Cybersecurity

Federal Judge Releases ‘Razzlekhan,’ Orders Other Bitfinex Hack Laundering Suspect to Remain in Jail

WASHINGTON, D.C. — A federal judge has ordered one half of the couple accused of laundering the proceeds of a 2016 Bitfinex hack to remain in federal custody until they face trial.

Prosecutors allege that Ilya Lichtenstein, 34, and his wife, Heather Morgan, 31, conspired together to launder 119,754 bitcoins – worth over $5 billion in today’s prices – that were stolen during the 2016 hack of Bitfinex. The couple faces two conspiracy charges each that could see them face up to 25 years in prison. A judge ruled Monday that Morgan could be released on bail under strict conditions, but Lichtenstein will remain in custody pending trial.

Monday’s decision, made by Beryl Howell, chief judge of the U.S. District Court for the District of Columbia, overturns an earlier order made last week by a New York magistrate judge to allow the couple to be released on bond. Howell had already previously stayed the order on an emergency basis after the New York judge said they could be released on bail.

Howell sided with prosecutors’ position that the couple have both the motive and means to skip bail and flee the United States.

Earlier this month, federal agents seized approximately 94,000 bitcoins (worth over $3.6 billion) held in a wallet whose private keys were found in one of Lichtenstein’s cloud accounts. However, the government alleges the couple still has access to bitcoin worth over $300 million.

Read more

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Directive NIS 2 : Comprendre les obligations en cybersécurité pour les entreprises européennes

Directive NIS 2 : Comprendre les nouvelles obligations en cybersécurité pour les entreprises européennes La…

2 jours ago

NIS 2 : entre retard politique et pression cybersécuritaire, les entreprises dans le flou

Alors que la directive européenne NIS 2 s’apprête à transformer en profondeur la gouvernance de…

3 jours ago

Quand l’IA devient l’alliée des hackers : le phishing entre dans une nouvelle ère

L'intelligence artificielle (IA) révolutionne le paysage de la cybersécurité, mais pas toujours dans le bon…

4 jours ago

APT36 frappe l’Inde : des cyberattaques furtives infiltrent chemins de fer et énergie

Des chercheurs en cybersécurité ont détecté une intensification des activités du groupe APT36, affilié au…

4 jours ago

Vulnérabilités des objets connectés : comment protéger efficacement son réseau en 2025

📡 Objets connectés : des alliés numériques aux risques bien réels Les objets connectés (IoT)…

7 jours ago

Cybersécurité : comment détecter, réagir et se protéger efficacement en 2025

Identifier les signes d'une cyberattaque La vigilance est essentielle pour repérer rapidement une intrusion. Certains…

7 jours ago

This website uses cookies.