
China’s Nationwide Pc Virus Emergency Response Middle simply accused america of finishing up the 2020 LuBian Bitcoin exploit.
Nevertheless, Western analysis ties the occasion to a pockets random-number flaw and doesn’t title a state actor.
Open-source forensics on the LuBian drain
The core details of the episode at the moment are effectively documented throughout open sources. In line with Arkham, roughly 127,000 BTC have been moved out of wallets related to the LuBian mining pool over a interval of about two hours on December 28–29, 2020, by coordinated withdrawals throughout a whole bunch of addresses.
In line with the MilkSad analysis crew and CVE-2023-39910, these wallets have been created with software program that seeded MT19937 with solely 32 bits of entropy, which diminished the search house to roughly 4.29 billion seeds and uncovered batches of P2SH-P2WPKH addresses to brute-force assaults.
MilkSad’s Replace #14 hyperlinks a cluster holding roughly 136,951 BTC that was drained starting on 2020-12-28 to LuBian.com by on-chain mining exercise and paperwork the fastened 75,000 sat price sample on the sweep transactions. Blockscope’s reconstruction exhibits the majority of the funds then sat with minimal motion for years.
Those self same cash now sit in wallets managed by the U.S. authorities. In line with the U.S. Division of Justice, prosecutors are pursuing the forfeiture of roughly 127,271 BTC as proceeds and instrumentalities of alleged fraud and cash laundering tied to Chen Zhi and the Prince Group. The DOJ states that the belongings are presently in U.S. custody.
Elliptic exhibits that addresses within the DOJ criticism map onto the LuBian weak-key cluster that MilkSad and Arkham had already recognized, and Arkham now tags the consolidated vacation spot wallets as U.S. government-controlled. On-chain sleuths, together with ZachXBT, have publicly famous the overlap between the seized addresses and the sooner weak-key set.
What the forensic document exhibits concerning the LuBian exploit
Relating to attribution, technical groups that first recognized the flaw and traced the flows don’t declare information of who executed the 2020 drain. MilkSad repeatedly refers to an actor who found and exploited weak personal keys, stating they have no idea the id.
Arkham and Blockscope describe the entity because the LuBian hacker, specializing in technique and scale. Elliptic and TRM confine their claims to tracing and to the match between the 2020 outflows and the later DOJ seizure. None of those sources names a state actor for the 2020 operation.
CVERC, amplified by the CCP-owned World Occasions and native pickups, advances a distinct narrative.
It argues that the four-year dormancy interval deviates from frequent legal cash-out patterns and due to this fact factors to a state-level hacking group.
It then hyperlinks the later U.S. custody of the cash to the allegation that U.S. actors executed the exploit in 2020 earlier than changing it right into a regulation enforcement seizure.
The report’s technical sections monitor intently with unbiased open analysis on weak keys, MT19937, deal with batching, and price patterns.
Its attribution leap rests on circumstantial inferences about dormancy and supreme custody relatively than new forensics, tooling ties, infrastructure overlaps, or different commonplace indicators utilized in state actor attribution.
What we truly know concerning the LuBian Bitcoin drain
There are at the very least three coherent readings that match what’s public.
- One is that an unknown celebration, legal or in any other case, discovered the weak-key sample, drained the cluster in 2020, left the cash largely dormant, and U.S. authorities later obtained the keys by seizures of units, cooperating witnesses, or associated investigative means, which culminated in consolidation and forfeiture filings in 2024–2025.
- A second treats LuBian and associated entities as a part of an inner treasury and laundering community for Prince Group, the place an obvious hack might have been an opaque inner motion between weak-key-controlled wallets, in keeping with DOJ’s framing of the wallets as unhosted and throughout the defendant’s possession, although public paperwork don’t absolutely element how Chen’s community got here to regulate the precise keys.
- The third, superior by CVERC, is {that a} U.S. state actor was chargeable for the 2020 operation. The primary two align with the evidentiary posture offered within the filings of MilkSad, Arkham, Elliptic, TRM, and the DOJ.
The third is an allegation not substantiated by unbiased technical proof within the public area.
A short timeline of the uncontested occasions is under.
From a functionality standpoint, brute forcing a 2^32 seed house is effectively inside attain for motivated actors. At about 1 million guesses per second, a single setup can traverse the house in just a few hours, and distributed or GPU-accelerated rigs compress that additional.
Feasibility is central to the MilkSad-class weak spot, explaining how a single actor can sweep 1000’s of susceptible addresses concurrently. The fixed-fee sample and deal with derivation particulars printed by MilkSad and mirrored in CVERC’s technical write-up reinforce this technique of exploitation.
The remaining disputes lie in possession and management at every step, not within the mechanics. DOJ frames the wallets as repositories for legal proceeds tied to Chen and states the belongings are forfeitable below U.S. regulation.
Chinese language authorities body LuBian as a sufferer of theft and accuse a U.S. state actor of the unique exploit.
Impartial blockchain forensics teams join the 2020 outflows to the 2024–2025 consolidation and seizure, and cease in need of naming who pressed the button in 2020. That’s the standing of the document.

