This Is The Greatest Bank Heist in Japanese History

Kento Bento
28 May 201813:12

Summary

TLDRتدور قصة الrobbery في النص حول عدة أحداث سرقة مثيرة في اليابان. تبدأ قصة في ديسمبر 1968، عندما قام متهم يتظاهر بكونه شرطة ليrob 300 مليون ين من مصرف Nihon Trust. ثم ننتقل إلى عام 2016، حيث قامت مجموعة من 600 شخص بسحب 1.4 مليار ين من ماكينة ATM في 7-Eleven. في عام 1994، قامت مجموعة بسرقة 540 مليون ين من بنك Fukutoku بعد أن أرسلت لهم رسالة شكر. وفي عام 1948، قامت شخصية تدعي أن يكون مفتش صحة حكومي بrob 16 مستخدمًا من بنك الإمبراطوري باستخدام الميثان السائل. وفي عام 2018، أصبحت الrobbery في عالم البيتكوين. لقد قامت مجموعة بسرقة 58 مليار ين من مورد العملات الرقمية Coincheck. يتضمن النص قصة مثيرة تدور حول الrobbery الحديثة والقديمة في اليابان.

Takeaways

  • 🎥 هذا النص هو نص فيديو يُعرف باسم 'كنتو بنتو'، يُمكن تحميل Dashlane مجانًا من الرابط الموجود في الوصف.
  • 🗓️ في 10 ديسمبر 1968، حدثت قصة حادثة البنك الياباني التي أدى إلى اختطاف 300 مليون ين من موظفي مصنع توشيبا.
  • 👮‍♂️ قام متورط في القضية، يدفو على الشرطة و-mfhm أنه يحمل دينامية، ليختطف أموال الموظفين.
  • 💣 في القضية الثانية، في 15 مايو 2016، قامت مجموعة من 600 شخص باستخدام بطاقات إئتمان مزيفة لسحب 1.4 مليار ين من ATM في كل من 7-Eleven.
  • 🏦 في حادثة فكوتوك بانك في 7 أغسطس 1994، اختطف مبلغ 540 مليون ين، وبعد 10 أيام أرسل السارقون رسالة شكرًا للبنك.
  • 🏥 في حادثة البنك الإمبراطوري في 1948، قام المتورط بقتل 12 شخصًا من خلال تلقيهم محلول سيانيد، ثم اختطاف أموال البنك.
  • 🕊️ في هذه القضية، أُعدم السارق سداميتشي هيراسава على الأرجح من غير أن يكون هو الشخص المسؤول.
  • 💻 في عام 2018، أصبحت الجريمة الإلكترونية أكثر شيوعًا، حيث اختطفت 58 مليار ين من مبادئ Coincheck في أكبر حادثة اختطاف مال في تاريخ العملات الرقمية.
  • 🔒 يمكن أن تكون الأمان على الإنترنت سهلة، لكن يجب أن نكون أكثر حذرًا واستخدام كلمة مرور مختلفة لكل حساب.
  • 🔄 Dashlane هو أداة توفر بساطة إدارة كلمات المرور، يمكنها توليد كلمات مرور قوية وحفظها في مكان آمن.

Q & A

  • ما هي القصة الرئيسية التي تحكيها النص؟

    -النص يحكي عن عدة حالات سرقة م銀行 في اليابان، بدءًا من القضية التي حدثت في 10 ديسمبر 1968، حيث قام متورط يختبئ وراء الهوية الشخصية المزيفة بسرقة 300 مليون ين من موظفي مصنع توشيبا، ثم ينتقل إلى حالات أخرى تتضمن سرقات م銀行 رقمية وقضية تتضمن قتيلا.

  • ما هي المبلغ الذي أُسرق في القضية التي حدثت في 10 ديسمبر 1968؟

    -تم سرقة مبلغ يقدر بـ 300 مليون ين من موظفي مصنع توشيبا.

  • كيف تم تنفيذ القضية التي حدثت في 10 ديسمبر 1968؟

    -المتورط اتخذ الهوية المزيفة لشخصية شرطة وحذر المدير العام للبنك بتدمير منزله إذا لم يدفع 300 مليون ين، ثم استخدم نار تذكارية لجعل الموظفين يعتقدون أن سيارتهم تplode، وبذلك فارق الوقت وسرق المبلغ.

