Binance Square
ScamRiskWarning
5.6M показвания
1,642 Публикации
Популярни
Последни
LIVE
0x8o0M
--
Bias antara Tron & Ton sebagai umpan pengelabuan dan mereka akan berdalih "Eligible Procedure"... 🫣 BullSh!t 👀 Sudahlah, lupakan mengerjakan semua AirDrop untuk setiap akhir tahun karena biasanya mereka scammer 😁 contoh nyata 👉 #REVOXAIRDROP yang jelas-jelas peserta BNBCHAIN CATALYST AWARDS itu SCAM ! puihhh.... @revox hanya menjual data penggunanya ke pihak ketiga untuk keuntungan sendiri. 🤔 #ScamRiskWarning #CristmasMarketAnalysis
Bias antara Tron & Ton sebagai umpan pengelabuan dan mereka akan berdalih "Eligible Procedure"... 🫣 BullSh!t 👀
Sudahlah, lupakan mengerjakan semua AirDrop untuk setiap akhir tahun karena biasanya mereka scammer 😁 contoh nyata 👉 #REVOXAIRDROP yang jelas-jelas peserta BNBCHAIN CATALYST AWARDS itu SCAM ! puihhh.... @REVOX hanya menjual data penggunanya ke pihak ketiga untuk keuntungan sendiri. 🤔

#ScamRiskWarning #CristmasMarketAnalysis
LIVE
Crypto Scoop
--
🚨 Beware: The Truth About Tronkeeper Scams! 🚨

Have you seen posts about claiming rewards on platforms like Tronkeeper? It might look tempting, but let’s break it down and uncover the truth behind their claims.

What They’re Saying:

According to their post:
1️⃣ Enter your USDT (TRC20) wallet and submit.
2️⃣ Pay a fee to claim your rewards, supposedly to cover "blockchain transfer costs."
They claim these fees are necessary to maintain smooth transactions for "millions of users."

Sounds professional, right? 🤔 But there’s a catch, and users have started exposing it!

What Users Are Exposing:

🔹 Fee Mismatch: They demand 5 TON as a "gas fee" for withdrawing your $200. But here’s the issue—TON and TRON are two completely different blockchains! They cannot use TON to cover gas fees on TRON. This technical inconsistency screams red flag.

🔹 Community Feedback:
▪︎You want me to pay 5 TON to withdraw $200? That makes no sense!

▪︎If it’s legitimate, deduct the fee from my balance instead of asking for more money.

▪︎Anything that requires paying money to receive money is pure scam behavior.

Why This is Dangerous

1️⃣ No Guarantee of Payouts: Once you send your money, it’s unlikely you’ll ever see your rewards.
2️⃣ Exploiting Trust: Scammers use technical jargon to confuse users into thinking it’s a legitimate transaction.
3️⃣ Loss of Funds: People spend time and effort accumulating these so-called rewards, only to be asked for fees they cannot recover.

How to Protect Yourself

🚨 Do Your Research: Always verify the platform’s credibility.
🚨 Understand Blockchain Basics: TON and TRON are different; knowing this can help you spot inconsistencies.
🚨 Avoid Upfront Payments: If you need to send money to receive money, it’s likely a scam.

Final Thought:

These scammers rely on trust and confusion to exploit users. Stay informed, share this knowledge, and protect yourself from falling for their tricks! 💡

⚠️ Share this post to warn others!💪#scamriskwarning
💡QUICK TIP TO AVOID BEING ABUSED BY AIRDROPS💡 Exit from all airdrops that: - Contain alot of $TON transactions. - Change their toknomics. - Has youtubers/influencers involvment in advertisement. - Delaying dates (especially when the market is in bullish trend) - Has plans to launch exchange. A question that is being emphasized by influencers or in your own head you think that "Airdrops giveaways are free so why dont we just keep patience and keep farming?". This is the trickiest yet easiest riddle to solve but people don't pay attention. They just want you to keep playing their airdrops while they play with you by dropping $TON transactions, delaying dates till they gain enough popularity to make deals with bigger projects, companies and exchanges. Only youtubers/influencers and the project's team benefit from this not you! Take your time and think through before joining any airdrop. Your time is precious as gold, do not give it away for free. #scamriskwarning #ScamAwareness #AirdropAlert #AirdropScam
💡QUICK TIP TO AVOID BEING ABUSED BY AIRDROPS💡

Exit from all airdrops that:

- Contain alot of $TON transactions.
- Change their toknomics.
- Has youtubers/influencers involvment in advertisement.
- Delaying dates (especially when the market is in bullish trend)
- Has plans to launch exchange.

A question that is being emphasized by influencers or in your own head you think that "Airdrops giveaways are free so why dont we just keep patience and keep farming?".

This is the trickiest yet easiest riddle to solve but people don't pay attention.

They just want you to keep playing their airdrops while they play with you by dropping $TON transactions, delaying dates till they gain enough popularity to make deals with bigger projects, companies and exchanges.

Only youtubers/influencers and the project's team benefit from this not you!

Take your time and think through before joining any airdrop.

Your time is precious as gold, do not give it away for free.

#scamriskwarning #ScamAwareness #AirdropAlert #AirdropScam
#scamriskwarning #BtcNewHolder Bitcoin and Crypto Markets Dip As North Korean Hacking Threat Triggers $112,000,000 in Outflows From Hyperliquid At the tail end of the weekend, well-known blockchain security expert Taylor Monahan who works for crypto wallet MetaMask reported that several addresses linked to the DPRK were trading on Hyperliquid, a decentralized perpetuals exchange with its own chain. Monahan said the North Koreans were likely testing out the network before considering it as a target for their next attack. In its Discord channel, Hyperliquid disagreed with Monahan’s analysis and said that there was no threat from the DPRK. “We are aware of reports circulating regarding activity by supposed DPRK addresses. There has been no DPRK exploit – or any exploit for that matter – of Hyperliquid. All user funds are accounted for. Hyperliquid Labs takes opsec seriously. No vulnerabilities have been shared by any party.” However, HYPE, Hyperliquid’s native token, dropped nearly 20% while the exchange suffered nearly $113 million in stablecoin outflows, according to blockchain analytics platform Dune. HYPE has since stabilized and is currently trading at $26.75 with a market cap of $9.1 billion, and it’s correction is more or less in line with the rest of the crypto markets. Earlier this month, the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) said it was dismantling North Korea’s digital asset money laundering network by sanctioning Chinese nationals Lu Huaying and Zhang Jian who used a front company in the United Arab Emirates (UAE) to launder illicit money and convert crypto funds for the DPRK. Says Acting Under Secretary of the Treasury for Terrorism and Financial Intelligence Bradley T. Smith, “As the DPRK continues to use complex criminal schemes to fund its WMD and ballistic missile programs—including through the exploitation of digital assets—Treasury remains focused on disrupting the networks that facilitate this flow of funds to the regime.” More interesting news – subscribe $BTC
#scamriskwarning #BtcNewHolder

Bitcoin and Crypto Markets Dip As North Korean Hacking Threat Triggers $112,000,000 in Outflows From Hyperliquid

At the tail end of the weekend, well-known blockchain security expert Taylor Monahan who works for crypto wallet MetaMask reported that several addresses linked to the DPRK were trading on Hyperliquid, a decentralized perpetuals exchange with its own chain.
Monahan said the North Koreans were likely testing out the network before considering it as a target for their next attack.
In its Discord channel, Hyperliquid disagreed with Monahan’s analysis and said that there was no threat from the DPRK.
“We are aware of reports circulating regarding activity by supposed DPRK addresses. There has been no DPRK exploit – or any exploit for that matter – of Hyperliquid. All user funds are accounted for. Hyperliquid Labs takes opsec seriously. No vulnerabilities have been shared by any party.”
However, HYPE, Hyperliquid’s native token, dropped nearly 20% while the exchange suffered nearly $113 million in stablecoin outflows, according to blockchain analytics platform Dune.
HYPE has since stabilized and is currently trading at $26.75 with a market cap of $9.1 billion, and it’s correction is more or less in line with the rest of the crypto markets.
Earlier this month, the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) said it was dismantling North Korea’s digital asset money laundering network by sanctioning Chinese nationals Lu Huaying and Zhang Jian who used a front company in the United Arab Emirates (UAE) to launder illicit money and convert crypto funds for the DPRK.
Says Acting Under Secretary of the Treasury for Terrorism and Financial Intelligence Bradley T. Smith,
“As the DPRK continues to use complex criminal schemes to fund its WMD and ballistic missile programs—including through the exploitation of digital assets—Treasury remains focused on disrupting the networks that facilitate this flow of funds to the regime.”

