Binance Square

CyberCrime

649,033 προβολές
55 άτομα συμμετέχουν στη συζήτηση
Moon5labs
--
U.S. Charges Iranian National With Operating Massive Darknet Marketplace NemesisDarknet, drugs, cryptocurrency, and one man at the center: U.S. authorities have charged Behrouz Parsarad with running one of the largest illegal online marketplaces. He faces life imprisonment. 🕵️‍♂️ The Allegations: Hundreds of Thousands of Illegal Transactions According to the indictment, Iranian citizen Behrouz Parsarad allegedly operated Nemesis, a darknet marketplace that from 2021 to 2024 facilitated the sale of drugs, illicit cyber services, and other banned goods. The platform reportedly processed over 400,000 orders, with more than 13% for stimulants like cocaine and meth, and over 4% for opioids such as fentanyl and heroin. The U.S. Department of Justice described Nemesis as a highly damaging criminal platform that significantly contributed to global drug distribution and cybercrime. 💸 Laundering Money Through Crypto Parsarad is also accused of providing money laundering services, including cryptocurrency mixing to obscure transaction trails. He allegedly took a commission from every sale on the Nemesis platform. U.S. Sanctions and a Life Sentence Looming The U.S. sanctioned Parsarad in March. Before it was shut down, Nemesis had reportedly facilitated $30 million in drug sales. Parsarad now faces a mandatory minimum of 10 years and a maximum of life in prison — that is, if the U.S. can ever extradite him. He currently resides in Iran, a country with no extradition treaty with the U.S. Despite this, officials say Parsarad has discussed building a new version of Nemesis. And experts question whether he worked alone. 🧑‍💻 Why Has No One Else Been Charged? Although Parsarad is the only one indicted, cybersecurity experts say a darknet platform of this size likely required an entire team — administrators, moderators, developers, money launderers, and more. “As seen in past takedowns like AlphaBay and Hydra,” said TRM Labs legal expert Ari Redbord, “these platforms often operate as distributed teams that maintain trust, availability, and financial systems.” 🌐 The Darknet Lives On — and Thrives The takedown of Nemesis doesn’t mark the end of darknet operations. According to TRM Labs, 20–30 drug-focused darknet markets are active globally at any given time. These markets tend to fall into two main ecosystems: 🔹 Russian-language markets (e.g., Blacksprut, Kraken) — highly profitable and deeply rooted in local drug economies. 🔹 Western markets (e.g., Abacus Market, STYX) — smaller but more resilient, relying on postal shipping and operating internationally. According to Redbord, the average lifespan of a drug darknet market is two to three years, after which it’s usually abandoned or taken down by authorities. 🧨 Even though Nemesis is gone, the darknet thrives. And as long as demand for anonymous illegal trade remains, it will continue — under new names and new leadership. #darknet , #cybercrime , #CyberSecurity , #aml , #scam Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

U.S. Charges Iranian National With Operating Massive Darknet Marketplace Nemesis

Darknet, drugs, cryptocurrency, and one man at the center: U.S. authorities have charged Behrouz Parsarad with running one of the largest illegal online marketplaces. He faces life imprisonment.

🕵️‍♂️ The Allegations: Hundreds of Thousands of Illegal Transactions
According to the indictment, Iranian citizen Behrouz Parsarad allegedly operated Nemesis, a darknet marketplace that from 2021 to 2024 facilitated the sale of drugs, illicit cyber services, and other banned goods. The platform reportedly processed over 400,000 orders, with more than 13% for stimulants like cocaine and meth, and over 4% for opioids such as fentanyl and heroin.
The U.S. Department of Justice described Nemesis as a highly damaging criminal platform that significantly contributed to global drug distribution and cybercrime.

💸 Laundering Money Through Crypto
Parsarad is also accused of providing money laundering services, including cryptocurrency mixing to obscure transaction trails. He allegedly took a commission from every sale on the Nemesis platform.

U.S. Sanctions and a Life Sentence Looming
The U.S. sanctioned Parsarad in March. Before it was shut down, Nemesis had reportedly facilitated $30 million in drug sales. Parsarad now faces a mandatory minimum of 10 years and a maximum of life in prison — that is, if the U.S. can ever extradite him. He currently resides in Iran, a country with no extradition treaty with the U.S.
Despite this, officials say Parsarad has discussed building a new version of Nemesis. And experts question whether he worked alone.

