⚠️ Some features may be temporarily unavailable due to an ongoing 3rd party provider issue. We apologize for the inconvenience and expect this to be resolved soon.
TRANSCRIPTEnglish

Bitcoin Exposed: The Secret Behind the FBI's Crypto Hack [Darkside].

11m 28s1,727 words319 segmentsEnglish

FULL TRANSCRIPT

0:00

hey everyone meet kevin here so this is

0:02

a little bit more on the serious side

0:04

so we have to talk about what happened

0:07

with the

0:07

cryptocurrency hackback by the fbi and

0:11

how it probably went down

0:12

we've got some u.s department of justice

0:15

documents here and

0:16

well i think it's worth going through so

0:18

it's pretty interesting

0:20

listen into this but i just want to be

0:23

very very

0:24

clear i was led onto this story

0:27

through a third well potential

0:30

third party source everything you're

0:32

about to hear could be

0:33

complete bs or straight up false

0:36

but i'm also going to show you some

0:38

documents from justice.gov that seem to

0:40

corroborate exactly what's going on so

0:44

who knows in which case let's get right

0:47

into it

0:48

so folks you know that cryptocurrencies

0:51

have recently dropped and they've

0:52

recently dropped

0:53

due to the belief that potentially the

0:56

fbi was able to just

0:57

hack into people's vault wallets their

1:00

cryptocurrency wallets

1:01

and somehow take their coins back which

1:04

gave a lot of concern to wait a minute

1:06

this is uh this is a potential

1:08

potential problem well folks

1:12

listen to this so the story that i heard

1:16

and uh huge shout out to the unnamed

1:18

person who

1:19

uh uh who helped out with this but

1:22

anyway

1:23

here's the story that we have apparently

1:26

the way the fbi was able to get the

1:29

crypto coins

1:31

back bitcoin back

1:34

that were stolen through the colonial

1:36

pipeline hack

1:37

the fbi did so by seizing computers

1:41

involved in the hack and by seizing

1:44

computers specifically servers involved

1:46

in the hack

1:47

any other potential hackers or

1:49

co-conspirators that are involved in

1:50

these computers

1:51

potentially also get taken down but

1:54

here's how this might for example work

1:58

consider godaddy.com if you go to

2:00

godaddy.com you can host a website

2:02

but not only can you host a website you

2:03

can host a forum

2:05

you can host email servers you can host

2:07

many different things

2:09

so imagine instead of a godaddy you have

2:11

a

2:12

black hat operation that operates out of

2:15

some kind of warehouse somewhere with

2:16

multiple servers set up

2:18

and they will act as your godaddy for

2:20

you think of it kind of like a

2:22

dark godaddy well let's assume

2:25

a dark godaddy was used for the colonial

2:28

pipeline hack

2:29

and subsequent bitcoin rehacking russian

2:32

forums

2:33

are then set up to essentially host a

2:36

forum in california in the russian

2:39

language

2:40

to discuss potential hacks at which

2:43

point

2:43

some company named darkseid advertises

2:46

its

2:47

ransomware services hence software as a

2:50

service which

2:50

you may have heard of before in the

2:52

media but anyway software as a

2:54

service is essentially well

2:57

i mean software that you buy and when

3:00

you pay for it

3:01

you get the service it's pretty simple

3:03

except this time the software is hacking

3:05

software

3:06

and you are paying for a service

3:08

subscription to be able to use

3:10

this hacking software and remember

3:12

ransomware is something

3:14

where all of a sudden you open up your

3:15

computer you look and oh

3:17

you can't operate until you pay a ransom

3:20

so it's not you or your children who are

3:22

taking ransom but it's that it's your

3:23

computer that's taken ransom

3:25

and in order for you to recover your

3:26

computer's data you would have to pay

3:28

a ransom well anyway now let's say

3:31

darkside advertises their ransomware

3:33

services on these dark web forms that

3:35

are set up

3:36

which are of course all now totally

3:38

deleted because

3:39

well the event is over anyway anyway now

3:42

these ransomware services potentially