More interesting news – subscribe

$BTC
🚨 Beware: The Truth About Tronkeeper Scams! 🚨 Have you seen posts about claiming rewards on platforms like Tronkeeper? It might look tempting, but let’s break it down and uncover the truth behind their claims. What They’re Saying: According to their post: 1️⃣ Enter your USDT (TRC20) wallet and submit. 2️⃣ Pay a fee to claim your rewards, supposedly to cover "blockchain transfer costs." They claim these fees are necessary to maintain smooth transactions for "millions of users." Sounds professional, right? 🤔 But there’s a catch, and users have started exposing it! What Users Are Exposing: 🔹 Fee Mismatch: They demand 5 TON as a "gas fee" for withdrawing your $200. But here’s the issue—TON and TRON are two completely different blockchains! They cannot use TON to cover gas fees on TRON. This technical inconsistency screams red flag. 🔹 Community Feedback: ▪︎You want me to pay 5 TON to withdraw $200? That makes no sense! ▪︎If it’s legitimate, deduct the fee from my balance instead of asking for more money. ▪︎Anything that requires paying money to receive money is pure scam behavior. Why This is Dangerous 1️⃣ No Guarantee of Payouts: Once you send your money, it’s unlikely you’ll ever see your rewards. 2️⃣ Exploiting Trust: Scammers use technical jargon to confuse users into thinking it’s a legitimate transaction. 3️⃣ Loss of Funds: People spend time and effort accumulating these so-called rewards, only to be asked for fees they cannot recover. How to Protect Yourself 🚨 Do Your Research: Always verify the platform’s credibility. 🚨 Understand Blockchain Basics: TON and TRON are different; knowing this can help you spot inconsistencies. 🚨 Avoid Upfront Payments: If you need to send money to receive money, it’s likely a scam. Final Thought: These scammers rely on trust and confusion to exploit users. Stay informed, share this knowledge, and protect yourself from falling for their tricks! 💡 ⚠️ Share this post to warn others!💪#scamriskwarning
🚨 Beware: The Truth About Tronkeeper Scams! 🚨

Have you seen posts about claiming rewards on platforms like Tronkeeper? It might look tempting, but let’s break it down and uncover the truth behind their claims.

What They’re Saying:

According to their post:
1️⃣ Enter your USDT (TRC20) wallet and submit.
2️⃣ Pay a fee to claim your rewards, supposedly to cover "blockchain transfer costs."
They claim these fees are necessary to maintain smooth transactions for "millions of users."

Sounds professional, right? 🤔 But there’s a catch, and users have started exposing it!

What Users Are Exposing:

🔹 Fee Mismatch: They demand 5 TON as a "gas fee" for withdrawing your $200. But here’s the issue—TON and TRON are two completely different blockchains! They cannot use TON to cover gas fees on TRON. This technical inconsistency screams red flag.

🔹 Community Feedback:
▪︎You want me to pay 5 TON to withdraw $200? That makes no sense!

▪︎If it’s legitimate, deduct the fee from my balance instead of asking for more money.

▪︎Anything that requires paying money to receive money is pure scam behavior.

Why This is Dangerous

1️⃣ No Guarantee of Payouts: Once you send your money, it’s unlikely you’ll ever see your rewards.
2️⃣ Exploiting Trust: Scammers use technical jargon to confuse users into thinking it’s a legitimate transaction.
3️⃣ Loss of Funds: People spend time and effort accumulating these so-called rewards, only to be asked for fees they cannot recover.

How to Protect Yourself

🚨 Do Your Research: Always verify the platform’s credibility.
🚨 Understand Blockchain Basics: TON and TRON are different; knowing this can help you spot inconsistencies.
🚨 Avoid Upfront Payments: If you need to send money to receive money, it’s likely a scam.

Final Thought:

These scammers rely on trust and confusion to exploit users. Stay informed, share this knowledge, and protect yourself from falling for their tricks! 💡

⚠️ Share this post to warn others!💪#scamriskwarning
Giovanna Rolstad vHcc:
Thanks for the info
Blum🍋🍋🤪 So, here’s my new record in Blum! A Christmas event is currently underway, so if you believe in Blum or, like me, play out of boredom, this is your chance to beat my record! #Blum #BlumRecord #ScamRiskWarning
Blum🍋🍋🤪
So, here’s my new record in Blum!
A Christmas event is currently underway, so if you believe in Blum or, like me, play out of boredom, this is your chance to beat my record!

#Blum #BlumRecord #ScamRiskWarning
--
Бичи
🚨 Nigerian Crypto-Romance Scams: A Wake-Up Call 🚨 🌴 Cairns Romance Scam: 60yo Woman Loses $200k to Online Fraudster 😱 💔 Scam Details: - 60-year-old woman from Cairns, Australia, met a scammer on a dating app 💘 - Scammer posed as a US soldier, gained her trust, and asked for crypto investments 💸 - Woman lost $200,000 to the scammer, leaving her financially devastated 😢 📊 Alarming Stats: - 1 in 5 Australians have been targeted by romance scams 📊 - $200 million lost to romance scams in Australia in 2022 💸 - Nigerian crypto-romance scams are on the rise, targeting vulnerable individuals worldwide 🌎 🚫 Red Flags: - Unrealistic or generic profiles 💔 - Quick requests for crypto or financial info 🚨 - Poor grammar or inconsistent communication 📝 🔒 Protect Yourself: - Verify profiles and research potential partners 🔍 - Never send crypto or financial info to strangers 🚫 - Use reputable dating apps/sites and report suspicious activity 📊 🤝 Report Scams: - File a complaint with the Australian Competition and Consumer Commission (ACCC) or local authorities 📊 - Share your story to help others avoid similar scams 💬 Stay vigilant and prioritize your online safety! 💻🔒 $BTC {spot}(BTCUSDT) $COMP {spot}(COMPUSDT) $NEXO {spot}(NEXOUSDT) #BinanceLaunchpoolBIO #BinanceAlphaAlert #MicroStrategyInNasdaq100 #scamriskwarning #Write2Earn
🚨 Nigerian Crypto-Romance Scams: A Wake-Up Call 🚨

🌴 Cairns Romance Scam: 60yo Woman Loses $200k to Online Fraudster 😱

💔 Scam Details:

- 60-year-old woman from Cairns, Australia, met a scammer on a dating app 💘
- Scammer posed as a US soldier, gained her trust, and asked for crypto investments 💸
- Woman lost $200,000 to the scammer, leaving her financially devastated 😢

📊 Alarming Stats:

- 1 in 5 Australians have been targeted by romance scams 📊
- $200 million lost to romance scams in Australia in 2022 💸
- Nigerian crypto-romance scams are on the rise, targeting vulnerable individuals worldwide 🌎

🚫 Red Flags:

- Unrealistic or generic profiles 💔
- Quick requests for crypto or financial info 🚨
- Poor grammar or inconsistent communication 📝

🔒 Protect Yourself:

- Verify profiles and research potential partners 🔍
- Never send crypto or financial info to strangers 🚫
- Use reputable dating apps/sites and report suspicious activity 📊

🤝 Report Scams:

- File a complaint with the Australian Competition and Consumer Commission (ACCC) or local authorities 📊
- Share your story to help others avoid similar scams 💬

