header-langage
简体中文
繁體中文
English
Tiếng Việt
한국어
日本語
ภาษาไทย
Türkçe
Scan to Download the APP

LuBian Mining Pool Hacked: Technical Forensic Analysis Report of Massive Bitcoin Theft Event

2025-11-09 21:45
Read this article in 26 Minutes
Article Source: National Computer Virus Emergency Response Center


On December 29, 2020, a major hack occurred in the LuBian mining pool, where a total of 127272.06953176 bitcoins (valued at around 3.5 billion USD at the time, now valued at 15 billion USD) were stolen by the attacker. The holder of this large amount of bitcoin is none other than Chen Zhi, Chairman of the Cambodia Prince Group. After the hack, Chen Zhi and his Prince Group separately posted messages on the blockchain in early 2021 and July 2022, appealing to the hacker to return the stolen bitcoins and offering to pay a ransom, but received no response. Strangely, after the large amount of bitcoins was stolen, it lay dormant in the attacker's controlled bitcoin wallet address for a full 4 years, almost untouched. This behavior clearly does not align with the typical hacker's rush to cash out for profit; rather, it resembles a precise operation orchestrated by a "state-level hacker organization." It wasn't until June 2024 that these stolen bitcoins were moved to a new bitcoin wallet address and remain untouched to this day.


On October 14, 2025, the U.S. Department of Justice announced criminal charges against Chen Zhi and his Prince Group, stating that they seized 127,000 bitcoins from them. Various evidence indicates that the massive amount of bitcoins seized by the U.S. government from Chen Zhi and his Prince Group was actually the LuBian mining pool bitcoins that had been stolen by the hacker using technical means as early as 2020. In other words, the U.S. government had already used hacker techniques to steal the 127,000 bitcoins held by Chen Zhi back in 2020, in a typical "hack-on-hack" event orchestrated by a state-level hacker organization. This report takes a technical perspective, conducts technical tracing, deeply analyzes the key technical details of the event, focuses on the origins of the stolen bitcoins, reconstructs the complete attack timeline at that time, evaluates bitcoin's security mechanisms, and aims to provide valuable security insights for the cryptocurrency industry and users.


1. Background of the Event


The LuBian mining pool was established in early 2020 and quickly rose as a bitcoin mining pool, with China and Iran as its main operational bases. In December 2020, the LuBian mining pool suffered a large-scale hack that resulted in over 90% of its bitcoin holdings being stolen. The total amount stolen was 127272.06953176 BTC, which closely aligns with the 127271BTC mentioned in the U.S. Department of Justice indictment.


The operational model of the LuBian mining pool includes centralized storage and distribution of mining rewards. The bitcoins in the mining pool address are not stored in regulated centralized exchanges but rather in non-custodial wallets. Technically, non-custodial wallets (also known as cold wallets or hardware wallets) are considered the ultimate safe haven for crypto assets. Unlike exchange accounts that can be frozen by a simple court order, they are more like a holder's private bank vault, with the key (private key) solely in the holder's possession.


Bitcoin, as a cryptocurrency, uses on-chain addresses to identify the ownership and flow of Bitcoin assets. Possessing the private key of an on-chain address gives full control over the Bitcoin held in that address. According to reports from on-chain analysis firms, there is a high degree of overlap between a significant amount of Bitcoin controlled by the U.S. government and the LuBian mining pool involved in a hacking incident related to Chen Zhi. On December 29, 2020, UTC, an unusual transfer occurred from LuBian's core Bitcoin wallet address, with a total transfer amount of 127272.06953176 BTC, closely matching the 127271 BTC mentioned in the U.S. Department of Justice indictment. After this stolen Bitcoin was transferred, it remained dormant until June 2024. Between June 22 and July 23, 2024, this stolen Bitcoin was once again moved to new on-chain addresses and has remained untouched since. The well-known U.S. blockchain tracking tool platform ARKHAM has identified these final addresses as being held by the U.S. government. Currently, the U.S. government has not disclosed how they obtained Chen Zhi's substantial Bitcoin on-chain address private key as stated in the indictment.

