Case Study: Digital Evidence Confirms Players In Major Bitcoin Heist

Traditional policework helped track down the thieves targeting cryptocurrency data centers in Iceland, but digital intelligence from one suspect’s mobile devices provided the proof of their involvement.

Date: 2018
Challenge: To connect six suspects to the theft of more than $2M in tech equipment for mining Bitcoins from several cryptocurrency data centers in Iceland
Tools: UFED Touch2, Cellebrite Physical Analyzer, Cellebrite Advanced Services
Result: Data from the main suspect’s mobile devices, extracted and analyzed using Cellebrite’s digital intelligence tools and services, proved the involvement of six suspects in the Bitcoin heist — and led to their convictions.

The Case

Iceland, with its low crime rate, cheap warehouse space, polar climate, and abundance of inexpensive geothermal energy, has become the world’s leader in digital currency mining over the past several years. Sindri Thor Stefansson, an Icelandic man with a history of criminal activity and prison time, saw an opportunity to start his own Bitcoin mining operation — by stealing computers from cryptocurrency data centers located in the southwest region of Iceland.

Stefansson enlisted help from four other associates to execute his plan. Over a two-month period in 2018, the team broke into several cryptocurrency data centers, stealing more than $2 million worth of technology equipment — from motherboards to power accessories. For their very last hit, the thieves were even helped by a security guard. This brief but highly productive crime wave was reported to be the biggest burglary in the history of Iceland.

The Challenges

The owners of the cryptocurrency data centers weren’t keen to advertise the break-ins, as they didn’t want to upset their foreign investors. But one owner, whose data center in the town of Borgarnes was cleaned out by the thieves, did report the crime to the Icelandic Police — the Lögreglan. That decision set in motion an investigation that would eventually lead to the prosecution of Stefansson and his cohorts.


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

Traditional investigation tactics by the Lögreglan were highly effective in tracking down the suspects. Investigators reviewed footage from surveillance cameras and identified rental cars used in the crimes. They then identified the individuals who rented the cars, and started their surveillance of those individuals, using trackers, wiretaps, and other tools. Within about a week of setting up surveillance, they had rounded up several suspects, including Stefansson. But then, the investigators hit a wall.

“Cellebrite’s Advanced Services team was able to extract every type of digital evidence imaginable from the suspect’s iPhones — locations, images, Telegram messages — basically, everything we needed to prove the case and secure the convictions.”
Detective Inspector Eiríkur Guðni Ásgeirsson, Serious Crimes Unit, Suðurnes Police

Their key challenges were:

  • Lack of cooperation by all the suspects, who would not admit to the crimes.
  • The inability to gather digital evidence because the suspects would not grant investigators access to their mobile devices or provide them with their PINs.
  • The sheer complexity of the investigation: The suspects had used many phones and phone numbers throughout their operation. Also, they had relied on online messaging apps like Telegram to create almost secure lines of communication.

The Solution

The investigators were eager to gather any digital intelligence from the suspects’ devices that would clearly connect the thieves to the crimes and help lead to their convictions. After obtaining a court order to examine the devices, the investigators used Cellebrite’s UFED Touch2 to access data from the phones of Stefansson’s associates. They then applied the Cellebrite Physical Analyzer to examine the digital evidence. However, because the thieves had gone to such lengths to conceal their digital activity, the examination did not yield enough evidence to guarantee a conviction.

Sindri and two of his friends posted on social media after they met in Amsterdam after he escaped (all got sentences in the case).

The investigators remained hopeful that the data on Stefansson’s two Apple iPhones would not only prove that he was the one who had planned the operation, but also provide evidence of the other suspects’ involvement in helping him to steal equipment from the data centers. So, as a next step, the investigators sent Stefansson’s phones to Cellebrite’s Advanced Services team in Munich, Germany, for advanced device unlocking and data extraction.

“Without the evidence from those devices, I’m not sure we would’ve gotten the convictions. And I know we only managed to get a conviction of the suspect we located in Spain because of the Telegram messages on Stefansson’s phones.”
Detective Inspector Eiríkur Guðni Ásgeirsson, Serious Crimes Unit, Suðurnes Police

How Digital Intelligence Helped Crack the Case

The CAS team uncovered a trove of data from Stefansson’s iPhones that was relevant to the Bitcoin heist — everything from geolocation information to images to Telegram messages.

The Telegram messages that Stefansson had saved on his mobile devices helped lead investigators to another suspect in Spain.

The digital intelligence that the CAS team helped to uncover from Stefansson’s iPhones was exactly what investigators needed to prove their case and secure the thieves’ convictions.

Sindri Þór Stefánsson is seen here in the middle of the picture on his way to Reykjavík District Court.