Stay vigilant and prioritize your online safety! 💻🔒

$BTC
$COMP
$NEXO
#BinanceLaunchpoolBIO #BinanceAlphaAlert #MicroStrategyInNasdaq100 #scamriskwarning #Write2Earn
Critical Analysis of the "Act I: The AI Prophecy" ($ACT) Project: Scam or Not?$SOL {spot}(SOLUSDT) The cryptocurrency market has recently witnessed significant controversy surrounding the legitimacy of the "Act I: The AI Prophecy" ($ACT) token. The token faces accusations of being a scam. In this article, we provide a comprehensive analysis of the project based on the available evidence, offering a critical review supported by credible sources. 1. Allegations and Accusations: 1.1 Intellectual Property Theft Allegations: According to "Cyborgism Wiki," the $ACT project is accused of appropriating ideas and trademarks from an original developer who had withdrawn from the project. These claims suggest unauthorized use of the original project's materials. Source: Cyborgism Wiki - ACT 1.2 Fraud Allegations: Reports circulating on social media platforms and cryptocurrency forums like "Bitcointalk" claim that the project team comprises individuals with unclear backgrounds, raising further doubts about their intentions. Source: Bitcointalk Forum$XRP {spot}(XRPUSDT) 2. Project Analysis: 2.1 Official Documents and Future Plans: Whitepaper: A review of the project's technical document reveals that the provided information is vague, lacking clear technical details or a roadmap.Source: Whitepaper of the $ACT project (Note: The link to the whitepaper should be verified directly from the project website or trusted forums).Lack of Transparency: No information is available regarding the founding team or their professional backgrounds. 2.2 Financial Activities and Suspicious Practices: Sudden Price Surge: As reported by "Crypto Times," the token experienced an unjustified 2000% price surge after being listed on Binance, raising concerns about potential market manipulation.Source: Crypto TimesRandom Token Distribution: Several reports highlight that users received large quantities of the token unsolicited, a common tactic used to deceive investors.Source: CoinDesk 3. Community Warnings and Independent Sources: Cryptocurrency Forums: On forums like "Gate.io," users have described the token as fraudulent, citing the absence of real utility or sustainable development.Source: Gate.io ForumExpert Reports: No reputable institutions have released reports endorsing the project’s credibility.Source: Bitcoin Magazine 4. Criteria for Identifying Scams: To determine whether the project is a scam, its behaviors were compared to common scam patterns: Unrealistic Returns Promises: There is no tangible product or service supporting the promised outcomes.Source: CoinTelegraphLack of Transparency: The founding team remains anonymous, and there are no clear plans for the future.Source: DecryptSuspicious Market Activities: Evident market manipulation and sudden price increases.Source: CryptoSlate Conclusion and Recommendations: Based on the available evidence, "Act I: The AI Prophecy" ($ACT) exhibits all signs indicative of being a scam: Lack of transparency.Intellectual property theft allegations.Unjustified and suspicious activities. Recommendation: Investors are advised to avoid this token unless independent reports and analyses substantiate its credibility. Caution should always be exercised when dealing with cryptocurrency projects that lack transparency and reliability. References: Solscan Token Overview: Solscan Token OverviewCyborgism Wiki - ACT: Cyborgism Wiki - ACTCrypto Times: Crypto TimesBitcointalk Forum: Bitcointalk ForumGate.io Forum: Gate.io ForumBitcoin Magazine: Bitcoin MagazineCoinDesk: CoinDeskCoinTelegraph: CoinTelegraphDecrypt: DecryptCryptoSlate: CryptoSlate #BinanceSquareFamily #ACTCoin #altsesaon #ScamRiskWarning #BTCNextMove

Critical Analysis of the "Act I: The AI Prophecy" ($ACT) Project: Scam or Not?

$SOL

The cryptocurrency market has recently witnessed significant controversy surrounding the legitimacy of the "Act I: The AI Prophecy" ($ACT) token. The token faces accusations of being a scam. In this article, we provide a comprehensive analysis of the project based on the available evidence, offering a critical review supported by credible sources.
1. Allegations and Accusations:
1.1 Intellectual Property Theft Allegations:
According to "Cyborgism Wiki," the $ACT project is accused of appropriating ideas and trademarks from an original developer who had withdrawn from the project. These claims suggest unauthorized use of the original project's materials.
Source: Cyborgism Wiki - ACT
1.2 Fraud Allegations:
Reports circulating on social media platforms and cryptocurrency forums like "Bitcointalk" claim that the project team comprises individuals with unclear backgrounds, raising further doubts about their intentions.
Source: Bitcointalk Forum$XRP 2. Project Analysis:
2.1 Official Documents and Future Plans:
Whitepaper: A review of the project's technical document reveals that the provided information is vague, lacking clear technical details or a roadmap.Source: Whitepaper of the $ACT project (Note: The link to the whitepaper should be verified directly from the project website or trusted forums).Lack of Transparency: No information is available regarding the founding team or their professional backgrounds.
2.2 Financial Activities and Suspicious Practices:
Sudden Price Surge: As reported by "Crypto Times," the token experienced an unjustified 2000% price surge after being listed on Binance, raising concerns about potential market manipulation.Source: Crypto TimesRandom Token Distribution: Several reports highlight that users received large quantities of the token unsolicited, a common tactic used to deceive investors.Source: CoinDesk
3. Community Warnings and Independent Sources:
Cryptocurrency Forums: On forums like "Gate.io," users have described the token as fraudulent, citing the absence of real utility or sustainable development.Source: Gate.io ForumExpert Reports: No reputable institutions have released reports endorsing the project’s credibility.Source: Bitcoin Magazine
4. Criteria for Identifying Scams:
To determine whether the project is a scam, its behaviors were compared to common scam patterns:
Unrealistic Returns Promises: There is no tangible product or service supporting the promised outcomes.Source: CoinTelegraphLack of Transparency: The founding team remains anonymous, and there are no clear plans for the future.Source: DecryptSuspicious Market Activities: Evident market manipulation and sudden price increases.Source: CryptoSlate
Conclusion and Recommendations:
Based on the available evidence, "Act I: The AI Prophecy" ($ACT) exhibits all signs indicative of being a scam:
Lack of transparency.Intellectual property theft allegations.Unjustified and suspicious activities.
Recommendation: Investors are advised to avoid this token unless independent reports and analyses substantiate its credibility. Caution should always be exercised when dealing with cryptocurrency projects that lack transparency and reliability.
References:
Solscan Token Overview: Solscan Token OverviewCyborgism Wiki - ACT: Cyborgism Wiki - ACTCrypto Times: Crypto TimesBitcointalk Forum: Bitcointalk ForumGate.io Forum: Gate.io ForumBitcoin Magazine: Bitcoin MagazineCoinDesk: CoinDeskCoinTelegraph: CoinTelegraphDecrypt: DecryptCryptoSlate: CryptoSlate

#BinanceSquareFamily

#ACTCoin

#altsesaon

#ScamRiskWarning

#BTCNextMove
Kiara Driever OoXd:
i see the team in x make so good he is working
#ScamRiskWarning Treasury Department Disrupts North Korean Crypto Money Laundering Operation Using UAE-Based Shell Company The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) says it is dismantling North Korea’s digital asset money laundering network by taking action against individuals and entities involved in the operation. In a statement, the OFAC says it is sanctioning Chinese nationals Lu Huaying and Zhang Jian who worked for the network that used a front company in the United Arab Emirates (UAE) to launder illicit money and convert crypto funds for North Korea. The OFAC says the Hermit Kingdom is using agents and proxies to access the international financial system and engage in illicit revenue generation schemes such as conducting fraudulent IT work and stealing digital assets. The agency says representatives set up shell companies and manage bank accounts to move and disguise funds that will be used to finance North Korea’s unlawful weapons of mass destruction (WMD) and ballist1c missile programs. Says Acting Under Secretary of the Treasury for Terrorism and Financial Intelligence Bradley T. Smith, “As the DPRK continues to use complex criminal schemes to fund its WMD and ballist1c missile programs—including through the exploitation of digital assets—Treasury remains focused on disrupting the networks that facilitate this flow of funds to the regime.” The OFAC says Lu cashed out crypto from North Korea’s revenue-generation projects into fiat on behalf of the OFAC-sanctioned Sim Hyon Sop, who leads the laundering network. Zhang helped facilitate the exchange of fiat currency and served as a courier for Sim. The OFAC is also sanctioning Green Alpine Trading, the UAE-based shell company used by the laundering network. More interesting news – subscribe – I will be grateful for tips $USDC
#ScamRiskWarning

Treasury Department Disrupts North Korean Crypto Money Laundering Operation Using UAE-Based Shell Company

