Notebookcheck Logo

Exchange's leaked code reveals intent to evade regulation, potentially aiding financial crime

Nobitex's leaked code reveals intent to evade regulation, potentially aiding financial crime. A person wearing the "Anonymous" mask pictured. (Image source: Robert Stump, via Unsplash)
Nobitex's leaked code reveals intent to evade regulation, potentially aiding financial crime. A person wearing the "Anonymous" mask pictured. (Image source: Robert Stump, via Unsplash)
A recent report from TRM Labs has shed light on the inner workings of Nobitex, Iran's largest cryptocurrency exchange. TRM’s analysis revealed that the platform was built with obfuscation tools, VIP bypass logic, and deep integration into Iran’s restricted banking system — raising serious concerns about the intent behind its design.

In the aftermath of a politically motivated hack that drained $90 million from its wallets, an even more significant security breach hit the Iranian crypto exchange Nobitex — the public leak of its entire source code. An analysis of this code by blockchain intelligence firm TRM Labs revealed a platform built not just for trading, but as a sophisticated instrument for operating under the radar of global financial regulations.

The code revealed that Nobitex had been designed with a suite of custom anti-surveillance modules created specifically to undermine the blockchain analysis tools used by compliance teams and regulators. According to a leaked internal privacy memo, the explicit goal of these tools was to evade detection by US authorities like FinCEN by anonymizing transactions and obscuring user identities.

Here is all TRM Labs found:

  • Segmented wallet infrastructure. The leaked source code revealed a multi-layered wallet architecture, separating hot and cold wallets across internally routed servers. While designed for scale, the segmentation has potential weaknesses that could be exploited by attackers.
  • Integration with Iran's domestic banking system. Nobitex was deeply embedded within Iran's fiat payment ecosystem, with live API credentials for platforms like Shetab, Pay.ir, Vandar, and IDPay. This integration enables real-time fiat deposits, withdrawals, and account verification, potentially allowing users to bypass international banking sanctions.
  • Privacy engineering. The exchange's developers prioritized privacy, implementing anti-surveillance modules like owshen, zpk, and incentivized mixer to undermine blockchain intelligence. These tools introduced stealth address generation, transaction batching, and real-time endpoint switching to evade detection.
  • VIP user logic. Internal documentation showed that VIP users were routed through privileged logic that bypassed standard compliance checks, potentially insulating politically sensitive or sanctioned users from scrutiny.

The report concluded that the exchange’s modular design made it a forkable, “plug-and-play” blueprint for other rogue operators, raising the risk of its architecture being duplicated in other sanctioned jurisdictions.

Source(s)

static version load dynamic
Loading Comments
Comment on this article
Please share our article, every link counts!
Mail Logo
> Expert Reviews and News on Laptops, Smartphones and Tech Innovations > News > News Archive > Newsarchive 2025 07 > Exchange's leaked code reveals intent to evade regulation, potentially aiding financial crime
Chibuike Okpara, 2025-07- 2 (Update: 2025-07- 2)