{"id":52853,"date":"2021-11-14T16:21:44","date_gmt":"2021-11-14T14:21:44","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=52853"},"modified":"2025-09-03T12:14:00","modified_gmt":"2025-09-03T09:14:00","slug":"indian-hacker-claims-responsibility-for-bitfinex-and-btc-e-attacks","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/indian-hacker-claims-responsibility-for-bitfinex-and-btc-e-attacks\/","title":{"rendered":"Indian hacker claims responsibility for Bitfinex and BTC-e attacks"},"content":{"rendered":"<p>A resident of the Indian state of Karnataka, Srikrishna Ramesh (Srikrishna Ramesh) told police of his involvement in breaches of cryptocurrency exchanges Bitfinex and BTC-e, as well as the BitClub Network fraudulent mining pool. <a href=\"https:\/\/www.google.com\/search?q=India+Today&#038;oq=India+Today&#038;aqs=chrome..69i57j69i60.3886j0j9&#038;sourceid=chrome&#038;ie=UTF-8\">India Today<\/a>.<\/p>\n<p>Ramesh was arrested in November 2020 in connection with a drug-trafficking case. Subsequently, he admitted to numerous cybercrimes, including those related to cryptocurrency services.<\/p>\n<p>According to him, he is behind the Bitfinex hack that occurred in May 2015. The platform was attacked again in August 2016, but the Indian hacker allegedly had no involvement in that incident.<\/p>\n<blockquote class=\\\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\\\">\n<p>\u201cBitfinex was the first major cryptocurrency exchange I hacked. The platform was hacked twice, and I was the first to do it. The second case was merely a targeted phishing attack, as a result of which two Israeli hackers working for the army gained access to the computers of one of the employees, and then to the <span data-descr=\\\"the commercial public cloud Amazon Web Services\\\" class=\\\"old_tooltip\\\">AWS<\/span> account,\u201d Ramesh said.<\/p>\n<\/blockquote>\n<p>He said that a bug in Bitfinex&#8217;s data centre allowed access to the <a href=\\\"https:\/\/ru.wikipedia.org\/wiki\/KVM\\\">KVM<\/a> on the server. As a result, the latter was rebooted in <a href=\\\"https:\/\/ru.wikipedia.org\/wiki\/GNU_GRUB\\\">GRUB<\/a> mode \u2014 Ramesh reset the administrator password, logged into the system, reset the withdrawal server passwords and sent cryptocurrency to his own address.<\/p>\n<p>The hacker said that the attack earned him about 20,008 BTC, which he spent to sustain a luxurious lifestyle.<\/p>\n<p>Ramesh also claimed responsibility for hacking the servers of the fraudulent mining pool <a href=\"https:\/\/forklog.com\/en\/news\/bitclub-network-mining-pool-organizer-pleads-guilty-to-722-million-fraud\">BitClub Network<\/a>, from which he withdrew about 100 BTC, and the now-defunct Bitcoin exchange <a href=\"https:\/\/forklog.com\/en\/news\/btc-e-payment-processor-leads-fincen-files-in-mentions\">BTC-e<\/a>. According to him, the most recent attack yielded a \u201clarge profit\u201d of $3\u2013$3.25 million.<\/p>\n<p>In August 2021, the hacker <a href=\"https:\/\/forklog.com\/en\/news\/liquid-bitcoin-exchange-hacked-for-80-million\">breached the hot wallets of the Japanese cryptocurrency exchange Liquid<\/a> and withdrew digital assets worth more than $80 million.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A resident of the Indian state of Karnataka, Srikrishna Ramesh, told police of his involvement in the hacks of cryptocurrency exchanges Bitfinex and BTC-e, and the BitClub Network fraudulent mining pool.<\/p>\n","protected":false},"author":1,"featured_media":52854,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1923,95,1350,1154],"class_list":["post-52853","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-bitclub","tag-bitfinex","tag-btc-e-wex","tag-crimes"],"aioseo_notices":[],"amp_enabled":true,"views":"15","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/52853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=52853"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/52853\/revisions"}],"predecessor-version":[{"id":52855,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/52853\/revisions\/52855"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/52854"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=52853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=52853"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=52853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}