🧑‍💻 Why Has No One Else Been Charged?
Although Parsarad is the only one indicted, cybersecurity experts say a darknet platform of this size likely required an entire team — administrators, moderators, developers, money launderers, and more.
“As seen in past takedowns like AlphaBay and Hydra,” said TRM Labs legal expert Ari Redbord, “these platforms often operate as distributed teams that maintain trust, availability, and financial systems.”

🌐 The Darknet Lives On — and Thrives
The takedown of Nemesis doesn’t mark the end of darknet operations. According to TRM Labs, 20–30 drug-focused darknet markets are active globally at any given time.
These markets tend to fall into two main ecosystems:
🔹 Russian-language markets (e.g., Blacksprut, Kraken) — highly profitable and deeply rooted in local drug economies.

🔹 Western markets (e.g., Abacus Market, STYX) — smaller but more resilient, relying on postal shipping and operating internationally.
According to Redbord, the average lifespan of a drug darknet market is two to three years, after which it’s usually abandoned or taken down by authorities.

🧨 Even though Nemesis is gone, the darknet thrives. And as long as demand for anonymous illegal trade remains, it will continue — under new names and new leadership.

#darknet , #cybercrime , #CyberSecurity , #aml , #scam

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
2GIAP PHAM:
cứ đổ lỗi cho Iran & Triều Tiên nếu có thể... vì cũng chẳng ai có thể kiểm chứng được, còn họ chắc chắn ko bao giờ hợp tác với Mỹ trong vấn đề này... nên có lý do để kết tội...
💥 Великобритания ударила по российским сетям отмывания денег! 💥 Национальное агентство по борьбе с преступностью (NCA) провело масштабную операцию и ликвидировало сразу две крупные сети отмывания денег — Smart и TGR. 💸 Эти организации, скрывающиеся за сложными криптовалютными схемами, занимались финансированием таких преступлений, как: 🚨 Наркоторговля 💻 Кибератаки с использованием вымогательского ПО 🕵️‍♂️ Шпионаж в интересах России Результат? 👇 📌 Арестовано 84 человека 📌 Изъято более £20 млн в наличных и криптовалюте И вот кто стал в центре внимания — Екатерина Жданова, предполагаемый лидер сети Smart. Она мастерски использовала криптовалюты для обхода санкций и отмывания денег элит и киберпреступников. 😮 Эта операция стала настоящим ударом по преступным группам, которые думали, что блокчейн поможет им остаться незамеченными. Но, как видим, даже сложные криптосхемы могут быть раскрыты! 🌐 Криптовалюта может быть инструментом свободы, но она точно не для нарушителей закона! 💪 #CryptoCrime #Blockchain #NCA #AntiMoneyLaundering #CyberCrime
💥 Великобритания ударила по российским сетям отмывания денег! 💥

Национальное агентство по борьбе с преступностью (NCA) провело масштабную операцию и ликвидировало сразу две крупные сети отмывания денег — Smart и TGR. 💸 Эти организации, скрывающиеся за сложными криптовалютными схемами, занимались финансированием таких преступлений, как:

🚨 Наркоторговля

💻 Кибератаки с использованием вымогательского ПО

🕵️‍♂️ Шпионаж в интересах России

Результат? 👇
📌 Арестовано 84 человека
📌 Изъято более £20 млн в наличных и криптовалюте

И вот кто стал в центре внимания — Екатерина Жданова, предполагаемый лидер сети Smart. Она мастерски использовала криптовалюты для обхода санкций и отмывания денег элит и киберпреступников. 😮

Эта операция стала настоящим ударом по преступным группам, которые думали, что блокчейн поможет им остаться незамеченными. Но, как видим, даже сложные криптосхемы могут быть раскрыты! 🌐

Криптовалюта может быть инструментом свободы, но она точно не для нарушителей закона! 💪

