Australian feds ‘deciphered’ seed phrase to access suspect’s crypto

https://cointelegraph.com/news/australian-feds-crack-seed-phrase-access-alleged-ghost-app-crypto

10 Comments

  1. coinfeeds-bot on

    tldr; The Australian Federal Police (AFP) accessed a suspect’s $6.4 million in cryptocurrency by deciphering a seed phrase as part of Operation Kraken. The suspect, Jay Je Yoon Jung, allegedly created an encrypted messaging app, ‘Ghost,’ used by organized crime. The AFP seized the crypto after analyzing digital devices from Jung’s home. Jung faces charges including supporting a criminal organization. The AFP plans to forfeit the crypto to the government. Operation Kraken has previously seized $1.4 million in assets related to the case.

    *This summary is auto generated by a bot and not meant to replace reading the original article. As always, DYOR.

  2. “The Australian Federal Police has revealed it recently “deciphered” a seed phrase in order to access a suspect’s $6.4 million (9.3 million Australian dollars) in crypto as part of Operation Kraken.”

    “The AFP said on Oct. 2 that the crypto haul was restrained after a Criminal Assets Confiscation Taskforce (CACT) analyst “deciphered the account’s ‘seed phrase’ following analysis of digital devices” recovered from the home of Jay Je Yoon Jung, the alleged creator of the encrypted messaging app.”

    “This allowed the AFP to access the cryptocurrency to be transferred into secure AFP cryptocurrency storage,” the agency said.”

    “The AFP did not respond to Cointelegraph’s questions about how it deciphered the seed phrase or what devices were recovered from Jung’s home, saying the matter is before the court.”

  3. This article is missing info, and it’s clickbait. If they could do it so easily, they would be able to break any wallet. And it’s not possible.

  4. Only way they’d do this is if the device still had the seed stored in RAM for some reason or if the seedphrase itself was stored in a file/password manager they managed to gain access to.

  5. They didn’t decipher the seed phrase but probably found a seed phrase in the phone. Not sure if you can dig it out from the HD directly but they might just manage to get the pass to just enter the app to show seed.

  6. >The AFP did not respond to Cointelegraph’s questions about how it deciphered the seed phrase

    They probably had more than 9 of the 12 words or something, or he reversed the words or some shit.

  7. CryptoScamee42069 on

    It’s a pretty safe assumption they found the seed on one of the target’s devices or in their home but it was jumbled or otherwise not in its true form.

    The deciphering would’ve come from figuring out the correct phrase order from that information, not cracking the seed from scratch.