Tokyo Police Arrest Buyers In $530M Cryptocurrency Hack

Mar 11, 2020 | Compliance Updates, iComply Insights

Two Men Arrested in Japan for Purchasing NEM Cryptocurrency Stolen from Coincheck

What Happened?

On March 11, 2020. Tokyo police arrested two Japanese citizens for alleged possession of NEM cryptocurrency that was stolen from the crypto exchange operator Coincheck in a massive cyberattack in 2018. According to investigative sources, the suspects were aware that the cryptocurrency they acquired was stolen from the exchange.

Source: https://www.japantimes.co.jp/news/2020/03/11/national/crime-legal/tokyo-police-arrest-two-taking-possession-stolen-nem-cryptocurrency/

Who Is Impacted?

Virtual asset service providers, trustees, and OTC traders that buy, sell, or custody cryptocurrencies.

Why This Matters?

Supervisory technology for regulators, financial intelligence units, and law enforcement has become incredibly sophisticated. Firms such as CipherTrace, Elliptic, and Chainalysis allow regulators to follow the money, monitor wallets and entities in real-time, and quickly build a trail of evidence for prosecution. Exchanges and other virtual asset service providers need to respond to requests for information about the cryptocurrency transactions they facilitate.

What’s Next?

Any business that facilitates or promotes cryptocurrency or virtual asset transactions should ensure their anti-money laundering software is capable of identifying high-risk transactions.

Transaction monitoring software such as Alessa or ComplyAdvantage can help firms integrate blockchain data with know your customer (KYC) data, freeze or escalate transactions, and compile suspicious activity reports and regulatory filings.

learn more

Is your AML compliance too expensive, time-consuming, or ineffective?

iComply enables financial services providers to reduce costs, risk, and complexity and improve staff capacity, effectiveness, and customer experience.

Request a demo today.

The Lifecycle of Dirty Money: How AML Checks Turn the Tide
The Lifecycle of Dirty Money: How AML Checks Turn the Tide

The Journey of Laundered Money: A Deep Dive into AML Compliance

Follow the path of “dirty money” through its three stages – placement, layering, and integration – and discover how robust AML processes can break the chain at each step.

Four AML Myths Commonly Found in US Companies
Four AML Myths Commonly Found in US Companies

Debunk common myths about global sanctions, PEP, and AML screening in this guide for US businesses. Learn why even domestic companies need global compliance, and discover how iComply’s tools streamline screening, uncover hidden risks, and ensure regulatory readiness.

The Top Cybersecurity Threats of 2025 and How to Protect Yourself
The Top Cybersecurity Threats of 2025 and How to Protect Yourself

Uncover the biggest cybersecurity threats of 2025, from advanced phishing to ransomware and deepfakes. Learn how iComply’s innovative live face match technology revolutionizes security with real-time, on-device biometric authentication, protecting user privacy, ensuring consent, and eliminating vulnerabilities in the digital age.