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) says it is dismantling North Korea’s digital asset money laundering network by taking action against individuals and entities involved in the operation.
In a statement, the OFAC says it is sanctioning Chinese nationals Lu Huaying and Zhang Jian who worked for the network that used a front company in the United Arab Emirates (UAE) to launder illicit money and convert crypto funds for North Korea.
The OFAC says the Hermit Kingdom is using agents and proxies to access the international financial system and engage in illicit revenue generation schemes such as conducting fraudulent IT work and stealing digital assets.
The agency says representatives set up shell companies and manage bank accounts to move and disguise funds that will be used to finance North Korea’s unlawful weapons of mass destruction (WMD) and ballist1c missile programs.
Says Acting Under Secretary of the Treasury for Terrorism and Financial Intelligence Bradley T. Smith,
“As the DPRK continues to use complex criminal schemes to fund its WMD and ballist1c missile programs—including through the exploitation of digital assets—Treasury remains focused on disrupting the networks that facilitate this flow of funds to the regime.”
The OFAC says Lu cashed out crypto from North Korea’s revenue-generation projects into fiat on behalf of the OFAC-sanctioned Sim Hyon Sop, who leads the laundering network.
Zhang helped facilitate the exchange of fiat currency and served as a courier for Sim.
The OFAC is also sanctioning Green Alpine Trading, the UAE-based shell company used by the laundering network.

More interesting news – subscribe – I will be grateful for tips

$USDC
--
LIVE
TIGRE_48
--
Esta navidad 🎄 , trae muchos regalos 🥳🎁 .

Pero también muchas estafas 👮‍♂️🚓🚨 .

Por eso te recordamos ✍️ ( Ten cuidado ⚠️ )

✋ No participes de cualquier sorteo 🚫

✋ No compartas tu información 🚫

👮‍♂️ Las empresas no te escriben al privado para regalarle dinero ( son estafadores ) 🚓🚨.

#StaySafeInTheCryptoWorld
#ScamT48
#ScamRiskWarning Crypto Platforms Suffered $2,200,000,000 in Losses From Hacks in 2024 Leading blockchain data analysis firm Chainalysis says hackers stole over $2 billion from crypto platforms this year. Even more alarming, according to the Chainalysis report, stolen funds saw more than a 20% increase from 2023. “Crypto hacking remains a persistent threat, with four years in the past decade individually seeing more than a billion dollars worth of crypto stolen (2018, 2021, 2022, and 2023). 2024 marks the fifth year to reach this troubling milestone, highlighting how, as crypto adoption and prices rise, so too does the amount that can be stolen. In 2024, funds stolen increased by approximately 21.07% year-over-year (YoY) to $2.2 billion, and the number of individual hacking incidents increased from 282 in 2023 to 303 in 2024.” Curiously, however, Chainalysis notes that hacking has slowed dramatically in the second half of 2024. “In our mid-year crime update, we noted that cumulative value stolen between January 2024 and July 2024 had already reached $1.58 billion, approximately 84.4% higher than the value stolen over the same period in 2023… However, 2024’s upward trend slowed considerably after July, after which it remained relatively steady.” Despite the slowdown, Chainalysis also reveals a daunting fact: North Korean hackers stole more crypto in 2024 than ever before. “In 2023, North Korea-affiliated hackers stole approximately $660.50 million across 20 incidents; in 2024, this number increased to $1.34 billion stolen across 47 incidents — a 102.88% increase in value stolen. These figures represent 61% of the total amount stolen for the year, and 20% of total incidents.” More interesting news – subscribe – I will be grateful for tips $USDC
#ScamRiskWarning

Crypto Platforms Suffered $2,200,000,000 in Losses From Hacks in 2024

Leading blockchain data analysis firm Chainalysis says hackers stole over $2 billion from crypto platforms this year.
Even more alarming, according to the Chainalysis report, stolen funds saw more than a 20% increase from 2023.
“Crypto hacking remains a persistent threat, with four years in the past decade individually seeing more than a billion dollars worth of crypto stolen (2018, 2021, 2022, and 2023). 2024 marks the fifth year to reach this troubling milestone, highlighting how, as crypto adoption and prices rise, so too does the amount that can be stolen.
In 2024, funds stolen increased by approximately 21.07% year-over-year (YoY) to $2.2 billion, and the number of individual hacking incidents increased from 282 in 2023 to 303 in 2024.”

Curiously, however, Chainalysis notes that hacking has slowed dramatically in the second half of 2024.
“In our mid-year crime update, we noted that cumulative value stolen between January 2024 and July 2024 had already reached $1.58 billion, approximately 84.4% higher than the value stolen over the same period in 2023…
However, 2024’s upward trend slowed considerably after July, after which it remained relatively steady.”
Despite the slowdown, Chainalysis also reveals a daunting fact: North Korean hackers stole more crypto in 2024 than ever before.
“In 2023, North Korea-affiliated hackers stole approximately $660.50 million across 20 incidents; in 2024, this number increased to $1.34 billion stolen across 47 incidents — a 102.88% increase in value stolen. These figures represent 61% of the total amount stolen for the year, and 20% of total incidents.”

More interesting news – subscribe – I will be grateful for tips

$USDC
#CrudoProtocol RED FLAG Ola todos. Hoje estava a dar a minha volta pelos meus airdrops, investimentos e carteiras quando de repente me deparei com uma mensagem no grupo da Crudo Protocol a dizer que o token já não iria ser lançado até ao dia 31 de Dezembro. Foi explicado que eram necessários mais fundos para ter parcerias maiores com exchanges maiores. Ora foi colocado num chat da equipa Crudo Protocol uma poll para que os membros se pronunciassem sobre o adiamento do lançamento do token (uma votação bastante suspeita) onde claro, por larga maioria as pessoas até entenderam e pareciam quase felizes até . 😅 SABEM AQUELA BANDEIRA VERMELHA ? Pois. Eu apenas disse que era de esperar porque a pré-venda não tinha terminado e que o erro tinha sido prometer algo que tão básico de compreendet como: Se não terminam os estágios de pré-venda não podem cumprir a promessa de plano de investimento . Eu tenho 20$ de crudo e nem me importava nada que o token saísse mais tarde mas por dizer que foi errado andar a vender sob promessa de honra e que o lançamento seria até 31 de Dezembro não importava quais os estágios de pre venda nem condições do mercado existissem... FUI BANIDO. E isso é uma grande #REDFLAG Sinto pena e quem meteu milhares á espera de ter um retorno este ano honestamente. De resto, quem lia essa narrativa de sai em que condições forem até 31 de dezembro já desconfiava, por isso, apenas investi 20$ Fujam de projetos de equipas anónimas e se virem o historial das carteiras que criaram o Token na rede BNB logo e percebe que algo não está certo. NÃO PERCA O SEU DINHEIRO 💶 OS MEMBROS ESTÃO A SER EXPULSOS DOS GRUPOS E A NARRARIVA DO HÁ SCAMMERS A AGIREM POR NÓS JÁ APARECEU. (Prints atached) #Crudo #CrudoProtocol #ScamRiskWarning
#CrudoProtocol RED FLAG

Ola todos.
Hoje estava a dar a minha volta pelos meus airdrops, investimentos e carteiras quando de repente me deparei com uma mensagem no grupo da Crudo Protocol a dizer que o token já não iria ser lançado até ao dia 31 de Dezembro.

Foi explicado que eram necessários mais fundos para ter parcerias maiores com exchanges maiores.

Ora foi colocado num chat da equipa Crudo Protocol uma poll para que os membros se pronunciassem sobre o adiamento do lançamento do token (uma votação bastante suspeita) onde claro, por larga maioria as pessoas até entenderam e pareciam quase felizes até . 😅

SABEM AQUELA BANDEIRA VERMELHA ?

Pois. Eu apenas disse que era de esperar porque a pré-venda não tinha terminado e que o erro tinha sido prometer algo que tão básico de compreendet como:

Se não terminam os estágios de pré-venda não podem cumprir a promessa de plano de investimento .

Eu tenho 20$ de crudo e nem me importava nada que o token saísse mais tarde mas por dizer que foi errado andar a vender sob promessa de honra e que o lançamento seria até 31 de Dezembro não importava quais os estágios de pre venda nem condições do mercado existissem...