Figure 1: Key Activity Timeline


II. Attack Chain Analysis


It is well known that in the world of blockchain, randomness is the cornerstone of cryptographic security. Bitcoin uses asymmetric encryption technology, where a Bitcoin private key is a 256-bit binary random number. The theoretical number of attempts to crack it is 2^256 times, making it nearly impossible. However, if this 256-bit binary private key is not generated completely randomly and, for example, 224 bits follow a predictable pattern that can be calculated, with only 32 bits being random, the strength of the private key is significantly reduced, requiring only about 2^32 attempts (approximately 4.29 billion) for brute force cracking. For instance, in September 2022, the UK cryptocurrency market maker Wintermute was hacked of $160 million due to a similar pseudorandom number vulnerability.


In August 2023, a foreign security research team named MilkSad publicly disclosed the discovery of a third-party key generation tool with a pseudorandom number generator (PRNG) vulnerability and successfully obtained a CVE number (CVE-2023-39910). In a research report released by this team, it was mentioned that the LuBian Bitcoin mining pool had a similar vulnerability. Among the LuBian Bitcoin mining pool addresses exposed in the hack disclosed, all 25 Bitcoin addresses mentioned in the U.S. Department of Justice indictment were included.

Figure 2: List of 25 Bitcoin Wallet Addresses from the U.S. Department of Justice Indictment


The LuBian Bitcoin mining pool, as a non-custodial wallet system, relies on a custom private key generation algorithm to manage funds associated with its Bitcoin wallet addresses. The private key generation does not follow the recommended 256-bit binary randomness standard but instead relies on a 32-bit binary randomness. This algorithm has a fatal flaw: it uses a "pseudo-random generator" Mersenne Twister (MT19937-32) that relies solely on a timestamp or weak input as a seed. A pseudo-random number generator (PRNG) equivalent to a 4-byte integer's randomness is susceptible to efficient enumeration in modern computing. Mathematically, the cracking probability is 1/232. For example, assuming an attack script tests 10^6 keys per second, the cracking time would be approximately 4200 seconds (just around 1.17 hours). In practice, optimization tools like Hashcat or custom scripts can further accelerate this process. Exploiting this vulnerability, an attacker managed to steal a significant amount of Bitcoin from the LuBian Bitcoin mining pool.

Figure 3: Comparison Table of LuBian Pool and Industry Security Standard Flaws


Through technical tracing, the complete timeline and details of the hack on the LuBian pool are as follows:


1. Theft Stage: December 29, 2020 (Beijing Time)


Incident: Hackers exploited the pseudo-random number vulnerability in the private key generation of LuBian Bitcoin mining pool wallet addresses to brute force over 5,000 weakly generated wallet addresses (wallet type: P2WPKH-nested-in-P2SH, prefix 3). In about 2 hours, approximately 127,272.06953176 BTC (worth around $3.5 billion at the time) was drained from these wallet addresses, leaving less than 200 BTC remaining. All suspicious transactions shared the same transaction fee, indicating the attack was carried out through automated batch transfer scripts.


Sender: LuBian pool's weakly generated Bitcoin wallet address pool (controlled by the LuBian mining operation entity, a subsidiary of Chen Zhi's Prince Group);


Recipient: Bitcoin wallet address pool controlled by the attacker (addresses not publicly disclosed);


Transfer Path: Weak wallet address pool → Attacker's wallet address pool;


Association Analysis: The total amount stolen was 127272.06953176 BTC, which is essentially the same as the 127271 BTC mentioned in the U.S. Department of Justice indictment.


2. Dormant Phase: From December 30, 2020, to June 22, 2024 (Beijing Time)


Event: These bitcoins, stolen in 2020 through a pseudo-random number vulnerability, were stored in a bitcoin wallet address controlled by the attacker for a period of 4 years in a dormant state, with only less than one-thousandth of dust transactions possibly used for testing.


Association Analysis: These bitcoins remained virtually untouched until June 22, 2024, when they were fully taken over by the U.S. government. This clearly does not align with the typical nature of hackers eager to cash out and pursue profit but rather resembles a precise operation orchestrated by a state-level hacker group.