  • ما هي القضية التي حدثت في 15 مايو 2016؟

    -تم سحب ما يصل إلى 1.4 مليار ين، أي حوالي 13 مليون دولار، من ماكينة الصراف الآلي (ATM) في 7-Eleven في اليابان، من قبل 600 شخص باستخدام بطاقات ائتمان مزيفة.

  • ما هي القضية التي حدثت في 7 أغسطس 1994؟

    -تم سرقة 540 مليون ين من بنك فوكوتوكو، وبعد 10 أيام أرسل السارقون بريدًا إلى البنك شكرًا لتقديم المبلغ.

  • ما هي القضية التي حدثت في 26 يناير 1948؟

    -رجل في الأربعينيات دخل فرع بنك الإمبراطوري وCLAIMED أنه مفتش صحة حكومي، ثم أعطي 16 شخصا أقراصًا وقطرات سائل يحتوي على السميك، مما أدى إلى وفاة 12 منهم، ثم أخذ المال وفر.

  • لماذا يشك في أن القضية التي حدثت في 1948 لم تحل بشكل صحيح؟

    -هناك أدلة تشير إلى أن اعتراف سداميتشي هيراسава قد اُضرب بعنف، وأن هناك شكاوى على أن الشهادة كانت من قِبل مشاهدين فارغة.

  • ما هي القضية الأخيرة التي ذكرت في النص؟

    -في 25 يناير 2018، قام مبرمجون على الشبكة بسرقة 58 مليار ين، تقدر بـ 530 مليون دولار، من مبادئ مال تكنولوجيا التشفير في صرافة Coincheck.

  • لماذا لم يتم القبض على متورط القضية الأخيرة؟

    -المعاملات الرقمية للتشفير تتم بشكل علني، مما يتيح متابعة الأموال المسروقة، لكن هوية المستخدمين المجهولين.

  • ما هي الخدمة التي تروج لها النص في النهاية؟

    -يروج النص لخدمة Dashlane التي توفر一个地方 لحفظ كل كلمات المرور وتقوم بتعبئةها تلقائيًا في المواقع الإلكترونية.

  • ما هي الميزة الإضافية التي يوفرها Dashlane للمستخدم؟

    -Dashlane توفر مولد كلمات المرور لإنشاء كلمات مرور قوية و她也允许用户在不同的设备间同步他们的登录信息.

Outlines

00:00

🌧️ The Unsolved 1968 Tokyo Bank Heist

In December 1968, Tokyo's Nihon Trust Bank manager received life-threatening letters demanding 300 million yen. Despite police surveillance, a disguised perpetrator tricked employees into believing the bank manager's home was bombed and used the chaos to steal 300 million yen from Toshiba employees. The crime, dubbed the 'greatest heist in Japanese history,' remains unsolved with 120 misleading pieces of evidence left behind.

05:01

💳 The 2016 Coordinated ATM Heist and Polite Bank Robbers

On May 15th, 2016, a highly coordinated heist saw 1.4 billion yen withdrawn from 7-Eleven ATMs across Japan in two hours, using fake credit cards by 600 individuals. In contrast, a 1994 heist at Fukutoku Bank in Kobe resulted in a polite thank you note from the robbers. Another case from 1948 involved a man posing as a health inspector who poisoned 16 people at the Imperial Bank, killing 12, and stole money. The suspect, Sadamichi Hirasawa, was sentenced to death but doubts about his guilt persisted, and he died in prison without execution.

10:02

💀 The Imperial Bank Tragedy and the Unit 731 Connection

The 1948 Imperial Bank heist involved a man who claimed to be a health inspector administering a 'vaccine' for dysentery, which turned out to be a deadly cyanide solution. The real-life Shigeru Matsui's business card was left at the scene, leading to the arrest of Sadamichi Hirasawa. However, questions about his guilt and the possibility of the true culprit being a member of Unit 731, known for lethal human experiments, have cast a shadow over the case. Hirasawa spent 32 years on death row before dying of natural causes.