FUI BANIDO.
E isso é uma grande #REDFLAG

Sinto pena e quem meteu milhares á espera de ter um retorno este ano honestamente.

De resto, quem lia essa narrativa de sai em que condições forem até 31 de dezembro já desconfiava, por isso, apenas investi 20$

Fujam de projetos de equipas anónimas e se virem o historial das carteiras que criaram o Token na rede BNB logo e percebe que algo não está certo.

NÃO PERCA O SEU DINHEIRO 💶

OS MEMBROS ESTÃO A SER EXPULSOS DOS GRUPOS E A NARRARIVA DO HÁ SCAMMERS A AGIREM POR NÓS JÁ APARECEU. (Prints atached)

#Crudo #CrudoProtocol #ScamRiskWarning
--
Бичи
🚨BREAKING NEWS: ANTHROPICAI'S X ACCOUNT HACKED, POSTS RUG PULL SCAM. #scamriskwarning
🚨BREAKING NEWS: ANTHROPICAI'S X ACCOUNT HACKED, POSTS RUG PULL SCAM.
#scamriskwarning
🚨 Stay Alert: Beware of Fake Airdrops! 🚨Scammers: "Claim free tokens! Just send us your wallet keys or pay a small fee!" 🪙✨ You: "Free tokens? Sounds amazing!" 5 minutes later: "Why is my wallet empty? 😱" How Fake Airdrops Work: 1️⃣ Too-Good-to-Be-True Promises – Flashy posts claiming "Exclusive Airdrops!" 2️⃣ Suspicious Links – Direct you to shady websites or forms. 3️⃣ Scam Requests – Asking for your private keys or a small "processing fee." 4️⃣ Poof! – Your wallet is drained faster than you can say "blockchain." How to Protect Yourself: 🚫 Never share your private keys or seed phrases. 🛑 Real airdrops never require upfront fees. ✅ Always verify announcements from official sources. #FreeAirDrop #scamriskwarning #beaware #FakeAirdrops Don't let scammers "take" your funds! Stay safe and protect your wallet. 💪 $BNB $TON

🚨 Stay Alert: Beware of Fake Airdrops! 🚨

Scammers: "Claim free tokens! Just send us your wallet keys or pay a small fee!" 🪙✨
You: "Free tokens? Sounds amazing!"
5 minutes later: "Why is my wallet empty? 😱"

How Fake Airdrops Work:

1️⃣ Too-Good-to-Be-True Promises – Flashy posts claiming "Exclusive Airdrops!"
2️⃣ Suspicious Links – Direct you to shady websites or forms.
3️⃣ Scam Requests – Asking for your private keys or a small "processing fee."
4️⃣ Poof! – Your wallet is drained faster than you can say "blockchain."

How to Protect Yourself:

🚫 Never share your private keys or seed phrases.
🛑 Real airdrops never require upfront fees.
✅ Always verify announcements from official sources.
#FreeAirDrop #scamriskwarning #beaware #FakeAirdrops
Don't let scammers "take" your funds! Stay safe and protect your wallet. 💪
$BNB
$TON
--
VELO's Rise and Fall - Is a Comeback Imminent or a Rug Pull Looming?"Velodrome Finance (VELO) has recently garnered significant attention in the cryptocurrency market, particularly following its listing on Binance. This article delves into the current state of VELO, examines the factors influencing its price movements, analyzes its performance since the Binance listing, provides a price prediction, and assesses the potential risks associated with the token. 1. Current Status of VELO Cryptocurrency: VELO is the native token of Velodrome Finance, a decentralized exchange (DEX) operating on the Optimism network. The platform has positioned itself as a major player in the decentralized finance (DeFi) space, offering competitive swap rates and innovative liquidity solutions. As of December 17, 2024, VELO is trading at approximately $0.03126, with a market capitalization of around $231 million and a 24-hour trading volume of about $65.72 million. 2. Post-Binance Listing Performance: VELO experienced a significant surge following its listing on Binance. On December 13, 2024, the token's price jumped by 170%, reaching a high of $0.39 shortly after the announcement. This listing increased the token's visibility and accessibility, contributing to heightened investor interest. 3. Analysis Since Binance Listing: Despite the initial surge, VELO's price has exhibited volatility. After peaking at $0.42, the token has retraced to its current level of approximately $0.03126. This decline suggests that the initial excitement may have waned, leading to profit-taking and market corrections. Such patterns are common following major exchange listings, where an initial pump is often followed by a consolidation phase. 4. Price Prediction: Predicting cryptocurrency prices involves considerable uncertainty due to market volatility and external factors. However, some analysts have identified bullish patterns for VELO. For instance, a cup and handle formation suggests a potential rise to $0.054, representing a 109% increase from current levels. This projection is contingent upon market conditions and investor sentiment remaining favorable. 5. Potential Risks and Rug Pull Concerns: A rug pull is a type of exit scam where developers abandon a project after securing substantial investor funds, leaving investors with worthless tokens. While there have been discussions on platforms like Reddit labeling VELO as a scam token, it's important to note that Velodrome Finance has undergone audits, with no major or high-risk issues identified. However, some low-risk recommendations were made. Investors should exercise caution, conduct thorough research, and remain vigilant for any red flags indicating potential fraud. Conclusion: VELO's journey post-Binance listing has been marked by significant volatility. While the initial surge showcased strong market interest, the subsequent correction underscores the inherent risks in cryptocurrency investments. Potential investors should conduct comprehensive due diligence, remain aware of market dynamics, and consider the speculative nature of such assets before making investment decisions. $VELODROME #Write2Earn! #scamriskwarning

VELO's Rise and Fall - Is a Comeback Imminent or a Rug Pull Looming?"

Velodrome Finance (VELO) has recently garnered significant attention in the cryptocurrency market, particularly following its listing on Binance. This article delves into the current state of VELO, examines the factors influencing its price movements, analyzes its performance since the Binance listing, provides a price prediction, and assesses the potential risks associated with the token.
1. Current Status of VELO Cryptocurrency:
VELO is the native token of Velodrome Finance, a decentralized exchange (DEX) operating on the Optimism network. The platform has positioned itself as a major player in the decentralized finance (DeFi) space, offering competitive swap rates and innovative liquidity solutions. As of December 17, 2024, VELO is trading at approximately $0.03126, with a market capitalization of around $231 million and a 24-hour trading volume of about $65.72 million.
2. Post-Binance Listing Performance:
VELO experienced a significant surge following its listing on Binance. On December 13, 2024, the token's price jumped by 170%, reaching a high of $0.39 shortly after the announcement. This listing increased the token's visibility and accessibility, contributing to heightened investor interest.
3. Analysis Since Binance Listing:
Despite the initial surge, VELO's price has exhibited volatility. After peaking at $0.42, the token has retraced to its current level of approximately $0.03126. This decline suggests that the initial excitement may have waned, leading to profit-taking and market corrections. Such patterns are common following major exchange listings, where an initial pump is often followed by a consolidation phase.
4. Price Prediction:
Predicting cryptocurrency prices involves considerable uncertainty due to market volatility and external factors. However, some analysts have identified bullish patterns for VELO. For instance, a cup and handle formation suggests a potential rise to $0.054, representing a 109% increase from current levels. This projection is contingent upon market conditions and investor sentiment remaining favorable.
5. Potential Risks and Rug Pull Concerns:
A rug pull is a type of exit scam where developers abandon a project after securing substantial investor funds, leaving investors with worthless tokens. While there have been discussions on platforms like Reddit labeling VELO as a scam token, it's important to note that Velodrome Finance has undergone audits, with no major or high-risk issues identified. However, some low-risk recommendations were made. Investors should exercise caution, conduct thorough research, and remain vigilant for any red flags indicating potential fraud.
Conclusion:
VELO's journey post-Binance listing has been marked by significant volatility. While the initial surge showcased strong market interest, the subsequent correction underscores the inherent risks in cryptocurrency investments. Potential investors should conduct comprehensive due diligence, remain aware of market dynamics, and consider the speculative nature of such assets before making investment decisions.
$VELODROME #Write2Earn! #scamriskwarning
Ledger Wallet User Reports $1.5M in Losses, Crypto Community Links Incident to 2022 Phishing AttackA crypto enthusiast recently took to social media platform X to report a devastating loss of 10 Bitcoin (BTC) and $1.5 million worth of NFTs. Despite taking precautions with their Ledger Nano S wallet, the crypto community linked the incident to a phishing attack from 2022. The Incident: $1.5 Million and 10 BTC Gone On December 13, 2024, the user, known as "Anchor Drops," revealed their losses on X. They stated: "Hey @ledger, last night I lost 10 BTC and ~$1.5M of NFTs stored on my Ledger Nano S. The Ledger was purchased directly from you. The seed phrase was stored securely and never entered online. I have never signed any malicious transactions. Can you explain what happened?" The user emphasized that their seed phrase was kept in a secure location and that the wallet had not been used for over two months. They were searching for answers and clarity regarding the unexpected breach. Community Investigation: A 2022 Phishing Attack In response to the post, several members of the crypto community speculated that the loss stemmed from a phishing attack dating back to February 2022. One user, KDean, commented: "Sorry to hear that. Looks like the phish happened a few years ago and just woke up." KDean provided evidence tying the compromised Ethereum address to a phishing transaction labeled "Fake_Phishing5443." This transaction, dated February 22, 2022, reportedly involved the theft of sensitive wallet data, including the victim's seed phrase. How Did the Attack Unfold? Crypto experts suggest the phishing attack likely captured the seed phrase at the time, granting the hacker access to the victim’s funds across multiple blockchains. The hacker waited nearly three years before draining the wallet, a strategy often employed to evade suspicion. With Bitcoin currently valued at $105,000, the stolen 10 BTC translates to $1,050,000. Combined with the $1.5 million in NFTs, the total losses amount to over $2.5 million. Past Ledger Security Breaches This incident highlights ongoing security challenges for Ledger. Earlier this year, the company faced another attack where approximately $600,000 was stolen. The January 2024 breach involved phishing via the Ledger Connect Kit software, reportedly orchestrated by a former employee. In that case, malicious code redirected users’ funds to the hacker’s wallet during interactions with decentralized applications (dApps). Ledger reimbursed affected users and implemented tighter security measures following the incident. Lessons for Crypto Users This case underscores the importance of vigilance when safeguarding digital assets. While hardware wallets like Ledger Nano S offer enhanced security, phishing attacks targeting seed phrases remain a significant threat. Users must remain cautious, avoid sharing sensitive information, and monitor their wallets for unusual activity. Security in the crypto world is ever-evolving, and staying informed is key to protecting your assets. $BTC {spot}(BTCUSDT) #MarketNewHype #ETHHits4KAgain #BTCNewATH #ScamAware #scamriskwarning

