BTCC / BTCC Square / Cryptonews /
Exposed: How $90M Nobitex Hack Fueled Israel’s Crypto-Financed Spy Games

Exposed: How $90M Nobitex Hack Fueled Israel’s Crypto-Financed Spy Games

Author:
Cryptonews
Published:
2025-06-30 08:30:56
20
1

Another day, another crypto heist—except this one smells like geopolitical sabotage. Israel’s Nobitex exchange just got drained for $90 million, and the trail leads straight to state-backed espionage. Who needs a spy budget when you’ve got decentralized finance, right?


The Hack Heard ‘Round the Dark Web

Attackers bypassed Nobitex’s security like it was a turnstile—turns out ‘military-grade encryption’ doesn’t stop a well-funded adversary. The stolen funds? Already laundered through privacy coins and DeFi mixers. Good luck tracing that, Interpol.


Crypto: The New Swiss Bank Account

Forget numbered accounts in Zurich. Modern spies just long BTC, short ethics, and disappear into the blockchain. Bonus irony? The exploit might’ve been funded by… previous crypto hacks. The circle of life, Wall Street style.

Meanwhile, retail investors still think ‘DYOR’ is actual risk management.

Israeli Espionage Case Highlights Use of Crypto for State-Backed Operations

In its report, TRM Labs noted “the arrests represent a rare public case of state-sponsored espionage in which operatives were compensated using digital assets.”

The investigation alleges that each suspect received crypto payouts upon completing specific assignments, with funds delivered via anonymized blockchain channels.

One of the accused, Dmitri Cohen, 28, from Haifa, reportedly tracked and photographed members of Prime Minister Benjamin Netanyahu’s family. He is accused of spying on Amit Yardeni, Netanyahu’s future daughter-in-law, ahead of her wedding.

Investigators say Cohen used a dedicated device to maintain encrypted contact with his Iranian handler and received thousands of dollars in crypto, about $500 per task.

A second suspect, aged 27 from Tel Aviv, was detained for allegedly photographing military sites, government buildings, and tagging graffiti. Authorities seized several devices from his home during the investigation.

⚠Israel arrests 27-year-old Tel Aviv man for allegedly spying for Iran in exchange for crypto, spotlighting the growing role of digital assets in espionage.#Israel #Iran https://t.co/XC9ZKyJS9i

— Cryptonews.com (@cryptonews) June 24, 2025

A third suspect, aged 19 from the Sharon region, reportedly passed classified information to Iranian contacts. He was allegedly recruited online and maintained prolonged communication with Iranian operatives during recent tensions between the two countries.

While Israeli officials have not publicly connected the arrests to any specific cyber incident, TRM Labs suggests the timeline may point to a broader intelligence operation.

TRM Labs Flags Possible Intelligence Overlap in Espionage Case Involving Nobitex Hack

“Although Israeli authorities have not confirmed any connection between the hack and the arrests, the timing and tactical profile suggest potential intelligence overlaps,” TRM Labs noted.

The firm noted that Israeli airstrikes occurred on June 13, followed by the hack of Iran-based crypto exchange Nobitex on June 18, and then the arrests on June 24.

However, till now, there hasn’t been a solid evidence linking Israel to the June 18 cyberattack on Nobitex, Iran’s largest cryptocurrency exchange, although a pro-Israel hacking group Predatory Sparrow also know as “ Gonjeshke Darande” claimed responsibility for the breach.

👨🏻‍💻The fallout from the $100 million @nobitexmarket exchange hack continues to deepen as hackers release the platform’s full source code.#Hack #Nobitexhttps://t.co/1pAhbG3TAv

— Cryptonews.com (@cryptonews) June 19, 2025

Additionally, the pro-Israel hacker group Gonjeshke Darande claimed to not only wipe $90 million of the exchange but also released the Iranian exchange’s full source code, including server lists, cold wallet scripts, and privacy settings. Notably, the group has previously targeted Iranian infrastructure for intelligence-gathering.

TRM Labs suggests the breach could have granted access to KYC records, potentially aiding Israeli cyber units in identifying Iranian handlers or mapping crypto payments to local operatives.

Iran’s use of cryptocurrency in covert operations is not new. Reports revealed that Iran routinely uses crypto to fund proxies, evade sanctions, and support cyber operations.

📈In 2024, Russia and Iran increasingly turned to cryptocurrency to bypass Western sanctions, leveraging DeFi, no-KYC exchanges, and crypto for financial operations, according to @chainalysis#Russia #Iran #Sanctionshttps://t.co/ep1f3tLNms

— Cryptonews.com (@cryptonews) February 17, 2025

Similar patterns have emerged in other countries. In the same year, South Korea arrested individuals linked to North Korean intelligence for passing military secrets in exchange for crypto.

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users