Lithuanian Hacker Extradited to Korea After ₹10 Crore Crypto Heist Using Malware

Published:

spot_img

South Korea’s Cyber Sleuths Extradite Notorious Hacker: A Milestone in Cybercrime Law Enforcement

South Korea has launched a major offensive against cybercrime, marked by the recent extradition of a 29-year-old Lithuanian hacker who drained approximately 1.7 billion won (about $1.18 million) in cryptocurrency from victims around the globe. This ambitious pursuit began nearly five years ago and finally yielded results when the National Office of Investigation (NOI) under the Korean National Police Agency announced the arrest on Sunday. Among the casualties were eight South Koreans who lost a total of 16 million won, underscoring the personal toll of cyber theft.

5-Year Manhunt: From Lithuania to Georgia

From April 2020 to January 2023, the suspect unleashed a malicious software program known as KMSAuto. This software masqueraded as a free tool for activating Microsoft Windows but crippled the cybersecurity of countless unsuspecting users. Over 2.8 million downloads globally allowed the malware to infiltrate systems efficiently, employing sophisticated techniques like “memory hacking” to manipulate transaction data silently. Victims unknowingly transferred their funds directly to the hacker’s wallets as their original wallet addresses were stealthily swapped during transactions.

The scale of this operation was staggering, as over 3,100 wallets were compromised across more than 8,400 illicit transactions. The search for the suspect began in earnest in August 2020 after a Korean individual lost 1 Bitcoin (valued at 12 million won at the time). This loss triggered an extensive investigation that traced Bitcoin activity through six different countries, ultimately uncovering seven additional domestic victims.

A Stolen Home: The Arrest

In December 2024, Lithuanian authorities executed a search warrant at the suspect’s residence and seized 22 electronic devices, including phones and laptops, in response to a formal request from South Korea. The case escalated when an Interpol Red Notice was issued, leading to his arrest in Georgia in April. The suspect was then extradited to South Korea for prosecution, marking a significant victory for international legal cooperation against cybercriminals.

Upon arrival in South Korea, the NOI took him into custody under a court warrant. The Korean National Police Agency stated emphatically, “We’ll pursue overseas cybercriminals targeting Koreans through transnational cooperation.” Cyber chief Park Woo-hyun reinforced this commitment, assuring that a robust response to cross-border cybercrime would be uphold via global law enforcement collaboration and extradition.

KMSAuto: A Legit Tool Turned Lethal Thief

KMSAuto was initially designed to target users who lacked a licensed version of Microsoft Windows. However, it quickly morphed into a dangerous weapon. By exploiting vulnerabilities in the clipboard functionality, the malware would automatically replace copied wallet addresses mid-transaction without the victim’s knowledge. Victims would receive confirmations of “successful” transactions while unknowingly enriching the hacker. Even hardware wallets and address verification mechanisms were rendered ineffective.

This widespread issue is not isolated to South Korea. Countries like India are encountering similar cyber threats, with estimates suggesting cyber losses could reach ₹18,000 crores by 2025. In response, India’s Indian Cyber Crime Coordination Centre (I4C) is actively pursuing international gangs utilizing Mutual Legal Assistance Treaties (MLATs) to track down these elusive criminals around the world.

Protecting Crypto Assets: Essential Tools for Prevention

Given the landscape of evolving cyber threats, especially in cryptocurrency, it has become crucial for individuals to adopt protective measures:

  • Use Hardware Wallets (Renderer/Trezor): These devices store private keys offline, adding an extra layer of security against malware.
  • Manual Address Verification: Always double-check wallet addresses before sending any funds to make sure they match the intended recipient.
  • Multi-Signature Accounts: For considerable holdings, it’s wise to implement multi-signature protocols which require multiple approvals before a transaction can be executed.
  • Deploy Antivirus Software and Endpoint Detection and Response (EDR): Continuous monitoring for memory-based threats can help spot unusual activities before they escalate.

The extradition of the Lithuanian hacker not only highlights advancements in international policing but also serves as a wake-up call for crypto investors. As cyber scams become increasingly sophisticated—ranging from wallet drainers to seed phrase phishing—it is more important than ever to remain vigilant and proactive in protecting digital assets.

The South Korean victory sends a clear message to cybercriminals everywhere: there is no longer a safe harbor for those who operate in the shadows of the digital world.

spot_img

Related articles

Recent articles

Researchers Uncover ZionSiphon Malware Targeting Israeli Water Treatment Systems

Researchers Uncover ZionSiphon Malware Targeting Israeli Water Treatment Systems Cybersecurity researchers have identified a new malware strain named ZionSiphon, specifically engineered to compromise Israeli water...

Cisco Patches Critical ISE Vulnerabilities Exposing Enterprises to Remote Code Execution Risks

Cisco Patches Critical ISE Vulnerabilities Exposing Enterprises to Remote Code Execution Risks Cisco has issued critical security updates addressing multiple vulnerabilities in its Identity Services...

Vercel Incident Exposes Risks of Third-Party AI Tool Compromise in Cybersecurity

Vercel Incident Exposes Risks of Third-Party AI Tool Compromise in cybersecurity Vercel, a prominent platform for frontend developers, has reported a significant security incident involving...

DXB LIVE Achieves 33% Growth in 2025, Organizing 442 Events Across the UAE

DXB LIVE Achieves 33% Growth in 2025, Organizing 442 Events Across the UAE In a significant development for the events sector, DXB LIVE, the integrated...