Ledger Wallet User Reports $1.5M in Losses, Crypto Community Links Incident to 2022 Phishing Attack

A crypto enthusiast recently took to social media platform X to report a devastating loss of 10 Bitcoin (BTC) and $1.5 million worth of NFTs. Despite taking precautions with their Ledger Nano S wallet, the crypto community linked the incident to a phishing attack from 2022.
The Incident: $1.5 Million and 10 BTC Gone
On December 13, 2024, the user, known as "Anchor Drops," revealed their losses on X. They stated:
"Hey @ledger, last night I lost 10 BTC and ~$1.5M of NFTs stored on my Ledger Nano S. The Ledger was purchased directly from you. The seed phrase was stored securely and never entered online. I have never signed any malicious transactions. Can you explain what happened?"
The user emphasized that their seed phrase was kept in a secure location and that the wallet had not been used for over two months. They were searching for answers and clarity regarding the unexpected breach.
Community Investigation: A 2022 Phishing Attack
In response to the post, several members of the crypto community speculated that the loss stemmed from a phishing attack dating back to February 2022. One user, KDean, commented:
"Sorry to hear that. Looks like the phish happened a few years ago and just woke up."
KDean provided evidence tying the compromised Ethereum address to a phishing transaction labeled "Fake_Phishing5443." This transaction, dated February 22, 2022, reportedly involved the theft of sensitive wallet data, including the victim's seed phrase.
How Did the Attack Unfold?
Crypto experts suggest the phishing attack likely captured the seed phrase at the time, granting the hacker access to the victim’s funds across multiple blockchains. The hacker waited nearly three years before draining the wallet, a strategy often employed to evade suspicion.
With Bitcoin currently valued at $105,000, the stolen 10 BTC translates to $1,050,000. Combined with the $1.5 million in NFTs, the total losses amount to over $2.5 million.
Past Ledger Security Breaches
This incident highlights ongoing security challenges for Ledger. Earlier this year, the company faced another attack where approximately $600,000 was stolen. The January 2024 breach involved phishing via the Ledger Connect Kit software, reportedly orchestrated by a former employee.
In that case, malicious code redirected users’ funds to the hacker’s wallet during interactions with decentralized applications (dApps). Ledger reimbursed affected users and implemented tighter security measures following the incident.
Lessons for Crypto Users
This case underscores the importance of vigilance when safeguarding digital assets. While hardware wallets like Ledger Nano S offer enhanced security, phishing attacks targeting seed phrases remain a significant threat. Users must remain cautious, avoid sharing sensitive information, and monitor their wallets for unusual activity.
Security in the crypto world is ever-evolving, and staying informed is key to protecting your assets.

$BTC
#MarketNewHype #ETHHits4KAgain #BTCNewATH #ScamAware #scamriskwarning
Binance Customer Support?Binance's customer support is accessible only via its official application. It is of utmost importance to exercise caution. Do not place your trust in individuals who reach out to you on social media, claiming to offer support. Such people are invariably scammers. We are grateful for your support. Please stay vigilant and safe. #Guidance #scamriskwarning

Binance Customer Support?

Binance's customer support is accessible only via its official application.

It is of utmost importance to exercise caution. Do not place your trust in individuals who reach out to you on social media, claiming to offer support. Such people are invariably scammers.

We are grateful for your support. Please stay vigilant and safe.

#Guidance
#scamriskwarning
--
Мечи
--
Мечи
Real Comedian $BAN Crypto markets are not driven by analysis or indicators—it's the 庄家 (market makers) pulling the strings. Success lies in understanding their moves, not the charts. #scamriskwarning #AltcoinInvesting
Real Comedian $BAN

Crypto markets are not driven by analysis or indicators—it's the 庄家 (market makers) pulling the strings. Success lies in understanding their moves, not the charts.