💻 The 2018 Coincheck Cryptocurrency Heist

In 2018, Tokyo-based cryptocurrency exchange Coincheck suffered the largest crypto heist in history when hackers posing as authorized users stole 58 billion yen worth of NEM. The stolen funds were traced to specific addresses but the culprits remained anonymous. Coincheck's failure to implement necessary security and keeping funds in a vulnerable 'hot wallet' were criticized. The NEM developers tagged the addresses and set up tracking to prevent exchanges with the stolen funds.

Mindmap

Keywords

💡Dashlane

Dashlane هو برنامج لإدارة كلمات المرور، يوفر بيئة آمنة لتخزين كلمات المرور ويوفر خيارًا لنسخها تلقائيًا على المواقع الإلكترونية. في النص، يُذكر Dashlane كبرنامج يمكن من خلاله إدارة كلمات المرور بكل سهولة، مما ي示 على أهمية الأمان الشخصي والحماية للمعلومات الشخصية في العصر الرقمي.

💡Nihon Trust bank

Nihon Trust bank هي بنك يпомى في النص كمثال لأحد العمليات الrobbery التي وقعت في اليابان في ديسمبر 1968. المدير المصرفي كان في خطر بسبب التهديدات التي تلقيها، وهذه القضية تمثل مثالًا على العمليات الrobbery التقليدية التي تتضمن تهديد واستغلال الخوف لتحقيق أهداف الrobbery.

💡Toshiba factory

Toshiba factory يُذكر في النص كمكان لإرسال موظفين من المصرف لإجراء تلقي مالي. هذا الحدث يشير إلى أن الrobbery ليست دائمًا تتضمن فقط العمليات المباشرة على البنوك، بل يمكن أن تتضمن أيضًا العمليات الثانوية التي تستهدف العمليات التجارية العادية.

💡Police officer

النص يستخدم الشخصية الرسمية 'Police officer' كشخصية متورطة في الrobbery، حيث قام المتورط بتزوير هويته لاستغلال الثقة والأمان. هذا يظهر كيف يمكن للأشخاص الخائنين استخدام ال信任 الذي يمنحه الشخصية الرسمية للقيام بعمليات الrobbery.

💡ATM

ATM يُستخدم في النص كوسيلة ل抽取 الاموال في الrobbery التي وقعت في 2016. تم استخدام بطاقات ائتمان مزورة لسحب مبلغ واسع من الATMs في وقت قصير، مما يظهر تطور الrobbery من العمليات التقليدية إلى العمليات الإلكترونية التي تستغل التكنولوجيا.

💡Cyber-crime

cyber-crime هي النوع من الrobbery الذي يُذكر في النص في سياق الrobbery التي وقعت في 2018، حيث قام المبرمجون باستغلال ثغرة في نظام الأمان لتبادل Coincheck. هذا يظهر التطور في مجال الrobbery إلى العمليات التي تستهدف الأنظمة الرقمية والعملات الرقمية.

💡Heist

Heist هي المصطلح العام يستخدم في النص للوصف للrobbery أو العمليات الrobbery التي تستهدف الاموال. في النص، يُستخدم لوصف مجموعة من الrobbery المختلفة، مما يشير إلى أن الrobbery يمكن أن تكون في أشكال متعددة وطرق متعددة.

💡Imperial Bank

Imperial Bank هي الجهة التي أُذكرت في النص كمثال لrobbery تفاعلية ووحشية، حيث قام المتورط باستغلال الثقة واستخدام المواد الكيميائية المميتة لتحقيق هدفه. هذا يظهر كيف يمكن أن تكون الrobbery متورطة وخطيرة على الصعيد الشخصي.

💡Unit 731

Unit 731 يُذكر في النص كمجموعة قديمة في اليابان تشتهر بعمليات التجارب البشرية القاتلة. يُعتقد أن بعض الrobbery قد تكون مرتبطة بها، مما يظهر كيف يمكن للrobbery أن تكون متورطة بعمليات وعمليات أخرى متورطة وخطيرة.

💡Criminal investigation

التحقيق الجنائي هو العملية التي يُذكر في النص كجزء من الخطوات التي تتخذها السلطات لكشف الrobbery وضبط المتورطين. في الrobbery التي وُذكرت، نجحت السلطات في تحديد المشتبه به ولكن لم يتم القبض عليه بعد، مما يظهر تحديات التحقيق الجنائي.

