What are the 6 major domains covered in Asset Recovery?
1) Forensic Analysis of Major Heists (Bangladesh Bank, Bybit), 2) Cyber Attack Patterns & Threat Actors, 3) Legal Framework (UNTOC, UNCAC, FATF), 4) Asset Recovery Process & Stages, 5) Challenges & International Cooperation, 6) Case Studies & Success Rates
===CYBER ATTACK LANDSCAPE: Attack Types & Threat Groups===
According to Europol 2024, what are the top 5 most common attack types and their percentages?
1) DDoS Distributed Denial of Service: 18.1%, 2) Phishing: 15.8%, 3) Backdoor: 11.3%, 4) Data Theft: 9.0%, 5) Phishing Campaign: 7.3%
What are the other 10 attack types identified by Europol 2024 (each 1.7-4.5%)?
Rootkit: 5.6%, Email Phishing: 4.5%, Credential Theft: 3.4%, Man-in-the-Middle: 3.4%, Social Engineering: 2.8%, Banking Trojan: 2.3%, Lateral Movement: 2.3%, Remote Code Execution: 2.3%, Spear Phishing: 2.3%, and 5 types at 1.7% each (ACK Bypass Flood, Double Extortion, Keylogger, Proxyjacking, UDP Flood)
According to Europol 2024, what are the top 5 most common hacking groups and their percentages?
1) GhostEmperor: 14.6%, 2) GoldenJackal: 14.6%, 3) Callisto Group: 13.4%, 4) Awaken Likho: 5.4%, 5) KillSec: 5.4% (tied with Volt Typhoon and Trinity Ransomware Group)
What are the other 10 notable hacking groups identified by Europol 2024?
APT37: 4.2%, Russian Cyber Army Team: 4.2%, NoName057: 3.8%, Lazarus Group: 3.3%, Carbanak: 2.9%, Qilin: 2.5%, SCATTERED SPIDER: 2.5%, APT45: 2.1%, CeranaKeeper: 2.1%, Kimsuky: 2.1%, KingSkrupellos: 2.1%, Void Banshee: 2.1%, DumpForums Group: 1.7%
===LAZARUS GROUP: Attack Methodology===
Lazarus Group Attack Methodology: What are the 4 stages of their attack sequence?
1) Entry process based on malware and social engineering, 2) Waiting period for studying security processes, 3) Bypassing Swift and Safe process via impersonification, 4) Laundering and Layering
Bangladesh Bank Heist: What was the attack attributed to and what were the key forensic findings?
Attributed to Lazarus Group. Key findings: Used malware and social engineering for entry, studied security processes during dormant period, bypassed SWIFT controls through impersonation, then laundered funds through Philippines casinos and remittance networks
===BYBIT HEIST 2025: Supply Chain Attack===
Bybit Heist February 2025: What was the attack vector and how did it exploit Safe{Wallet}?
Attack vector: Supply chain compromise. Earlier in February 2025, a Safe{Wallet} developer fell for social engineering attack. Malicious application appeared legitimate (from cryptocurrency trading company), seen on both Windows and Mac, fooled victims into downloading from seemingly legitimate website
Bybit Heist: How did attackers gain and maintain access to Safe{Wallet}’s AWS account?
Attackers compromised developer’s workstation, gained access to Safe{Wallet}’s AWS account, timed efforts to coincide with developer’s normal work hours to remain undetected until actual heist
Bybit Heist: How did the UI manipulation work and when was the theft executed?
Attackers manipulated the Safe{Wallet} user interface that Bybit employees would see. On February 21, 2025, when Bybit employees went to approve and sign a routine transfer, the UI showed what appeared to be a legitimate transaction with intended destination, but funds were diverted
===ASSET RECOVERY: Definitions & Framework===
Asset Recovery: What is the UN Convention definition and what are the two key statistics about recovery rates?
Definition: The process by which the proceeds of corruption transferred abroad are recovered and repatriated to the country from which they were taken or to their rightful owners (Source: UNCAC Chapter V, OECD). Statistics: Only ~10% of assets frozen are returned. Huge gap between what goes missing and what is recovered and ultimately returned
Asset Recovery Framework: What are the three analytical questions to ask when approaching a case?
1) Fact: What do we know for sure, 2) Meaning: What does it mean for us, 3) Actions: What can we do about it
===LEGAL FRAMEWORK: UNTOC===
UNTOC (UN Convention Against Transnational Organized Crime): When was it adopted, when did it enter into force, and how many parties has it?
Adopted: November 15, 2000 by UN General Assembly resolution 55/25. Entry into force: September 29, 2003. Signatories: 147. Parties: 194 (as of August 12, 2025)
UNTOC Article 12 (Confiscation and seizure): What are the three main requirements?
1) States must criminalize confiscation of proceeds of crime and tools used in crime, 2) Must empower authorities to freeze/seize assets during investigation, 3) Bank secrecy cannot be used to refuse cooperation
UNTOC Article 13 (International cooperation for confiscation): What are the three key provisions?
1) A State may request another to confiscate or freeze property, 2) Requires dual criminality, 3) Requested State must take provisional measures pending final confiscation
UNTOC Article 14 (Disposal of confiscated assets): What are the three disposition options?
States can: 1) Return proceeds to requesting State, 2) Compensate victims, or 3) Support UNTOC projects. Encourages restitution and international sharing of assets
UNTOC Article 16 (Extradition): What offences does it apply to and what are two key protections?
Applies to offences punishable by ≥4 years. Key provisions: 1) UNTOC can serve as legal extradition basis if no bilateral treaty exists, 2) Extradition must not be refused for reasons of fiscal/banking secrecy, 3) States may refuse only if request is politically motivated or discriminatory
UNTOC Article 18 (Mutual Legal Assistance): What is the scope and what key ground for refusal is prohibited?
Scope: Broad duty to provide ‘the widest measure’ of cooperation. Covers testimony, evidence, search, seizure, asset freezing, service of documents. UNTOC itself can serve as legal basis even if no bilateral MLA treaty exists. Banking secrecy is NOT a valid ground for refusal
UNTOC Article 19 (Joint Investigations): What does it allow and why is it particularly useful?
Allows States to set up joint investigative teams, enabling real-time cooperation between prosecutors, police, and regulators. Particularly useful for transnational cybercrime and money laundering schemes