{"id":3224,"date":"2025-04-16T02:46:43","date_gmt":"2025-04-16T02:46:43","guid":{"rendered":"https:\/\/satoshibrother.com\/fr\/trois-ingenieurs-ditoken-condamnes-a-trois-ans-de-prison-pour-avoir-vole-des-portefeuilles-de-cryptomonnaie-grace-a-une-porte-derobee\/"},"modified":"2025-04-16T02:46:43","modified_gmt":"2025-04-16T02:46:43","slug":"trois-ingenieurs-ditoken-condamnes-a-trois-ans-de-prison-pour-avoir-vole-des-portefeuilles-de-cryptomonnaie-grace-a-une-porte-derobee","status":"publish","type":"post","link":"https:\/\/satoshibrother.com\/fr\/trois-ingenieurs-ditoken-condamnes-a-trois-ans-de-prison-pour-avoir-vole-des-portefeuilles-de-cryptomonnaie-grace-a-une-porte-derobee\/","title":{"rendered":"Trois ing\u00e9nieurs d&rsquo;iToken condamn\u00e9s \u00e0 trois ans de prison pour avoir vol\u00e9 des portefeuilles de cryptomonnaie gr\u00e2ce \u00e0 une \u00ab\u00a0porte d\u00e9rob\u00e9e\u00a0\u00bb"},"content":{"rendered":"<h2>Conspiracy and Implementation<\/h2>\n<p>Between <strong>March and May 2023<\/strong>, three frontend development engineers of the iToken application, named <strong>Liu<\/strong>, <strong>Zhang 1<\/strong>, and <strong>Dong 2<\/strong>, conspired to implant a <em>&quot;backdoor&quot;<\/em> in the iToken application package. This manipulation allowed them to illegally obtain <strong>private keys<\/strong>, <strong>mnemonic phrases<\/strong>, and other data related to users&rsquo; digital wallets.<\/p>\n<p>They subsequently uploaded this information to a database on a preconfigured <strong>VPS server<\/strong>, associated with a specific domain name, before transferring it to a local server. Investigators discovered that <strong>27,622 mnemonic phrases<\/strong> and <strong>10,203 private keys<\/strong> (all de-duplicated) had been illegally collected. This data was used to generate <strong>19,487 unique digital wallet addresses<\/strong>.<\/p>\n<h2>Roles of the Involved Parties<\/h2>\n<p><strong>Liu<\/strong> was responsible for writing the logical code for the request; <strong>Zhang 1<\/strong> handled the setup of the VPS and the database, as well as the upload on the Android version of iToken; and <strong>Dong 2<\/strong> was in charge of purchasing the domain name, encrypting the users&rsquo; private keys, and uploading on the iOS version of iToken.<\/p>\n<h2>Legal Consequences<\/h2>\n<p>Following their arrest, the three defendants confessed to their crimes. The court ruled that they had violated state regulations by using technical means to illegally obtain data from the computer information system, which constituted a particularly serious crime.<\/p>\n<blockquote>\n<p>Thus, Liu, Zhang 1, and Dong 2 were found guilty of illegally obtaining data from the computer information system. They were sentenced to <strong>three years in prison<\/strong> and a fine of <strong>30,000 RMB<\/strong> each.<\/p>\n<\/blockquote>\n<p>In addition, they are prohibited from engaging in any activities related to <strong>network security management<\/strong>, <strong>network operation<\/strong>, or any related work for three years following the completion of their sentence.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conspiracy and Implementation Between March and May 2023, three frontend development engineers of the iToken application, named Liu, Zhang 1, and Dong 2, conspired to implant a &quot;backdoor&quot; in the iToken application package. This manipulation allowed them to illegally obtain private keys, mnemonic phrases, and other data related to users&rsquo; digital wallets. They subsequently uploaded this information to a database on a preconfigured VPS server, associated with a specific domain name, before transferring it to a local server. Investigators discovered that 27,622 mnemonic phrases and 10,203 private keys (all de-duplicated) had been illegally collected. This data was used to generate<\/p>\n","protected":false},"author":3,"featured_media":3223,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[64],"tags":[65,1994],"class_list":["post-3224","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hack","tag-hack","tag-rmb"],"yoast_description":"Trois ing\u00e9nieurs d'iToken ont \u00e9t\u00e9 condamn\u00e9s \u00e0 trois ans de prison pour avoir implant\u00e9 une porte d\u00e9rob\u00e9e afin de voler des donn\u00e9es de portefeuilles de cryptomonnaie, affectant des milliers de personnes.","_links":{"self":[{"href":"https:\/\/satoshibrother.com\/fr\/wp-json\/wp\/v2\/posts\/3224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/satoshibrother.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/satoshibrother.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/satoshibrother.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/satoshibrother.com\/fr\/wp-json\/wp\/v2\/comments?post=3224"}],"version-history":[{"count":0,"href":"https:\/\/satoshibrother.com\/fr\/wp-json\/wp\/v2\/posts\/3224\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/satoshibrother.com\/fr\/wp-json\/wp\/v2\/media\/3223"}],"wp:attachment":[{"href":"https:\/\/satoshibrother.com\/fr\/wp-json\/wp\/v2\/media?parent=3224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/satoshibrother.com\/fr\/wp-json\/wp\/v2\/categories?post=3224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/satoshibrother.com\/fr\/wp-json\/wp\/v2\/tags?post=3224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}