D.C. Power Broker Caught In Global Hacking Scandal - 1

Image by DC Studio, from Freepik

D.C. Power Broker Caught In Global Hacking Scandal

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

A Washington, D.C. power broker is entangled in a global hacking scandal, with U.S. prosecutors alleging that a lobbying campaign orchestrated cyberattacks on environmental activists, according to an exclusive Wall Street Journal (WSJ) report.

In a Rush? Here are the Quick Facts!

  • Operation Fox Hunt targeted environmentalists and opponents of Exxon Mobil.
  • Investigator Amit Forlit faces extradition on conspiracy and hacking charges.
  • Exxon denies involvement and cut ties with DCI in 2020.

Justin Peterson, a key player in the lobbying firm DCI Group, allegedly masterminded “Operation Fox Hunt” starting in 2015, with the goal of undermining opponents of the oil giant, as reported by WSJ.

Peterson, who has represented powerful entities like Exxon, Microsoft, and Walmart, is said to have hired Israeli private investigator Amit Forlit to conduct a covert operation.

WSJ reports that according to U.S. prosecutors, this involved hacking into the email accounts of environmental activists and other Exxon critics. In a 2015 email, Peterson referred to the plan, stating his desire to “operationalize the research on the bad guys.”

While Peterson has not been directly charged or accused of hacking, court documents detail his involvement in commissioning the illegal activities, reports WSJ.

These documents are part of an ongoing U.S. criminal case against Forlit, who faces charges of conspiracy to commit wire fraud and computer hacking. Forlit, arrested in London in 2024, is currently fighting extradition to the U.S.

Peterson’s firm, DCI Group, cooperated with authorities in 2020 but has since had no contact with prosecutors, according to a DCI spokesperson.

“No one at DCI directed or was involved in any hacking alleged to have occurred a decade ago,” the spokesperson stated, adding that the firm believes the hacking allegations are part of a larger conspiracy narrative by “radical anti-oil activists,” as reported by WSJ.

Exxon, which severed ties with DCI in 2020, also denied involvement in the alleged hacking. An Exxon spokesman condemned any hacking activities, stating, “If there was any hacking involved, we condemn it in the strongest possible terms,” reports WSJ.

Forlit’s alleged role in the hacking operation is tied to a campaign that began in 2015 as Exxon’s climate change controversies gained traction. The hacking effort, according to prosecutors, was designed to gather damaging information about environmental groups and leak it to the press or use it in litigation, said WSJ.

Forlit employed hackers based in India to breach email accounts, and the stolen information was allegedly shared with Peterson and Exxon. Lee Wasserman, director of the Rockefeller Family Fund, which was among the targets, expressed frustration with the slow pace of justice.

“The wheels of justice are turning awfully slowly in this case but it’s heartening to know they are still rolling toward accountability at the heart of these crimes,” he said, as reported by WSJ.

The case also sheds light on Peterson’s behind-the-scenes influence. A former member of President Trump’s Puerto Rico oversight board, Peterson’s business flourished under Trump’s presidency, said WSJ.

He worked on campaigns for major corporations and political figures, cementing his position as a key player in Washington’s power circles. WSJ reports that the investigation reveals a range of tactics employed by Peterson and Forlit, including the theft of private communications and the targeting of influential climate activists.

These actions were allegedly part of a broader strategy to discredit Exxon’s critics and shift public opinion in favor of the oil industry.

WSJ says that a U.K. court is expected to rule soon on the U.S. request to extradite Forlit. Meanwhile, the broader implications of Peterson’s actions continue to unfold, drawing attention to the murky intersection of lobbying, hacking, and corporate influence in today’s political landscape.

Infini Offers 20% Bounty And Immunity To Hacker For Stolen Funds - 2

Image by Kanchanara, from Unsplash

Infini Offers 20% Bounty And Immunity To Hacker For Stolen Funds

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

Infini’s founder, Christian Li, has once again reached out to the hacker responsible for the $49.5 million heist from the stablecoin digital bank’s wallets.

In a Rush? Here are the Quick Facts!

  • Infini offered a 20% bounty for the return of $49.5 million in stolen funds.
  • The hacker withdrew 49.5 million USDC and converted it into Ethereum.
  • Infini’s breach occurred due to a developer retaining admin rights in a smart contract.

In a recent blockchain transaction, Li sent 0.1 ETH to the hacker, reinforcing his earlier offer of a 20% bounty for the return of the stolen funds and legal immunity if the hacker cooperates, as reported by Crypto.news (CN).

Important update: We’ve identified critical info regarding the exploit and we’re monitoring involved addresses. pic.twitter.com/xqZwRYg4CS — Infini (@0xinfini) February 24, 2025

The hacker stole the funds on February 24, taking advantage of a vulnerability in Infini’s Ethereum-based protocol, as first reported by CertiK.

#CertiKInsight 🚨 We have seen suspicious transfers of funds from unverified contracts on Ethereum 0x9A79f4105A4e1A050Ba0b42F25351D394fA7E1DC The receiver 0x3ac96134fb0e42a52d33045aee50b89790f05ed0 took ~$49.5M and is swapping them for Dai Stay Vigilant! pic.twitter.com/MVXyn4fM9o — CertiK Alert (@CertiKAlert) February 24, 2025

CN says that Li’s outreach to the hacker is part of the bank’s ongoing efforts to recover the stolen funds, which were converted into Dai (DAI) and used to buy Ethereum (ETH). The stolen ETH was subsequently moved to a new wallet, raising concerns about the funds’ safety.

Li acknowledged the hacker’s technical ability in identifying the protocol vulnerability and reiterated the 20% bounty offer. He assured the hacker that no legal action would be taken if the funds were returned, as reported by CN.

Infini’s wallet was compromised when a developer, who had retained admin rights on the smart contract, exploited the system to drain the funds. The exploit has been linked to a compromised private key rather than a wallet vulnerability, says CN.

Infini co-founder promised customers that the bank would reimburse them for their losses and is working with law enforcement to ensure the hacker faces consequences, as noted by CN.

Blockchain.news (BN) The Infini hack is part of a growing trend of high-profile cryptocurrency thefts that continue to shake the industry. However, Infini’s response, offering a legal amnesty and financial reward for the hacker’s cooperation, reflects an evolving approach to handling such crises.

While this method might seem unconventional, it may help avoid prolonged investigations and prevent further damage to the company’s reputation.

In related news, the broader crypto market has been rocked by another significant hacking incident. The hacker responsible for stealing 499,000 ETH from Bybit is nearing the completion of selling off the stolen assets, as reported by BN.

As of March 3, only 60,000 ETH remains to be laundered, putting additional pressure on the Ethereum market. The rapid liquidation of these stolen funds has caused fluctuations in ETH prices, triggering a 2.8% drop in its value in just one hour, reported BN.

The surge in trading volumes and increased activity on decentralized exchanges (DEXs) reflect growing investor concern as the crypto community grapples with these security breaches, notes BN.

The Infini case and Bybit’s hack have brought attention to the challenges in securing digital assets and the increasing role of hackers in the crypto ecosystem.

As the situation unfolds, Infini’s commitment to recovering the stolen funds remains steadfast, with an emphasis on securing the platform and protecting users.