#scamriskwarning #AltcoinInvesting
AI-Driven Scammers Target Web3 Professionals with Malware-Laced AppsLes fausses applications sont intégrées au malware Realst, un outil de vol d'informations. Ces attaques ciblent des données sensibles, notamment les identifiants de portefeuilles de crypto-monnaies. On s'attend à ce que ces applications soient liées à la Corée du Nord, tout comme l'exploit de 50 millions de dollars de Radiant Capital. Entre-temps, les autorités ont fait quelques progrès avec l'arrestation de Dmitry V., ancien directeur de WEX, une bourse de crypto-monnaies liée à la fraude et au blanchiment d'argent. Les employés de Web3 menacésLes professionnels du Web3 sont la cible d'une campagne de malware sophistiquée qui utilise de fausses applications de réunion pour voler des informations sensibles, notamment des identifiants de sites Web, des applications et des portefeuilles de cryptomonnaies. Selon un rapport de Cado Security Labs, les escrocs utilisent l'intelligence artificielle pour créer des sites Web et des profils de médias sociaux d'apparence légitime pour des entreprises frauduleuses. Ces plateformes sont utilisées pour inciter les cibles à télécharger une application de réunion malveillante. L'application s'appelait auparavant « Meeten », mais elle s'appelle désormais « Meetio » et change fréquemment de nom de marque. Elle opérait auparavant sous des domaines tels que Clusee.com, Meeten.gg et Meetone.gg.L'application contient un malware de vol d'informations Realst conçu pour extraire des informations critiques, notamment les identifiants Telegram, les coordonnées bancaires et les identifiants de portefeuille cryptographique, qui sont ensuite envoyés aux attaquants. Le malware peut également récolter des cookies de navigateur, remplir automatiquement les informations d'identification des navigateurs Web tels que Google Chrome et Microsoft Edge, et même accéder aux données liées aux portefeuilles matériels tels que Ledger et Trezor, ainsi qu'aux portefeuilles Binance.La campagne utilise également des tactiques d'ingénierie sociale, les escrocs se faisant parfois passer pour des contacts connus afin d'instaurer la confiance. Dans un cas, une cible a déclaré avoir été approchée sur Telegram par une personne se faisant passer pour un collègue et avoir reçu une présentation d'investissement volée à sa propre entreprise. D'autres victimes ont raconté avoir participé à des appels liés à des projets Web3, avoir téléchargé le logiciel malveillant et avoir ensuite perdu leur cryptomonnaie.Fausse application de réunion (Source : Cado Security )Pour renforcer encore leur crédibilité, les escrocs ont créé des sites Web d’entreprise remplis de blogs, de descriptions de produits et de comptes de réseaux sociaux générés par l’IA sur des plateformes comme X et Medium. Cette utilisation de l’IA leur permet de produire très rapidement du contenu très convaincant, ce qui rend leurs opérations frauduleuses légitimes et plus difficiles à détecter. Dans certains cas, leurs faux sites Web incluent du JavaScript capable de voler les crypto-monnaies stockées dans les navigateurs Web avant même que le logiciel malveillant ne soit téléchargé.La campagne cible à la fois les utilisateurs de macOS et de Windows et est active depuis près de quatre mois. Des escroqueries similaires ont été observées dans le domaine des crypto-monnaies. L'enquêteur ZackXBT a découvert un groupe de 21 développeurs, vraisemblablement nord-coréens, travaillant sur des projets utilisant de fausses identités. En septembre, le FBI a également émis un avertissement concernant les pirates informatiques nord-coréens déployant des logiciels malveillants déguisés en offres d'emploi pour cibler les sociétés de crypto-monnaies et les plateformes financières décentralisées.Un groupe nord-coréen à l'origine de la brèche dans Radiant CapitalRadiant Capital a révélé que le piratage de 50 millions de dollars sur sa plateforme de finance décentralisée (DeFi) en octobre avait été orchestré par un pirate informatique lié à la Corée du Nord qui s'était infiltré sur la plateforme à l'aide d'un logiciel malveillant distribué via Telegram. L'attaquant s'est fait passer pour un ancien sous-traitant de confiance et a envoyé un fichier zip à un développeur de Radiant le 11 septembre sous prétexte de demander des commentaires sur un nouveau projet. La société de cybersécurité Mandiant , sous contrat avec Radiant, a confirmé avec une grande confiance que l'attaque avait été menée par un acteur malveillant affilié à la République populaire démocratique de Corée (RPDC).Le fichier zip malveillant semblait légitime en raison de son caractère courant dans les environnements professionnels et a été partagé entre les développeurs. Cela a permis au logiciel malveillant d'infecter plusieurs appareils. Les attaquants ont ensuite pris le contrôle des clés privées et des contrats intelligents, ce qui a forcé Radiant à interrompre ses activités de prêt le 16 octobre. Le logiciel malveillant a également usurpé le site Web légitime du sous-traitant, trompant encore plus les développeurs. Alors que les vérifications traditionnelles et les simulations de transactions n'ont révélé aucune irrégularité, les attaquants ont manipulé l'interface frontale pour afficher des données de transaction bénignes tout en exécutant des transactions malveillantes en arrière-plan.L'auteur de la menace a été identifié comme « UNC4736 » ou « Citrine Sleet », et est associé au Bureau général de reconnaissance de la Corée du Nord et pourrait être un sous-groupe du tristement célèbre groupe Lazarus. Après l'attaque, 52 millions de dollars des fonds volés ont été transférés par les pirates le 24 octobre. Selon Radiant, même des mesures de sécurité plus avancées, notamment des portefeuilles matériels, des outils de simulation comme Tenderly et des procédures opérationnelles standard du secteur, n'étaient pas suffisantes contre une menace aussi sophistiquée.TVL radiante (Source : DefiLlama )Cet incident est le deuxième compromis majeur pour Radiant cette année, et s'est produit après un exploit de prêt flash de 4,5 millions de dollars en janvier . Une attaque de prêt flash crypto est un type d'exploit sur les plateformes DeFi où un attaquant profite des prêts flash pour manipuler les conditions du marché ou exploiter les vulnérabilités des contrats intelligents. Les prêts flash sont des prêts non garantis qui doivent être empruntés et remboursés en une seule transaction blockchain. Les attaquants utilisent ces prêts pour exécuter des séquences d'actions complexes qui peuvent, par exemple, manipuler le prix des actifs, tromper les contrats intelligents pour débloquer des fonds ou vider les réserves de liquidités. Comme le prêt et le remboursement se produisent presque instantanément, l'attaquant peut en tirer profit sans risquer son propre capital. La série de piratages a sérieusement affecté la réputation de la plateforme, sa valeur totale bloquée chutant de plus de 300 millions de dollars à la fin de l'année dernière à seulement 6,07 millions de dollars au 9 décembre, selon DefiLlama .Les autorités polonaises arrêtent l’ancien chef du WEX, Dmitry V.Bien que la crypto-criminalité soit toujours un problème, les autorités travaillent d'arrache-pied pour traduire ces criminels en justice. Les autorités polonaises ont arrêté Dmitry V., l'ancien directeur de la bourse de crypto-monnaies russe WEX, à Varsovie, après une demande d'extradition du ministère américain de la Justice. Le nom complet de Dmitry V. n'a pas été dévoilé en raison des lois locales. Il est accusé de fraude et de blanchiment d'argent pendant sa gestion de WEX, successeur de BTC-e. L' arrestation a été confirmée par un porte-parole de la police polonaise, qui a déclaré que Dmitry V. est en détention et attend une procédure d'extradition. S'il est extradé vers les États-Unis, il pourrait être condamné à une peine de prison maximale de 20 ans.Dmitry V. a été arrêté et libéré dans plusieurs pays. En août 2021, il a été détenu en Pologne, mais libéré après 40 jours. Il a été de nouveau arrêté en Croatie en 2022 par Interpol à l'aéroport de Zagreb après une demande d'extradition du Kazakhstan. En 2019, les autorités italiennes l'ont arrêté, mais il a ensuite été libéré lorsque des erreurs dans la demande d'extradition ont été découvertes.WEX s’est effondré en 2018, laissant environ 450 millions de dollars non comptabilisés. La plateforme était souvent décrite comme une bourse « sombre » et était connue pour son manque de vérification d’identité et son implication dans le blanchiment de fonds provenant de piratages cryptographiques de grande envergure, notamment la violation de Mt. Gox. À son apogée, WEX a traité plus de 9 milliards de dollars de transactions provenant de plus d’un million d’utilisateurs, dont de nombreux aux États-Unis.Cette dernière arrestation de WEX intervient après les événements survenus avec Alexander Vinnik, l'ancien directeur de BTC-e, le prédécesseur de WEX. Vinnik était surnommé « M. Bitcoin » et a plaidé coupable de complot en vue de commettre un blanchiment d'argent pour des activités entre 2011 et 2017. Il a été arrêté en Grèce en 2017, puis extradé vers les États-Unis en 2022 après avoir purgé deux ans dans une prison française.#ScamRiskWarning #ScamAlert #Web3 #CryptoNewss

AI-Driven Scammers Target Web3 Professionals with Malware-Laced Apps

Les fausses applications sont intégrées au malware Realst, un outil de vol d'informations. Ces attaques ciblent des données sensibles, notamment les identifiants de portefeuilles de crypto-monnaies. On s'attend à ce que ces applications soient liées à la Corée du Nord, tout comme l'exploit de 50 millions de dollars de Radiant Capital. Entre-temps, les autorités ont fait quelques progrès avec l'arrestation de Dmitry V., ancien directeur de WEX, une bourse de crypto-monnaies liée à la fraude et au blanchiment d'argent.