Highlights

Introduction of the video sponsored by Dashlane, a password manager.

The story of the 1968 Nihon Trust bank heist, where a bank manager was threatened and 300 million yen was stolen.

The clever ruse used by the perpetrator disguised as a police officer to steal the money.

The aftermath of the heist with 120 pieces of misleading evidence left behind.

The 2016 Tokyo 7-Eleven ATM heist involving 14,000 transactions and 600 people.

The unique case of the Fukutoku Bank heist in 1994, including a thank you note from the robbers.

The Imperial Bank incident in 1948 where a man posing as a health inspector poisoned 16 people, killing 12.

The controversial conviction and death sentence of Sadamichi Hirasawa, later questioned.

The Coincheck cryptocurrency heist in 2018, the largest in history at the time.

The failure of Coincheck to implement necessary security measures leading to the heist.

The tracing of stolen cryptocurrency to specific addresses, though the culprits remained anonymous.

The promotion of Dashlane as a solution for secure password management.

Dashlane's features, including auto-filling passwords and a password generator.

A special offer for viewers to start using Dashlane for free with a promo code.

Transcripts

play00:00

- I'm Kento Bento.

play00:02

- This video is made possible by Dashlane.

play00:05

Download Dashlane for free if you never want to lose

play00:08

another password again at the link in the description.

play00:11

Tokyo; December 10th, 1968.

play00:14

It was pouring rain.

play00:16

The bank manager of the Nihon Trust bank was on edge.

play00:19

Someone had threatened his life and those around him

play00:22

over the past few months.

play00:23

Just four days prior, a letter, one of recent many,

play00:26

was sent to his personal residence demanding 300 million yen

play00:30

or his house would be blown up with dynamite.

play00:33

The letter was made up of characters cut out and

play00:35

pasted from movie magazines.

play00:37

Police were notified; and indeed they kept a close eye

play00:40

on the bank and his home; though,

play00:42

this did not ease the mind of the bank manager who

play00:45

shared his concerns with his branch employees.

play00:48

Now of course, this is Japan, and work is work;

play00:51

the show must go on.

play00:52

With this in mind, the bank manager went on with his

play00:55

duties, sending four of his employees to the nearby

play00:57

Toshiba factory to make a scheduled drop.

play01:00

So off they went, taking the company car,

play01:02

but not long after leaving the bank,

play01:04

the four heard police sirens approaching.

play01:07

At that very moment they happened to be next

play01:08

to a prison of all places.

play01:10

A police officer screeched to a halt in front of

play01:12

the car, and frantically got off his motorcycle

play01:14

to warn them.

play01:16

The branch manager's home had just been blown up,

play01:18

people were injured; and some presumably worse.

play01:21

Despite police monitoring the locations,

play01:23

the perpetrator was still able to carry out his threat.

play01:26

But it wasn't over, additional threats were made.

play01:29

The bank in particular was now a target and branch

play01:32

employees were at risk, especially those who had

play01:35

left the bank earlier to carry out bank duties in

play01:37

clearly-marked company cars.

play01:39

Their car needed to be searched.

play01:42

The officer got down underneath to check the car,

play01:44

but before he could do a proper search, an employee

play01:47

started noticing smoke and flames emerging from the vehicle.

play01:50

Fearing the car was about to explode,

play01:52

the officer desperately tried to roll out of the way.

play01:55

Everyone ran as fast as they could to safety,

play01:57

retreating behind the prison walls.

play01:59

They waited and waited for the explosion.

play02:03

But there was no explosion.

play02:04

They looked back, and realized the company car was gone.

play02:09

The police officer was gone.

play02:11

Had he moved the car to safety?

play02:12

Confused, they called the Nihon Trust bank to find out

play02:15

what was going on.

play02:17

To their relief, the bank manager answered;

play02:19

he was alive and well.

play02:21

In fact, everything was fine there;

play02:23

the bank manager's home was never blown up.

play02:26

As the adrenaline wore off, it finally dawned on them

play02:28

what had happened.

