Hacked Iranian crypto exchange Nobitex returns, exploit linked to spying


Top Iranian crypto exchange Nobitex said it has begun restoring its services after a $90 million hack this month, while blockchain analysts suggest the exploit might also have been tied to espionage investigations by Israelis.

The platform said that verified users will gradually be allowed to use their wallets again. Moreover, during the first steps of restoring services, wallets for spot trading will be accessible first.

The identity verification process is already ongoing, and Nobitex promised to display wallet balances in phases once "the accuracy and security of all information is confirmed."

ADVERTISEMENT

According to the company, the process is estimated to be finalized by mid-week, if there are no further delays due to technical or security issues.

Crypto-stealing malware
By Cybernews
Linas Kmieliauskas chrissw adi Nihad Hassan
Don't miss our latest stories on Google News

"We are working to resume withdrawal, deposit, and trading services for verified users with minimal delay," the team said, urging users not to deposit crypto assets into old Nobitex wallet addresses as they are no longer valid.

As reported earlier in June, Gonjeshke Darande, or "Predatory Sparrow," an anti-Iranian hacking group with possible ties to Israel, hacked Nobitex, stealing $90 million worth of crypto assets and destroying them by sending them to irrecoverable addresses. Moreover, Gonjeshke Darande published Nobitex's source code, further threatening the exchange.

Meanwhile, blockchain analysts at TRM Labs said that it's possible the hack helped Israeli authorities arrest three individuals suspected of spying on behalf of Iranian intelligence services within days of the cyberattack.

Israeli and Iranian flags
Jaap Arriens/NurPhoto via Getty Images

"The sequence of events – Israeli strikes on June 13th, the Nobitex breach on June 18th, and the arrests announced on June 24th – raises the analytical possibility that Israeli cyber units were using the Nobitex breach to gather internal data," the analysts said.

ADVERTISEMENT

According to them, this data might have included wallet ownership, messaging history, or Know Your Customer (KYC) information to identify Iranian handlers or trace crypto payments to Israeli operatives.

While there’s no direct public evidence linking the Nobitex breach to the espionage investigations, TRM Labs stressed that this would be consistent with tactics used by Israeli cyber defense teams and Predatory Sparrow’s operational record.