recommended reading


Australia-based bitcoin fund robbed of $70,000 after U.S. Marshals leaked contact info

Credential-stealing malware; Cyber espionage; Password cracking; Social engineering; Spear-phishing; User accounts compromised

The email address of Sam Lee, co-founder of Bitcoins Reserve, was made public by accident, allowing an attacker to send him an infected message that stole company computer credentials.  

Lee’s contact details, along with those of others interested in an auction of 30,000 bitcoins confiscated from the Silk Road black marketplace, were recently leaked by the U.S. Marshalls Service by mistake.  

The hacker posed as a journalist requesting an interview to lure Lee into opening a bogus Google Doc. Lee believed the file contained interview questions.

By clicking on a link to the document, Lee unwittingly unleashed a malicious program that grabbed access to his email account and other passwords.

The attacker pried into company emails through that one opening

“They couldn’t gain direct access to Bitcoins Reserve’s bitcoins, Lee says, because it’s handled by a security expert ‘and they’re all locked down,’” StartupSmart reports. “Instead they sent an email from Lee’s email address, purporting to be him, to the company’s chief technology officer, requesting that 100 bitcoins be sent to a specific bitcoin address.”

The CTO requested to speak over the phone with the individual claiming to be Lee to confirm it was indeed him.

The attacker consented, but said the call would have to be later that afternoon since he was busy.

In an unfortunate coincidence, Lee actually was busy on the morning of the attack, and unable to answer his mobile, which made the attacker’s claims more credible.

The CTO called other fund executives who authorized the transaction, under the mistaken impression they were fulfilling an internal client withdrawal request.

“Is it the U.S. Marshals’ fault that the attack occurred? Absolutely! Is it their fault that we lost some Bitcoins? No,” Lee tells StartupSmart. “I’m glad it’s happened sooner rather than later, as it’s made us aware of our vulnerabilities.”


Financial Services


July 1, 2014

reported by


number affected


location of breach




location of perpetrators


date breach occurred

Some point in mid to late June 2014

date breach detected

Some point in mid to late June 2014

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.