play02:30

This was the moment the perpetrator had been setting

play02:32

up the past few months.

play02:34

Disguised as a police officer,

play02:35

he had now gotten away with what was to be the bonus

play02:38

payments of 523 Toshiba employees;

play02:42

the stolen amount totaled to 300 million yen

play02:45

or six million dollars, the exact amount he had asked for.

play02:49

On the ground they found various items left behind

play02:51

including a warning flare that the officer must have

play02:54

ignited while under the car, to mimic dynamite.

play02:57

A reported 120 pieces of evidence was left behind at

play03:00

the crime scene, which is a lot and would normally be

play03:03

beneficial, but this was purposely done

play03:05

to mislead the investigation.

play03:08

This worked.

play03:09

Half a century later, the case remains unsolved.

play03:13

Some say this was the greatest heist in Japanese

play03:15

history; there was no loss of life, no blood spilt;

play03:18

the plan meticulously carried out by a single

play03:20

person; and in the end the money taken;

play03:23

but there are many ways a bank heist can be great,

play03:27

there are many ways it can be notable.

play03:28

Take the case on May 15th, 2016.

play03:32

At around 5:00 a.m. in the early hours,

play03:35

cash was physically withdrawn from an ATM

play03:37

from a Tokyo 7-Eleven.

play03:39

The amount was a 100,000 yen, about $880,

play03:43

which was the cash limit.

play03:44

Now, this doesn't seem too bad;

play03:46

but try repeating this 14,000 times across Japan

play03:49

in the span of just two hours.

play03:52

Because that is exactly what happened.

play03:55

In total, 1.4 billion yen, about 13 million dollars,

play03:59

was taken from ATMs alone;

play04:02

and this wasn't done electronically.

play04:03

It was done in person.

play04:05

Sure, it had to have been some sort of a large

play04:07

coordinated group, but the staggering number of

play04:09

transactions in a two hour frame

play04:12

made even this seem questionable.

play04:14

Compared to other notable cases,

play04:15

the largest known recorded number of participants to

play04:18

have been involved in a single heist,

play04:20

wouldn't have been able to pull this off either;

play04:22

unless they had super powers.

play04:24

Involving an even larger team would presumably be

play04:26

unwise, as there'd be too many chefs in the kitchen.

play04:30

Now after police completed their painstaking process of

play04:32

checking security footage from each 7-Eleven store

play04:35

and yeah it was only 7-Elevens hit,

play04:37

they found their answer.

play04:39

In this particular case, the more chefs the better.

play04:41

It wasn't a team of 50, or 100, or even 200.

play04:45

It was 600 people.

play04:47

600 people pulling off a sophisticated,

play04:49

highly-coordinated heist using fake credit cards.

play04:52

Quite the contrast from the single perpetrator

play04:54

of our first heist.

play04:55

Not surprisingly, people have surmised with this many

play04:58

active participants, there must have been links to a

play05:01

large crime organization.

play05:03

But as of today, despite the numbers,

play05:04

no one of note has been caught.

play05:07

Now here's a quick one.

play05:09

Kobe.

play05:09

August 7th, 1994.

play05:12

540 million yen was stolen from Fukutoku Bank;

play05:16

which is a sizeable amount, but what makes this story so

play05:19

unique is that 10 days after the heist,

play05:21

the bank, still reeling from the events, received a note

play05:24

from the robbers.

play05:25

The note read Thank you very much for the bonus.

play05:28

We can now live on this loot for the rest of our lives.

play05:31

It was a sincere message of gratitude.

play05:33

Yeah we all know the reputation Japanese people

play05:35

have for being polite but this took it to another level.

play05:39

So, the last three cases involved plans being

play05:41

executed perfectly with no loss of life,

play05:44

but not the case with the next one.

play05:46

We're going way back.

play05:47

January 26th, 1948.

play05:50

Again in Tokyo; a man in his forties walked into a branch

play05:53

of the Imperial Bank, just before closing time.

play05:57

16 people were inside including customers and bank workers.

play06:00

He got everyone's attention and explained

play06:02

he was a government health inspector sent

play06:04

by the US occupation authorities.