“Every case has some type of digital evidence, and the sooner we get our hands on that evidence, the better. Only a few years ago, no one thought about using mobile phones or data from phone companies when working on a case. Today, it’s standard procedure.”
Detective Inspector Eiríkur Guðni Ásgeirsson, Serious Crimes Unit, Suðurnes Police.

The Results

Stefansson was sentenced to 4.5 years in prison for his role in the Bitcoin heist.

Five other individuals were prosecuted, including the data center security guard. They received sentences ranging from six months to 4.5 years.

Investigators in Iceland express confidence that they would not have been able to secure these convictions without the digital evidence that the CAS team extracted from Stefansson’s iPhones.

To learn more about Cellebrite visit: Cellebrite.com

Sources
“The Big Bitcoin Heist,” by Mark Seal, Vanity Fair, December 2019

Leave a Comment

Latest Videos

In this episode of the Forensic Focus podcast, Desi and Si discuss different online programming courses and what they think about the popular platform, Udemy. They also talk about Flipper, Dev boards, and Raspberry Pi, and delve into the fascinating phenomenon of running the classic game Doom on unlikely devices.

Throughout the episode, Desi and Si share their digital forensics expertise, referencing some of the cases they have been working on and highlighting particular methodologies and technologies that have an impact on cybersecurity.

Show Notes:

100 Days of Code: The Complete Python Pro Bootcamp for 2023 - https://www.udemy.com/course/100-days-of-code/

Domestika - https://www.domestika.org/en

MIT OpenCourseWare - https://www.youtube.com/@mitocw 

MasterClass - https://www.masterclass.com/

Raspberry Pi 400 Complete Kit - https://core-electronics.com.au/raspberry-pi-400-kit.html

Flipper Discord - https://discord.com/invite/flipper

Flipper Zero - https://flipperzero.one/

This Programmer Figured Out How to Play Doom on a Pregnancy Test - https://www.popularmechanics.com/science/a33957256/this-programmer-figured-out-how-to-play-doom-on-a-pregnancy-test/

Here’s a dude playing Doom Eternal on his fridge - https://www.polygon.com/2020/10/13/21514933/doom-eternal-refrigerator-door-samsung-smart-refrigerator-xbox-game-pass-richard-mallard

Doom hacker gets Doom running in Doom - https://www.pcgamer.com/doom-hacker-gets-doom-running-in-doom/

Doom Running On A Calculator Powered By Old Potatoes - https://kotaku.com/doom-running-on-a-calculator-powered-by-old-potatoes-1845374069

GoldenEra - https://www.imdb.com/title/tt11753760/

Racing the Beam - https://en.wikipedia.org/wiki/Racing_the_Beam

High Score (TV series) - https://en.wikipedia.org/wiki/High_Score_(TV_series)

Microcontroller Courses (Udemy) - https://www.udemy.com/topic/microcontroller/

The story of Final Fantasy XIV’s renegade do-good modders - https://www.pcgamesn.com/final-fantasy-xiv/ffxiv-modders-renegade-do-gooders

Logical fallacies - https://yourlogicalfallacyis.com/

In this episode of the Forensic Focus podcast, Desi and Si discuss different online programming courses and what they think about the popular platform, Udemy. They also talk about Flipper, Dev boards, and Raspberry Pi, and delve into the fascinating phenomenon of running the classic game Doom on unlikely devices.

Throughout the episode, Desi and Si share their digital forensics expertise, referencing some of the cases they have been working on and highlighting particular methodologies and technologies that have an impact on cybersecurity.

Show Notes:

100 Days of Code: The Complete Python Pro Bootcamp for 2023 - https://www.udemy.com/course/100-days-of-code/

Domestika - https://www.domestika.org/en

MIT OpenCourseWare - https://www.youtube.com/@mitocw

MasterClass - https://www.masterclass.com/

Raspberry Pi 400 Complete Kit - https://core-electronics.com.au/raspberry-pi-400-kit.html

Flipper Discord - https://discord.com/invite/flipper

Flipper Zero - https://flipperzero.one/

This Programmer Figured Out How to Play Doom on a Pregnancy Test - https://www.popularmechanics.com/science/a33957256/this-programmer-figured-out-how-to-play-doom-on-a-pregnancy-test/

Here’s a dude playing Doom Eternal on his fridge - https://www.polygon.com/2020/10/13/21514933/doom-eternal-refrigerator-door-samsung-smart-refrigerator-xbox-game-pass-richard-mallard

Doom hacker gets Doom running in Doom - https://www.pcgamer.com/doom-hacker-gets-doom-running-in-doom/

Doom Running On A Calculator Powered By Old Potatoes - https://kotaku.com/doom-running-on-a-calculator-powered-by-old-potatoes-1845374069

GoldenEra - https://www.imdb.com/title/tt11753760/

Racing the Beam - https://en.wikipedia.org/wiki/Racing_the_Beam

High Score (TV series) - https://en.wikipedia.org/wiki/High_Score_(TV_series)

Microcontroller Courses (Udemy) - https://www.udemy.com/topic/microcontroller/

The story of Final Fantasy XIV’s renegade do-good modders - https://www.pcgamesn.com/final-fantasy-xiv/ffxiv-modders-renegade-do-gooders

Logical fallacies - https://yourlogicalfallacyis.com/

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_5f72B6DD5wk

Programming Languages, Flipper And Gaming

Forensic Focus 66 views 24th May 2023 11:43 am

In this episode of the Forensic Focus podcast, Si and Desi talk to Mackenzie Jackson, Developer Advocate at Git Guardian. 