3. Recovery Attempt Phase: Early 2021, July 4, 2022, July 26, 2022 (Beijing Time)


Event: After the theft of these bitcoins, during the dormant period, in early 2021, the LuBian mining pool sent over 1,500 messages using the Bitcoin OP_RETURN function (costing approximately 1.4 BTC in fees), embedding the messages in the blockchain data area, pleading with the hacker to return the funds. Message example: "Please return our funds, we'll pay a reward." On July 4 and July 26, 2022, the LuBian mining pool once again used the Bitcoin OP_RETURN function to send messages. Message example: "MSG from LB. To the whitehat who is saving our asset, you can contact us through 1228btc@gmail.com to discuss the return of the asset and your reward."


Sender: LuBian's pseudo-random Bitcoin wallet address (controlled by the operational entity of the LuBian mining pool, affiliated with Chen Zhi's Prince Group);


Recipient: A group of bitcoin wallet addresses controlled by the attacker;


Transfer Path: Pseudo-random address group → Attacker's address group (small transactions embedding OP_RETURN);


Association Analysis: Following the theft incident, these messages confirm that the LuBian mining pool, as the sender, has attempted multiple times to contact a "third-party hacker" to request the return of the assets and discuss ransom matters.


4. Activation and Transfer Phase: From June 22 to July 23, 2024 (Beijing Time)


Event: Bitcoin held in dormant state in a wallet address controlled by the attacker was activated and transferred to a final Bitcoin wallet address. The final wallet address was flagged by the well-known blockchain monitoring tool ARKHAM as being held by the U.S. government.


Sender: Wallet address group controlled by the attacker;


Recipient: New consolidated final wallet address group (not publicly disclosed but confirmed to be controlled by the U.S. government)


Transfer Path: Wallet address group controlled by the attacker → Wallet address group controlled by the U.S. government;


Link Analysis: This large amount of stolen Bitcoin, which had been dormant and untouched for nearly 4 years, was ultimately controlled by the U.S. government.


5. Announcement and Seizure Phase: October 14, 2025 (U.S. Local Time)


Event: The U.S. Department of Justice issued an announcement, charging Chen Zhi and "seizing" the 127,000 bitcoins he held.


Simultaneously, through the public mechanism of the blockchain, all Bitcoin transaction records were made publicly traceable. Based on this, this report traced the source of the stolen massive amount of Bitcoin related to the LuBian weak random Bitcoin wallet address (controlled by the entity operating the LuBian mining pool, possibly affiliated with Chen Zhi's Prince Group). The total amount of stolen Bitcoin amounted to 127,272.06953176 coins, including approximately 17,800 coins from independent "mining," about 2,300 coins from mining pool rewards, and 107,100 coins from exchanges and other channels. Preliminary results suggest discrepancies with the U.S. DOJ indictment, which claimed all the Bitcoin originated from illegal income.


III. Vulnerability Technical Details Analysis


1. Bitcoin Wallet Address Private Key Generation:


The core of the LuBian pool vulnerability lies in its private key generator using a flaw similar to "MilkSad" in Libbitcoin Explorer. Specifically, the system uses a Mersenne Twister (MT19937-32) pseudo-random number generator initialized with only a 32-bit seed, resulting in an effective entropy of only 32 bits. This PRNG is not cryptographically secure, making it easy to predict and reverse-engineer. An attacker can enumerate all possible 32-bit seeds (0 to 2^32-1), generate the corresponding private keys, and check if they match the public key hash of a known wallet address.


In the Bitcoin ecosystem, the private key generation process usually follows: Random Seed → SHA-256 Hash → ECDSA Private Key.


The implementation of the LuBian mining pool's core library may be based on custom code or open-source libraries (such as Libbitcoin), but it overlooks the security of entropy. Similar to the MilkSad vulnerability, in the case of the Libbitcoin Explorer, the 'bx seed' command also uses the MT19937-32 random number generator, relying solely on a timestamp or weak input as a seed, making the private key vulnerable to brute-force attacks. In the LuBian attack incident, over 5,000 wallets were affected, indicating that the vulnerability is systematic and may stem from code reuse during bulk wallet generation.