play06:06

Remember, this was postwar Tokyo,

play06:08

still under US occupation.

play06:10

The man stated there was a sudden outbreak of dysentery

play06:14

in the area, and he was to carry out inoculations.

play06:17

In postwar Tokyo, the disease was a legitimate

play06:19

threat so no one really doubted him, add to the fact

play06:22

the man wearing an official government armband.

play06:25

He gave all 16 people a pill,

play06:27

and a few drops of liquid, which they quickly drank.

play06:30

Now, it wasn't long, until they fell, one by one; in agony.

play06:35

With everyone incapacitated, the so-called health inspector

play06:38

grabbed all the money he could find,

play06:40

and calmly left.

play06:41

12 of the 16 people would later be confirmed dead,

play06:45

including a young child.

play06:47

The solution they drank was a cyanide solution.

play06:49

This was a ruthless way to go about a heist;

play06:51

but what made this even more strange was that the man

play06:54

left behind a business card; he left it at the scene.

play06:57

The card was marked with the name Shigeru Matsui,

play07:00

apparently from the Department of Disease Prevention;

play07:03

which does make sense since he was

play07:05

pretending to be a health official.

play07:06

But Shigeru Matsui turned out

play07:08

to be a real person, who actually worked

play07:10

for the Department of Disease Prevention.

play07:13

Not surprisingly, upon investigation Matsui was cleared,

play07:17

he was not the robber, he had several alibis.

play07:19

But he told police he had exchanged business cards

play07:21

with 593 individuals.

play07:25

Japanese people have the habit of exchanging business

play07:27

cards with personal details; so this was helpful,

play07:30

as police now had 593 suspects.

play07:34

Over time, they were able to whittle down this number to

play07:36

just eight cards, eight suspects,

play07:39

one of which was a man named Sadamichi Hirasawa,

play07:42

a Japanese painter.

play07:44

When Hirasawa was questioned and asked to produce the

play07:46

card of Shigeru Matsui's which he should have had;

play07:49

he could not.

play07:50

He claimed it must have been in his wallet which was

play07:52

stolen the other day.

play07:53

He was a victim of pickpocketing.

play07:55

Of course, police had a feeling they knew exactly

play07:57

where the card was.

play07:58

When asked to produce an alibi, he could not.

play08:00

When police looked into his history,

play08:02

they found four previous cases of bank fraud.

play08:05

When they searched his possession,

play08:06

they found a similar amount of money to that stolen from

play08:09

the bank, Hirasawa suspiciously refused to

play08:11

divulge how he got the money.

play08:13

Finally, when his face was shown to eye witnesses,

play08:16

they immediately identified him as the poisoner.

play08:19

Upon further interrogation, Hirasawa confessed.

play08:22

He was arrested for the robbery and the murders;

play08:24

and in 1950, he was given the death penalty, he was

play08:28

sent to death row to await execution by hanging.

play08:31

Case closed.

play08:33

Or is it?

play08:35

Because after the trial, some had doubts whether

play08:38

Sadamichi Hirasawa was indeed the perpetrator.

play08:40

Everything mentioned was circumstantial.

play08:43

In fact, it was revealed his confession was viciously

play08:46

beaten out of him; allegedly tortured;

play08:48

and it was only two of the eyewitnesses who identified

play08:50

him as the criminal.

play08:52

Perhaps he was telling the truth.

play08:53

Perhaps he was really a victim

play08:55

of pickpocketing as he claimed.

play08:57

The unexplained origin of the money in his possession

play08:59

was also thought by some to be from his side business of

play09:03

drawing pornographic pictures, revealing this

play09:05

truth to police, and to the public, would have been

play09:07

detrimental to his reputation as an artist.

play09:10

There was also no way Hirasawa could have

play09:12

realistically obtained the ingredients for what turned

play09:14

out to be a military grade cyanide solution

play09:17

used in the robbery.

play09:18

Interestingly, some have claimed that the true

play09:20

culprit was actually a former member of the

play09:23

notorious Unit 731; a covert biological and chemical

play09:26

warfare research and development unit of the

play09:28

Imperial Japanese Army; that undertook lethal human

play09:31

experimentation during wartime.

play09:34

If so, this would explain the accessibility to the poison.