#CryptoCrime #Blockchain #NCA #AntiMoneyLaundering #CyberCrime
Guys, P2P is extremely risky. I’ve been telling folks to avoid using any kind of P2P platforms, it’s an open invitation to trouble. I know so many people in India got notice from various govt authorities just because they unknowingly sent INR or received INR from someone who wasn’t the right person to deal with. And in P2P, as innocent customer you have no clue about it. Not even touching the topic of TDS non-compliance bit here! So stay safe guys! WARNING: Binance P2P can be extremely risky! I sold $560 USDT to a fraudulent seller and now my bank account has been frozen due to suspected money cheating. Cyber crime is involved, demanding the money be returned to the victim or for me to connect with them. The scammer was apparently giving out the cheating money he obtained from his call center scam to other Binance P2P users in exchange for USDT. This is a stark reminder to always be vigilant and cautious when conducting P2P transactions. Please be careful when conducting P2P transactions and only trade with reputable users. Let's work together to keep the Binance community safe and free from scams. #cybercrime  #BinanceP2P  #ScamRiskWarning @Binance Risk Sniper
Guys, P2P is extremely risky. I’ve been telling folks to avoid using any kind of P2P platforms, it’s an open invitation to trouble.

I know so many people in India got notice from various govt authorities just because they unknowingly sent INR or received INR from someone who wasn’t the right person to deal with. And in P2P, as innocent customer you have no clue about it.

Not even touching the topic of TDS non-compliance bit here! So stay safe guys!

WARNING: Binance P2P can be extremely risky! I sold $560 USDT to a fraudulent seller and now my bank account has been frozen due to suspected money cheating. Cyber crime is involved, demanding the money be returned to the victim or for me to connect with them.

The scammer was apparently giving out the cheating money he obtained from his call center scam to other Binance P2P users in exchange for USDT. This is a stark reminder to always be vigilant and cautious when conducting P2P transactions.

Please be careful when conducting P2P transactions and only trade with reputable users. Let's work together to keep the Binance community safe and free from scams. #cybercrime  #BinanceP2P  #ScamRiskWarning

@Binance Risk Sniper
🤑𝙂𝙀𝙏 𝙁𝙍𝙀𝙀 𝙍𝙀𝙒𝘼𝙍𝘿 𝙐𝙋𝙏𝙊 8$ 𝙐𝙎𝘿𝙏 𝘼𝙉𝘿 𝙋𝙀𝙋𝙀 𝘾𝙊𝙄𝙉𝙎 𝙁𝙍𝙊𝙈 𝙈𝙔 𝙏𝙒𝙊 📌 𝙋𝙄𝙉𝙉𝙀𝘿 𝙋𝙊𝙎𝙏𝙎💰🤑💸 Guys, P2P is extremely risky. I’ve been telling folks to avoid using any kind of P2P platforms, it’s an open invitation to trouble. I know so many people in India got notice from various govt authorities just because they unknowingly sent INR or received INR from someone who wasn’t the right person to deal with. And in P2P, as innocent customer you have no clue about it. Not even touching the topic of TDS non-compliance bit here! So stay safe guys! WARNING: Binance P2P can be extremely risky! I sold $560 USDT to a fraudulent seller and now my bank account has been frozen due to suspected money cheating. Cyber crime is involved, demanding the money be returned to the victim or for me to connect with them. The scammer was apparently giving out the cheating money he obtained from his call center scam to other Binance P2P users in exchange for USDT. This is a stark reminder to always be vigilant and cautious when conducting P2P transactions. Please be careful when conducting P2P transactions and only trade with reputable users. Let's work together to keep the Binance community safe and free from scams. #cybercrime  #BinanceP2P  #ScamRiskWarning @Binance Risk Sniper
🤑𝙂𝙀𝙏 𝙁𝙍𝙀𝙀 𝙍𝙀𝙒𝘼𝙍𝘿 𝙐𝙋𝙏𝙊 8$ 𝙐𝙎𝘿𝙏 𝘼𝙉𝘿 𝙋𝙀𝙋𝙀 𝘾𝙊𝙄𝙉𝙎 𝙁𝙍𝙊𝙈 𝙈𝙔 𝙏𝙒𝙊 📌 𝙋𝙄𝙉𝙉𝙀𝘿 𝙋𝙊𝙎𝙏𝙎💰🤑💸

Guys, P2P is extremely risky. I’ve been telling folks to avoid using any kind of P2P platforms, it’s an open invitation to trouble.