2. Simulated Attack Process:


(1) Identify the target wallet address (through on-chain monitoring of LuBian mining pool activity);


(2) Enumerate the 32-bit seed: for seed in 0 to 4294967295;


(3) Generate private key: private_key = SHA256(seed);


(4) Derive public key and address: using ECDSA SECP256k1 curve calculation;


(5) Match: If the derived address matches the target, use the private key to sign a transaction to steal funds;


Comparison to similar vulnerabilities: This vulnerability is similar to Trust Wallet's 32-bit entropy flaw, which led to the massive decryption of Bitcoin wallet addresses; Libbitcoin Explorer's 'MilkSad' vulnerability also exposed the private key due to low entropy. These cases all stem from legacy issues in early codebases that did not adopt the BIP-39 standard (12-24 word seed phrase, providing high entropy). The LuBian mining pool may have used a custom algorithm aimed at simplifying management but overlooked security.


Defense shortcomings: The LuBian mining pool did not implement multi-signature (multisig), hardware wallets, or Hierarchical Deterministic wallets (HD wallets), all of which could enhance security. On-chain data indicates that the attack covered multiple wallets, indicating a systemic vulnerability rather than a single point of failure.


3. On-Chain Evidence and Recovery Attempts:


OP_RETURN Messages: The LuBian mining pool used Bitcoin's OP_RETURN feature to send over 1,500 messages, spending 1.4 BTC, pleading with the attacker to return the funds. These messages are embedded in the blockchain, proving the actions of the real owner, not a forgery. Example messages include "Please return the funds" or similar pleas, distributed across multiple transactions.


4. Attack Attribution Analysis:


On October 14, 2025, local time in the United States, the U.S. Department of Justice issued a criminal indictment against Zhi Chen (Case No. 1:25-cr-00416), listing 25 Bitcoin wallet addresses holding approximately 127,271 BTC, with a total value of around $15 billion, which have been seized. Through blockchain analysis and official document review, these addresses are highly linked to the LuBian mining pool attack:


Direct Association: Blockchain analysis shows that the 25 addresses in the U.S. Department of Justice indictment are indeed the final holding addresses of the stolen Bitcoin from the LuBian mining pool's 2020 attack. An Elliptic report indicates that this batch of Bitcoin was "stolen" from the mining operation of the LuBian mining pool in 2020. Arkham Intelligence confirms that the funds seized by the U.S. Department of Justice directly originate from the LuBian mining pool theft event.


Indictment Evidence Association: While the U.S. Department of Justice indictment does not directly name the "LuBian hack," it mentions funds originating from a "hacked attack on Bitcoin mining operations in Iran and China," which is consistent with the on-chain analyses of Elliptic and Arkham Intelligence.


Attack Behavior Association: From the perspective of the attack method, after a significant amount of Bitcoin was stolen from the LuBian mining pool due to a technical attack in 2020, it remained dormant for 4 years. During this period, there were only minimal dust transactions, accounting for less than one-ten-thousandth, until almost nothing was moved until the U.S. government fully took over in 2024. This behavior does not align with the typical hacker's nature of quickly cashing out for profit but rather resembles a precise operation orchestrated by a state-level hacker group. Analysis suggests that the U.S. government may have gained control of this batch of Bitcoin as early as December 2020.


IV. Impact and Recommendations


The impact of the 2020 LuBian mining pool hacker attack was profound, leading to the actual dissolution of the pool, with losses equivalent to over 90% of its total assets at the time. The stolen Bitcoin's current value has risen to $15 billion, highlighting the risk of price volatility amplification.


The LuBian mining pool incident exposed a systemic risk in the cryptocurrency toolchain related to random number generation. To mitigate similar vulnerabilities, the blockchain industry should employ Cryptographically Secure Pseudo-Random Number Generators (CSPRNGs), implement multi-layer defenses including multisig, cold storage, and regular audits, avoid custom private key generation algorithms, and integrate real-time on-chain monitoring and alert systems for abnormal transfers. For individual users, it is advisable to avoid using unverified key generation modules from open-source communities. This event also serves as a reminder that despite the high transparency of blockchain, weak security foundations can lead to disastrous consequences, highlighting the importance of cybersecurity in the future of the digital economy and digital currency development.


Original Source



Welcome to join the official BlockBeats community:

Telegram Subscription Group: https://t.me/theblockbeats

Telegram Discussion Group: https://t.me/BlockBeats_App

Official Twitter Account: https://twitter.com/BlockBeatsAsia

Choose Library
Add Library
Cancel
Finish
Add Library
Visible to myself only
Public
Save
Correction/Report
Submit