play09:37

The Minister of Justice himself doubted Hirasawa's

play09:40

guilt and so never signed the death warrant.

play09:43

This opinion was shared by successive Ministers of Justice,

play09:46

so the death sentence was never actually carried out.

play09:49

And so Hirasawa sat in prison, on death row,

play09:52

for the next 32 years of his life,

play09:55

one of the longest tenures ever on death row.

play09:58

And on May 10th, 1987, he caught pneumonia and died in

play10:01

a prison hospital.

play10:03

Despite the verdict, the case was never truly put to

play10:05

rest, and many people felt that the true culprit,

play10:08

all those years ago, would have been within grasp if

play10:10

only the focus was on the right person.

play10:13

This brutality happened in 1948, but 70 years on,

play10:17

there would emerge a new type of heist.

play10:20

January 25th, 2018.

play10:23

Land of the rising cyber-crime.

play10:25

The Tokyo-based exchange, Coincheck,

play10:27

one of the most prominent virtual currency exchanges

play10:29

in Asia was to fall victim to the biggest

play10:31

cryptocurrency heist in history.

play10:34

At 2:57 a.m., using overseas servers,

play10:36

hackers disguising themselves as authorized

play10:38

users, were able to enter the system.

play10:41

They remained undetected for the next eight and a half

play10:44

hours, stealing 58 billion yen worth of the

play10:47

cryptocurrency NEM, which is about $530 million dollars.

play10:51

Then they were gone.

play10:52

This incident became an embarrassment to the

play10:54

Japanese government who had been trying to make Tokyo

play10:56

the global center for cryptocurrency.

play10:59

Coincheck revealed they failed to implement the required

play11:02

extra layer of security,

play11:03

but even worse the stolen currency had been kept

play11:05

online in a hot wallet rather than in a much more

play11:08

secure offline storage facility known as a cold wallet.

play11:12

This is similar to if a convenience store kept

play11:14

significantly large amounts in a cash register as

play11:16

opposed to an off-premise bank vault.

play11:19

Now one of the stranger aspects of the heist is that

play11:20

the stolen virtual funds were able to be traced

play11:23

online, because transactions for Bitcoin and other

play11:26

cryptocurrencies are all public.

play11:28

And so the $530 million worth was eventually traced

play11:31

back to 11 specific addresses;

play11:34

but the identities of those sending and receiving the

play11:36

money unfortunately remained anonymous.

play11:39

Indeed no one yet has been caught,

play11:41

but the developers of NEM were able to label

play11:43

the 11 addresses with specific warning tags for all to see,

play11:47

they also set up a tracking tool to automatically reject

play11:49

exchanges involving the stolen funds.

play11:51

Of course the most frustrating part of this is

play11:53

that it all easily could have been avoided if

play11:56

Coincheck just added that extra layer of security.

play11:59

And really it's not just big companies;

play12:01

most people today are too laxed when it comes to

play12:03

online security using the same password for every

play12:05

account they have.

play12:07

Now if this is you, congratulations,

play12:09

you have bad habits just like me,

play12:10

but that's okay because Dashlane makes keeping track

play12:13

of all your passwords ridiculously easy.

play12:16

It stores all your passwords in one super-secure place

play12:19

then auto-fills them on websites you go to.

play12:21

If you have the same password everywhere but are

play12:22

too lazy to go to each individual website to change

play12:25

your password, that's me,

play12:27

well all good because you can just

play12:28

click one button in the Dashlane app,

play12:30

and it does it for you.

play12:31

Dashlane also has a password generator so you don't have

play12:33

to spend time thinking up super strong passwords

play12:36

like this one.

play12:37

By going to dashlane.com/kentobento,

play12:39

you can get started for free;

play12:41

and if you want some extra special features like

play12:43

syncing your passwords and login details between all

play12:45

your devices like iOS, Android, Mac and Windows,

play12:48

you can upgrade for 10% off by using the promo code

play12:52

kentobento at checkout.

Rate This

5.0 / 5 (0 votes)

Related Tags
robberiesJapanelectroniccyber-crimehistoryheistToshiba7-ElevenImperial BankCoincheck
Do you need a summary in English?