I know so many people in India got notice from various govt authorities just because they unknowingly sent INR or received INR from someone who wasn’t the right person to deal with. And in P2P, as innocent customer you have no clue about it.

Not even touching the topic of TDS non-compliance bit here! So stay safe guys!

WARNING: Binance P2P can be extremely risky! I sold $560 USDT to a fraudulent seller and now my bank account has been frozen due to suspected money cheating. Cyber crime is involved, demanding the money be returned to the victim or for me to connect with them.

The scammer was apparently giving out the cheating money he obtained from his call center scam to other Binance P2P users in exchange for USDT. This is a stark reminder to always be vigilant and cautious when conducting P2P transactions.

Please be careful when conducting P2P transactions and only trade with reputable users. Let's work together to keep the Binance community safe and free from scams. #cybercrime  #BinanceP2P  #ScamRiskWarning

@Binance Risk Sniper
Russian Citizen Assaulted and Robbed in Thailand Over Cryptocurrency DisputeIncident in Phuket: Crypto Debt Leads to Violent Robbery Thai police have launched an investigation into two Russian nationals accused of assaulting and robbing their compatriot over a cryptocurrency debt. The incident occurred at a hotel in Karon, Phuket. According to the local newspaper Khaosod, a 31-year-old man was attacked over a $120,000 debt linked to previous cryptocurrency transactions in Russia. The attackers, who were known to the victim, forced him to attempt unlocking his crypto wallet. When he refused, violence ensued. Assault and Suspects’ Escape One of the suspects, identified as Andrei, allegedly threatened to kill the victim if the debt was not paid. The victim was repeatedly punched, kicked, and eventually lost consciousness after being struck on the head. The attackers then stole $20,000 in cash and fled, leaving the victim tied up in the bathroom. Investigators revealed that one suspect remained in Thailand, while the other, Dmitri, fled to Dubai. Arrest warrants have been issued, and Thai authorities are collaborating with immigration and police agencies to apprehend the suspects. Cryptocurrencies as Targets of Violent Crime Rising Value of Cryptocurrencies Attracts Criminals The Phuket incident is part of a growing trend where cryptocurrencies play a role in severe criminal activities. The year 2024 saw numerous violent incidents linked to digital assets, ranging from kidnappings to extortion. In July, a 29-year-old tourist in Kyiv was kidnapped and murdered as criminals attempted to seize his 3 bitcoins. Authorities described the event as a calculated plan that ended with the victim's death after the forced transfer of cryptocurrency failed. Case in Costa Rica: Armed Robbery of Bitcoins A similar case occurred in August on a beach in Costa Rica, where 11 Israeli tourists were robbed of a significant amount of bitcoins. The attackers, disguised as police officers, used firearms during the assault, raising concerns about the involvement of organized crime groups with police training. Cryptocurrencies: Valuable Targets That Attract Danger As cryptocurrencies grow in popularity, incidents of violence and crime associated with these digital assets are on the rise. This trend underscores the need for enhanced security measures and better protection for investors on a global scale. #CryptoCrime , #Bitcoin❗ , #CryptoSafety , #cybercrime , #CryptoScamAlert Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Russian Citizen Assaulted and Robbed in Thailand Over Cryptocurrency Dispute