3:44

gain exposure to

3:46

hacker groups and a hacker decides you

3:48

know what we're going to hire darkseid

3:50

and darkseid works with the hacker at

3:52

providing a service the hacker installs

3:54

the service

3:55

by sending a malicious email link or

3:57

other to a company hacks into a

4:00

company's

4:01

servers once you have access to the

4:03

network all of a sudden all the internal

4:05

ips open up and boom

4:07

you can start turning on and off

4:08

switches and essentially take

4:10

people's computers ransom and this is

4:12

where darkseid actually profits about 50

4:16

of the revenue of whatever fees are

4:18

collected by the hacker

4:19

so the hacker gets free software the

4:21

hacker just has to be intuitive enough

4:23

to plant it somewhere

4:25

while the hack software maker

4:28

gets a 50 cut then of course after a

4:31

successful

4:32

hack everybody takes their money or as

4:34

much as you can

4:36

and close down sha it closes down shop

4:38

and operates as a completely

4:40

new entity but folks it's important to

4:43

remember

4:44

that where this software is hosted is

4:47

generally a server

4:48

and that could be an achilles heel and

4:50

in this case

4:51

the colonial pipeline attack this is how

4:54

the fbi

4:55

broke into and subjugated the

4:58

hacker's networks to end up taking

5:02

the wallet of the hacker now this

5:05

is this is just reportedly allegedly

5:08

this is just information that was leaked

5:10

to me it could be wrong it could be

5:11

correct we don't know

5:13

but it's worth considering so

5:16

in this case you have a very unique

5:18

result not only do you end up busting a

5:20

criminal

5:21

via busting their server who is holding

5:24

the private key or

5:26

that server which is holding the private

5:27

key for stolen bitcoin

5:29

but you have now crackdown on servers

5:33

and what do servers have not just one

5:35

user but many others

5:36

so potentially many other users end up

5:38

falling victim to

5:40

a ransomware counter attack

5:44

by default for example consider 2020

5:48

gavin navigation paid 10 million dollars

5:50

to a ransomware attacker you know

5:52

you're just setting up for an attack

5:54

like colonial after paying 10 million

5:55

dollars to

5:56

a hacker that hacks into gavin

5:58

navigation but anyway

6:00

now you set up a server kind of like a

6:02

godaddy you host whatever you need so

6:04

you can set up forums and scripts

6:07

you try to disguise your russian origin

6:09

and in the meantime

6:10

you go hack boom boom boom very well

6:14

and so folks what kind of documentation

6:16

do we have of this

6:18

well we've got a little bit the first

6:20

thing we've got is a

6:22

seizure notice a seizure notice

6:25

lets us know well it's essentially a

6:27

warrant that lets us know

6:28

that somebody's funds are being taken

6:31

but we also beyond just a seizure

6:33

warrant have a potential conversation

6:37

with allegedly somebody in the fbi

6:41

let's go ahead and pull it up if i could

6:42

just press the correct button there we

6:43

go

6:45

hello sir how is it going sorry random

6:48

question

6:49

this colonial pipeline hack ransom

6:52

recovery

6:53

did they recover btc through subpoena

6:55

and exchange

6:56

that's the easy way that would be the

6:59

stupid way for a hacker to hide

7:01

bitcoin but anyway or

7:04

did they get access to the server the

7:07

server where the wallet was stored

7:09

this has been bothering me all day says

7:12

the individual here

7:14

why has it been bothering you you

7:16

weren't involved in the hack

7:17

weren't you says this mysterious other

7:20

person labeled

7:22

they found the wallet server from what i

7:25

was told

7:26

lol no just media playing it

7:30

like they remotely hacked the wallet

7:32

even

7:33

btc price dropped but that's what i

7:36

figured

7:36

they hosted wallet remotely and fed

7:40

seized the server that way thank you

7:43

thank you gifts gifs well

7:46

now all of this could be complete bogus

7:49

this entire message could be complete

7:50

bogus

7:51

maybe that's not what happened maybe it

