallets of being engaged in hacking operations.
The authenticity of the individual’s statements is yet unknown, and the three organizations have yet to reply to the news. If the claims are accurate, it is clear that the individual gained access to at least some of the addresses they allege are possessed by Russia, either via hacking or even an inside operation.
These charges, made in the weeks preceding Russia’s unprovoked invasion of Ukraine in February 2022, provided an unexpected crypto edge to a war already filled with interesting occurrences. The Ukrainian government has used cryptocurrencies to raise tens of millions of dollars for military purposes. Curiously, according to Chainalysis, some of the wallets ostensibly owned by Russia have already remitted payments to Ukraine.
Chainalysis reports that at least three of the reported Russian wallet addresses had already been identified with Russia by external parties, lending legitimacy to the mystery Bitcoiner’s assertions. Two of these wallets were allegedly engaged in the SolarWinds assault, while another supported servers used in Russia’s misinformation effort during the 2016 election.
According to Chainalysis, the mystery Bitcoiner’s spending habits add credence to their assertions. The person essentially destroyed almost $300,000 in Bitcoin while recording their claims on the blockchain, which is much more than is necessary for using the Bitcoin network’s OP RETURN field.
In a report, Chainalysis noted:
“The fact that the OP_RETURN sender was both willing and able to burn hundreds of thousands of dollars’ worth of Bitcoin in order to spread their message makes it more likely in our opinion that their information is accurate.”
The sender ceased producing the inscriptions when Russia invaded Ukraine. They thereafter restarted their operations by delivering Bitcoin related to Russia to Ukrainian charity accounts.
If the claims are genuine, the addresses and any Bitcoin they contain are effectively compromised from a security standpoint, as Chainalysis pointed out. The possibility that the OP RETURN sender gained private keys for Russian-controlled addresses casts doubt on the security of the Putin regime’s crypto activities.
DISCLAIMER: The Information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing.
Join us to keep track of news: https://linktr.ee/coincu
Harold
Coincu News
Discover why Qubetics, NEAR Protocol, and Immutable X are the best altcoins to join today,…
BTFD Coin is offering a chance to relive the glory days of meme coin investing,…
Explore key takeaways from BlockDAG’s AMA, showcasing strides in scalability, growth of the ecosystem, and…
Discover why Qubetics, Polkadot, and Cosmos are the best cryptos with 1000X potential, offering innovation,…
Explore the best coins to buy in December 2024—Qubetics with its thrilling presale, Polkadot’s interoperability,…
The Crypto Market Outlook 2025 highlights key areas: stablecoin growth, tokenization, crypto ETFs, DeFi innovation,…
This website uses cookies.