Les employés de Web3 menacésLes professionnels du Web3 sont la cible d'une campagne de malware sophistiquée qui utilise de fausses applications de réunion pour voler des informations sensibles, notamment des identifiants de sites Web, des applications et des portefeuilles de cryptomonnaies. Selon un rapport de Cado Security Labs, les escrocs utilisent l'intelligence artificielle pour créer des sites Web et des profils de médias sociaux d'apparence légitime pour des entreprises frauduleuses. Ces plateformes sont utilisées pour inciter les cibles à télécharger une application de réunion malveillante. L'application s'appelait auparavant « Meeten », mais elle s'appelle désormais « Meetio » et change fréquemment de nom de marque. Elle opérait auparavant sous des domaines tels que Clusee.com, Meeten.gg et Meetone.gg.L'application contient un malware de vol d'informations Realst conçu pour extraire des informations critiques, notamment les identifiants Telegram, les coordonnées bancaires et les identifiants de portefeuille cryptographique, qui sont ensuite envoyés aux attaquants. Le malware peut également récolter des cookies de navigateur, remplir automatiquement les informations d'identification des navigateurs Web tels que Google Chrome et Microsoft Edge, et même accéder aux données liées aux portefeuilles matériels tels que Ledger et Trezor, ainsi qu'aux portefeuilles Binance.La campagne utilise également des tactiques d'ingénierie sociale, les escrocs se faisant parfois passer pour des contacts connus afin d'instaurer la confiance. Dans un cas, une cible a déclaré avoir été approchée sur Telegram par une personne se faisant passer pour un collègue et avoir reçu une présentation d'investissement volée à sa propre entreprise. D'autres victimes ont raconté avoir participé à des appels liés à des projets Web3, avoir téléchargé le logiciel malveillant et avoir ensuite perdu leur cryptomonnaie.Fausse application de réunion (Source : Cado Security )Pour renforcer encore leur crédibilité, les escrocs ont créé des sites Web d’entreprise remplis de blogs, de descriptions de produits et de comptes de réseaux sociaux générés par l’IA sur des plateformes comme X et Medium. Cette utilisation de l’IA leur permet de produire très rapidement du contenu très convaincant, ce qui rend leurs opérations frauduleuses légitimes et plus difficiles à détecter. Dans certains cas, leurs faux sites Web incluent du JavaScript capable de voler les crypto-monnaies stockées dans les navigateurs Web avant même que le logiciel malveillant ne soit téléchargé.La campagne cible à la fois les utilisateurs de macOS et de Windows et est active depuis près de quatre mois. Des escroqueries similaires ont été observées dans le domaine des crypto-monnaies. L'enquêteur ZackXBT a découvert un groupe de 21 développeurs, vraisemblablement nord-coréens, travaillant sur des projets utilisant de fausses identités. En septembre, le FBI a également émis un avertissement concernant les pirates informatiques nord-coréens déployant des logiciels malveillants déguisés en offres d'emploi pour cibler les sociétés de crypto-monnaies et les plateformes financières décentralisées.Un groupe nord-coréen à l'origine de la brèche dans Radiant CapitalRadiant Capital a révélé que le piratage de 50 millions de dollars sur sa plateforme de finance décentralisée (DeFi) en octobre avait été orchestré par un pirate informatique lié à la Corée du Nord qui s'était infiltré sur la plateforme à l'aide d'un logiciel malveillant distribué via Telegram. L'attaquant s'est fait passer pour un ancien sous-traitant de confiance et a envoyé un fichier zip à un développeur de Radiant le 11 septembre sous prétexte de demander des commentaires sur un nouveau projet. La société de cybersécurité Mandiant , sous contrat avec Radiant, a confirmé avec une grande confiance que l'attaque avait été menée par un acteur malveillant affilié à la République populaire démocratique de Corée (RPDC).Le fichier zip malveillant semblait légitime en raison de son caractère courant dans les environnements professionnels et a été partagé entre les développeurs. Cela a permis au logiciel malveillant d'infecter plusieurs appareils. Les attaquants ont ensuite pris le contrôle des clés privées et des contrats intelligents, ce qui a forcé Radiant à interrompre ses activités de prêt le 16 octobre. Le logiciel malveillant a également usurpé le site Web légitime du sous-traitant, trompant encore plus les développeurs. Alors que les vérifications traditionnelles et les simulations de transactions n'ont révélé aucune irrégularité, les attaquants ont manipulé l'interface frontale pour afficher des données de transaction bénignes tout en exécutant des transactions malveillantes en arrière-plan.L'auteur de la menace a été identifié comme « UNC4736 » ou « Citrine Sleet », et est associé au Bureau général de reconnaissance de la Corée du Nord et pourrait être un sous-groupe du tristement célèbre groupe Lazarus. Après l'attaque, 52 millions de dollars des fonds volés ont été transférés par les pirates le 24 octobre. Selon Radiant, même des mesures de sécurité plus avancées, notamment des portefeuilles matériels, des outils de simulation comme Tenderly et des procédures opérationnelles standard du secteur, n'étaient pas suffisantes contre une menace aussi sophistiquée.TVL radiante (Source : DefiLlama )Cet incident est le deuxième compromis majeur pour Radiant cette année, et s'est produit après un exploit de prêt flash de 4,5 millions de dollars en janvier . Une attaque de prêt flash crypto est un type d'exploit sur les plateformes DeFi où un attaquant profite des prêts flash pour manipuler les conditions du marché ou exploiter les vulnérabilités des contrats intelligents. Les prêts flash sont des prêts non garantis qui doivent être empruntés et remboursés en une seule transaction blockchain. Les attaquants utilisent ces prêts pour exécuter des séquences d'actions complexes qui peuvent, par exemple, manipuler le prix des actifs, tromper les contrats intelligents pour débloquer des fonds ou vider les réserves de liquidités. Comme le prêt et le remboursement se produisent presque instantanément, l'attaquant peut en tirer profit sans risquer son propre capital. La série de piratages a sérieusement affecté la réputation de la plateforme, sa valeur totale bloquée chutant de plus de 300 millions de dollars à la fin de l'année dernière à seulement 6,07 millions de dollars au 9 décembre, selon DefiLlama .Les autorités polonaises arrêtent l’ancien chef du WEX, Dmitry V.Bien que la crypto-criminalité soit toujours un problème, les autorités travaillent d'arrache-pied pour traduire ces criminels en justice. Les autorités polonaises ont arrêté Dmitry V., l'ancien directeur de la bourse de crypto-monnaies russe WEX, à Varsovie, après une demande d'extradition du ministère américain de la Justice. Le nom complet de Dmitry V. n'a pas été dévoilé en raison des lois locales. Il est accusé de fraude et de blanchiment d'argent pendant sa gestion de WEX, successeur de BTC-e. L' arrestation a été confirmée par un porte-parole de la police polonaise, qui a déclaré que Dmitry V. est en détention et attend une procédure d'extradition. S'il est extradé vers les États-Unis, il pourrait être condamné à une peine de prison maximale de 20 ans.Dmitry V. a été arrêté et libéré dans plusieurs pays. En août 2021, il a été détenu en Pologne, mais libéré après 40 jours. Il a été de nouveau arrêté en Croatie en 2022 par Interpol à l'aéroport de Zagreb après une demande d'extradition du Kazakhstan. En 2019, les autorités italiennes l'ont arrêté, mais il a ensuite été libéré lorsque des erreurs dans la demande d'extradition ont été découvertes.WEX s’est effondré en 2018, laissant environ 450 millions de dollars non comptabilisés. La plateforme était souvent décrite comme une bourse « sombre » et était connue pour son manque de vérification d’identité et son implication dans le blanchiment de fonds provenant de piratages cryptographiques de grande envergure, notamment la violation de Mt. Gox. À son apogée, WEX a traité plus de 9 milliards de dollars de transactions provenant de plus d’un million d’utilisateurs, dont de nombreux aux États-Unis.Cette dernière arrestation de WEX intervient après les événements survenus avec Alexander Vinnik, l'ancien directeur de BTC-e, le prédécesseur de WEX. Vinnik était surnommé « M. Bitcoin » et a plaidé coupable de complot en vue de commettre un blanchiment d'argent pour des activités entre 2011 et 2017. Il a été arrêté en Grèce en 2017, puis extradé vers les États-Unis en 2022 après avoir purgé deux ans dans une prison française.#ScamRiskWarning

#ScamAlert #Web3 #CryptoNewss
Разгледайте най-новите крипто новини
⚡️ Бъдете част от най-новите дискусии в криптовалутното пространство
💬 Взаимодействайте с любимите си създатели
👍 Насладете се на съдържание, което ви интересува
Имейл/телефонен номер