7:54

is true

7:55

that uh a wallet was directly seized

7:58

maybe this is all a clever fbi cover-up

8:01

to hit up an influencer and suggest hey

8:04

you know tell the story like this who

8:06

knows

8:07

we won't know but what we do know is

8:10

this individual also sent me file

8:12

documents

8:12

with the justice department but i'm

8:15

going to go ahead and hide my phone

8:17

because instead what i'm going to do is

8:19

i'm going to pull up my computer

8:21

and this is where when i literally go to

8:22

justice.com

8:24

and i mean in theory anyone could have

8:26

pulled this up i could pull up

8:28

check this out dark side seizure

8:31

warrant i'm literally live clicking on

8:33

this on justice.gov

8:35

see look at that verify my url i kid you

8:37

not

8:38

go try it click boom seizure warrant wow

8:41

powerful warrant to seize property

8:44

subject

8:45

to forfeiture any authorized any

8:47

authorized law enforcement

8:50

has the authorization to or rather

8:53

through this application by federal law

8:54

enforcement officer or attorney for

8:56

government

8:57

requests that certain property located

8:59

in the northern district of california

9:00

be seized as subject to forfeiture to

9:03

the united states of america

9:05

the property described as approximately

9:08

63.7 btc

9:10

subject funds accessible from

9:13

the following cryptocurrency address

9:15

subject address xxx

9:17

and then excuse me the rest of the

9:19

address

9:20

i find the affidavit in any recorded

9:22

testimony established

9:24

probable cause that is the highest

9:28

burden of proof standard in law

9:29

enforcement to seize your rights

9:31

anyway establish probable cause

9:34

to seize property folks words mean

9:37

things

9:37

words have meaning established probable

9:39

cause big words

9:42

you are commanded to execute this

9:44

warrant and seize the property on or

9:46

before

9:47

june 21st in the daytime hours of 6 a.m

9:50

to 10 p.m

9:52

unless delayed notice is authorized

9:54

below you must also give a copy

9:56

of the warrant and receipt for property

9:58

taken to the person

10:00

from whom or from whose premises the

10:02

property was taken

10:04

or leave a copy and receipt at the place

10:05

it was taken united states magistrate

10:08

judge laurel biehler signed judge laurel

10:11

beeler

10:12

6 7 20 21 at

10:15

9 10 am

10:19

well folks i have to say

10:22

this is a pretty damn interesting server

10:24

because it has

10:26

two potential meanings one it

10:29

potentially means

10:31

absolutely nothing it potentially means

10:34

it potentially means absolutely

10:37

nothing because it's totally fake i have

10:39

no idea

10:39

i cannot verify or confirm or deny

10:43

these alternatively

10:46

it could be true it could be true that

10:49

the fbi did not secretly hack

10:51

into somebody's crypto wallet but

10:53

instead they hacked into a server

10:55

which hosted the forum for communication

10:57

under which darkseid was hired and under

11:00

which also the

11:02

for some reason crypto wallet with 63.7

11:05

bitcoin was stored

11:07

i don't know but folks i'll leave it up

11:09

to you

11:10

let me know what you think in the

11:11

comments down below thank you very much

11:12

for watching and folks we'll see in the

11:14

next one

UNLOCK MORE

Sign up free to access premium features

INTERACTIVE VIEWER

Watch the video with synced subtitles, adjustable overlay, and full playback control.

SIGN UP FREE TO UNLOCK

AI SUMMARY

Get an instant AI-generated summary of the video content, key points, and takeaways.

SIGN UP FREE TO UNLOCK

TRANSLATE

Translate the transcript to 100+ languages with one click. Download in any format.

SIGN UP FREE TO UNLOCK

MIND MAP

Visualize the transcript as an interactive mind map. Understand structure at a glance.

SIGN UP FREE TO UNLOCK

CHAT WITH TRANSCRIPT

Ask questions about the video content. Get answers powered by AI directly from the transcript.

SIGN UP FREE TO UNLOCK

GET MORE FROM YOUR TRANSCRIPTS

Sign up for free and unlock interactive viewer, AI summaries, translations, mind maps, and more. No credit card required.