Skip to content

Alleged Employee of CoinDCX apprehended due to suspected involvement in $44 million cryptocurrency exchange breach.

Hackers deceived an employee into Installing malware on their office computer by offering a phony freelance job.

Unidentified CoinDCX worker apprehended for alleged $44 million crypto exchange theft
Unidentified CoinDCX worker apprehended for alleged $44 million crypto exchange theft

Alleged Employee of CoinDCX apprehended due to suspected involvement in $44 million cryptocurrency exchange breach.

In a shocking turn of events, North Korean hackers have infiltrated the Indian crypto exchange, CoinDCX, using elaborate fake job interviews and social engineering tactics. The breach, which occurred on July 19, resulted in the theft of $44 million (₹384 crore) worth of crypto assets.

The investigation into the CoinDCX hack is currently active, with the Bengaluru police having arrested a CoinDCX employee named Rahul Agarwal in connection with the incident. Agarwal is currently in police custody, and further details about the investigation are being withheld to protect its integrity.

The hackers reportedly exploited Agarwal's corporate device after he was drawn into an online part-time job scam promising easy money for minor digital tasks. This social engineering ploy gave the hackers access to Agarwal's work device and the credentials of CoinDCX's liquidity wallet.

The attack pattern mirrors other North Korean campaigns involving the use of social engineering to exploit employees directly, leveraging legitimate account privileges once inside the system, and laundering stolen funds through crypto mixers like Tornado Cash and cross-chain bridges to conceal fund flows.

In the CoinDCX case, the stolen funds were transferred across six separate digital wallets before being consolidated in a North Korean-controlled account. It's important to note that no customer funds were affected in the CoinDCX hack.

This isn't the first time that hackers have used fake offers of work as a social engineering technique. Infrastructure attacks accounted for nearly 70% of stolen funds in 2024, with India emerging as an emerging hotspot for such attacks. Attackers often use cloned websites, deepfake interviews, and fraudulent HR platforms to trick victims into compromising their systems.

In response to the incident, CoinDCX has launched a bounty offering 25% of any recovered assets to anyone who helps identify the attackers or recover the stolen crypto. Law enforcement faces significant obstacles in recovering the stolen digital assets, making efforts like this crucial in the fight against cybercrime.

As the world continues to rely more heavily on digital assets, it's essential to remain vigilant against such threats. Users are advised to be cautious of unsolicited job offers, especially those that seem too good to be true, and to always verify the authenticity of any recruitment offers before engaging with them.

  1. Rahul Agarwal, a CoinDCX employee, was arrested by the Bengaluru police in connection with the CoinDCX hack.
  2. The stolen crypto assets from CoinDCX, worth $44 million (₹384 crore), were transferred across six separate digital wallets.
  3. Cryptocurrency mixers like Tornado Cash and cross-chain bridges were used to conceal the flow of the stolen funds in the CoinDCX case.
  4. The stolen funds in the CoinDCX hack were not customer funds, but assets from CoinDCX's liquidity wallet.
  5. Infrastructure attacks accounted for nearly 70% of stolen funds in 2024, with India being an emerging hotspot for such attacks.
  6. The investigation into the CoinDCX hack is still active, with the Bengaluru police withholding further details to protect the integrity of the investigation.
  7. CoinDCX has launched a bounty, offering 25% of any recovered assets, to anyone who helps identify the attackers or recover the stolen crypto.
  8. To remain vigilant against digital asset threats, users are advised to be cautious of unsolicited job offers, especially those that seem too good to be true, and to always verify the authenticity of any recruitment offers before engaging with them.

Read also:

    Latest