Mackenzie discusses the problem of hard-coded and leaked credentials in Git repositories, the task of scanning Git repositories for leaked credentials, and how that’s helped by the setup of GitHub and Git. 

He also looks at some public and private cases of security breaches through Git repositories and recommends tools you can use to combat attackers on Git. 

Show Notes:

Toyota Suffered a Data Breach by Accidentally Exposing A Secret Key Publicly On GitHub (GitGuardian) - https://blog.gitguardian.com/toyota-accidently-exposed-a-secret-key-publicly-on-github-for-five-years/

GitHub.com rotates its exposed private SSH key (Bleeping Computer) - https://www.bleepingcomputer.com/news/security/githubcom-rotates-its-exposed-private-ssh-key/

Conpago - https://www.conpago.com.au/

Source Code as a Vulnerability - A Deep Dive into the Real Security Threats From the Twitch Leak (GitGuardian) - https://blog.gitguardian.com/security-threats-from-the-twitch-leak/

Teenagers Leveraging Insider Threats: Lapsus$ Hacker Group (Forbes) - https://www.forbes.com/sites/emilsayegh/2023/03/15/teenagers-leveraging-insider-threats-lapsus-hacker-group

Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal (BBC) - https://www.bbc.co.uk/news/technology-60864283

Dynamic Secrets (HashiCorp) - https://developer.hashicorp.com/vault/tutorials/getting-started/getting-started-dynamic-secrets

Crappy code, crappy Copilot. GitHub Copilot is writing vulnerable code and it could be your fault (GitGuardian) - https://blog.gitguardian.com/crappy-code-crappy-copilot/

trufflesecurity/trufflehog (GitHub) - https://github.com/trufflesecurity/trufflehog

gitleaks/gitleaks (GitHub) - https://github.com/gitleaks/gitleaks

Git (Wikipedia) - https://en.wikipedia.org/wiki/Git

awslabs/git-secrets (GitHub) - https://github.com/awslabs/git-secrets

In this episode of the Forensic Focus podcast, Si and Desi talk to Mackenzie Jackson, Developer Advocate at Git Guardian.

Mackenzie discusses the problem of hard-coded and leaked credentials in Git repositories, the task of scanning Git repositories for leaked credentials, and how that’s helped by the setup of GitHub and Git.

He also looks at some public and private cases of security breaches through Git repositories and recommends tools you can use to combat attackers on Git.

Show Notes:

Toyota Suffered a Data Breach by Accidentally Exposing A Secret Key Publicly On GitHub (GitGuardian) - https://blog.gitguardian.com/toyota-accidently-exposed-a-secret-key-publicly-on-github-for-five-years/

GitHub.com rotates its exposed private SSH key (Bleeping Computer) - https://www.bleepingcomputer.com/news/security/githubcom-rotates-its-exposed-private-ssh-key/

Conpago - https://www.conpago.com.au/

Source Code as a Vulnerability - A Deep Dive into the Real Security Threats From the Twitch Leak (GitGuardian) - https://blog.gitguardian.com/security-threats-from-the-twitch-leak/

Teenagers Leveraging Insider Threats: Lapsus$ Hacker Group (Forbes) - https://www.forbes.com/sites/emilsayegh/2023/03/15/teenagers-leveraging-insider-threats-lapsus-hacker-group

Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal (BBC) - https://www.bbc.co.uk/news/technology-60864283

Dynamic Secrets (HashiCorp) - https://developer.hashicorp.com/vault/tutorials/getting-started/getting-started-dynamic-secrets

Crappy code, crappy Copilot. GitHub Copilot is writing vulnerable code and it could be your fault (GitGuardian) - https://blog.gitguardian.com/crappy-code-crappy-copilot/

trufflesecurity/trufflehog (GitHub) - https://github.com/trufflesecurity/trufflehog

gitleaks/gitleaks (GitHub) - https://github.com/gitleaks/gitleaks

Git (Wikipedia) - https://en.wikipedia.org/wiki/Git

awslabs/git-secrets (GitHub) - https://github.com/awslabs/git-secrets

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_BX15Z_xF8mA

Preventing Data Leaks With Git Guardian

Forensic Focus 72 views 3rd May 2023 11:07 am

Latest Articles

Share to...