Incident in Phuket: Crypto Debt Leads to Violent Robbery
Thai police have launched an investigation into two Russian nationals accused of assaulting and robbing their compatriot over a cryptocurrency debt. The incident occurred at a hotel in Karon, Phuket.
According to the local newspaper Khaosod, a 31-year-old man was attacked over a $120,000 debt linked to previous cryptocurrency transactions in Russia. The attackers, who were known to the victim, forced him to attempt unlocking his crypto wallet. When he refused, violence ensued.
Assault and Suspects’ Escape
One of the suspects, identified as Andrei, allegedly threatened to kill the victim if the debt was not paid. The victim was repeatedly punched, kicked, and eventually lost consciousness after being struck on the head. The attackers then stole $20,000 in cash and fled, leaving the victim tied up in the bathroom.
Investigators revealed that one suspect remained in Thailand, while the other, Dmitri, fled to Dubai. Arrest warrants have been issued, and Thai authorities are collaborating with immigration and police agencies to apprehend the suspects.
Cryptocurrencies as Targets of Violent Crime
Rising Value of Cryptocurrencies Attracts Criminals
The Phuket incident is part of a growing trend where cryptocurrencies play a role in severe criminal activities. The year 2024 saw numerous violent incidents linked to digital assets, ranging from kidnappings to extortion.
In July, a 29-year-old tourist in Kyiv was kidnapped and murdered as criminals attempted to seize his 3 bitcoins. Authorities described the event as a calculated plan that ended with the victim's death after the forced transfer of cryptocurrency failed.
Case in Costa Rica: Armed Robbery of Bitcoins
A similar case occurred in August on a beach in Costa Rica, where 11 Israeli tourists were robbed of a significant amount of bitcoins. The attackers, disguised as police officers, used firearms during the assault, raising concerns about the involvement of organized crime groups with police training.
Cryptocurrencies: Valuable Targets That Attract Danger
As cryptocurrencies grow in popularity, incidents of violence and crime associated with these digital assets are on the rise. This trend underscores the need for enhanced security measures and better protection for investors on a global scale.

#CryptoCrime , #Bitcoin❗ , #CryptoSafety , #cybercrime , #CryptoScamAlert

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Over 100,000 Gemini Records Allegedly for Sale on Dark Web – Concerns Rise After Binance WarningMore than 100,000 user records allegedly linked to cryptocurrency exchange Gemini have surfaced for sale on the dark web, sparking renewed concerns about data security in the crypto space. According to a March 27 report from The Dark Web Informer, a threat actor using the alias “AKM69” claimed to possess a large trove of Gemini user data, including full names, emails, phone numbers, and location data. Most entries are said to originate from the United States, with others allegedly tied to users in the UK and Singapore. While Gemini has not officially commented on the matter, it's currently unclear whether the data originated directly from its internal systems or via third-party vulnerabilities, such as phishing attacks or compromised user devices. Not an Isolated Case: Binance Data Leak Claims Resurface The Gemini incident comes just one day after a similar threat emerged involving Binance. A user going by “kiki88888” reportedly offered over 132,000 lines of Binance user data—including emails and passwords—for sale. The Dark Web Informer speculated that the Binance data might have originated from compromised endpoints, rather than Binance itself. Users were cautioned to avoid suspicious links and emails, highlighting the ongoing risk of phishing attacks. Notably, Binance has previously denied such claims, stating that its internal investigation found no breach in its core systems. In a past 2023 incident, an anonymous user “FireBear” had claimed access to 12.8 million user records, including names, email addresses, and home addresses. Binance responded by reaffirming that its security systems were uncompromised. Crypto Data Breaches: A Broader Industry Problem These incidents reflect a wider trend of data exposure across the crypto industry: In November 2023, Nigerian crypto exchange Bitnob reportedly exposed over 250,000 KYC documents due to misconfigured Amazon Web Services (AWS) storage.In December 2023, a breach affected over 58,000 customers of Byte Federal, a U.S.-based Bitcoin ATM operator.In January 2024, cybersecurity firm SlowMist warned that over 7 million email addresses from a 2022 OpenSea data leak had been fully exposed—leaving users vulnerable to phishing scams. Despite these incidents, it’s important to note that many platforms, including Binance, emphasize that their internal infrastructure remains secure and that most recent threats likely stem from individual user security lapses. As always, users are encouraged to practice safe online behavior, enable two-factor authentication, and avoid clicking on suspicious links or sharing credentials. #CryptoScamAlert , #CyberSecurity , #darkweb , #cybercrime , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Over 100,000 Gemini Records Allegedly for Sale on Dark Web – Concerns Rise After Binance Warning

More than 100,000 user records allegedly linked to cryptocurrency exchange Gemini have surfaced for sale on the dark web, sparking renewed concerns about data security in the crypto space.
According to a March 27 report from The Dark Web Informer, a threat actor using the alias “AKM69” claimed to possess a large trove of Gemini user data, including full names, emails, phone numbers, and location data. Most entries are said to originate from the United States, with others allegedly tied to users in the UK and Singapore.
While Gemini has not officially commented on the matter, it's currently unclear whether the data originated directly from its internal systems or via third-party vulnerabilities, such as phishing attacks or compromised user devices.
Not an Isolated Case: Binance Data Leak Claims Resurface
The Gemini incident comes just one day after a similar threat emerged involving Binance. A user going by “kiki88888” reportedly offered over 132,000 lines of Binance user data—including emails and passwords—for sale.
The Dark Web Informer speculated that the Binance data might have originated from compromised endpoints, rather than Binance itself. Users were cautioned to avoid suspicious links and emails, highlighting the ongoing risk of phishing attacks.
Notably, Binance has previously denied such claims, stating that its internal investigation found no breach in its core systems. In a past 2023 incident, an anonymous user “FireBear” had claimed access to 12.8 million user records, including names, email addresses, and home addresses. Binance responded by reaffirming that its security systems were uncompromised.
Crypto Data Breaches: A Broader Industry Problem
These incidents reflect a wider trend of data exposure across the crypto industry:
In November 2023, Nigerian crypto exchange Bitnob reportedly exposed over 250,000 KYC documents due to misconfigured Amazon Web Services (AWS) storage.In December 2023, a breach affected over 58,000 customers of Byte Federal, a U.S.-based Bitcoin ATM operator.In January 2024, cybersecurity firm SlowMist warned that over 7 million email addresses from a 2022 OpenSea data leak had been fully exposed—leaving users vulnerable to phishing scams.

Despite these incidents, it’s important to note that many platforms, including Binance, emphasize that their internal infrastructure remains secure and that most recent threats likely stem from individual user security lapses.
As always, users are encouraged to practice safe online behavior, enable two-factor authentication, and avoid clicking on suspicious links or sharing credentials.

#CryptoScamAlert , #CyberSecurity , #darkweb , #cybercrime , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Hong Kong Fraud Group Using Deepfakes Exposed – Pretended to Be Wealthy Single WomenSeized Notebooks Revealed Sophisticated Scams Hong Kong police uncovered a sophisticated fraud scheme that used artificial intelligence to deceive victims. The investigation led to the seizure of over HK$34 million (approximately USD 3.37 million). Notebooks confiscated by law enforcement revealed the criminals' methods, including the use of deepfake technology to appear more convincing. How the Fraudsters Lured Their Victims The fraudsters pretended to be wealthy single women, crafting stories about interests such as learning Japanese, playing golf, or tasting luxury wines worth over HK$100,000 (USD 12,850) per bottle. These methods were documented in the notebooks seized during the operation. The investigation resulted in the arrest of 31 individuals connected to a criminal syndicate. This group used artificial intelligence to create realistic images of attractive women, which were then used to lure victims into romantic and investment scams. The Problem of Deepfake Scams Byron Boston, a former police officer and CEO of Crypto Track, warned that the combination of deepfake technology and social engineering presents significant challenges for investigators and law enforcement. AI-generated images make criminals more convincing and enable them to execute more complex scams. Boston highlighted an incident from November 2022, where a fake video impersonating FTX founder Sam Bankman-Fried was used in a phishing attack targeting FTX users. This incident demonstrates how deepfake technologies can be exploited to steal cryptocurrency assets from victims. Scams Targeting Young People Confiscated materials revealed that the fraudsters specifically targeted young people seeking quick earnings. Victims were often convinced they were communicating with ideal women from Taiwan, Singapore, and Malaysia. Challenges in Combating These Crimes Boston emphasized that effective collaboration and swift action are key to fighting these sophisticated scams. However, he noted that many local law enforcement agencies, particularly in the U.S., lack the necessary tools and expertise to track stolen cryptocurrency or cooperate with international exchanges. Criminals leveraging technologies like deepfake and social engineering remain a significant challenge for security forces worldwide. #Deepfake , #CryptoFraud , #CryptoScams , #cybercrime , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Hong Kong Fraud Group Using Deepfakes Exposed – Pretended to Be Wealthy Single Women

Seized Notebooks Revealed Sophisticated Scams
Hong Kong police uncovered a sophisticated fraud scheme that used artificial intelligence to deceive victims. The investigation led to the seizure of over HK$34 million (approximately USD 3.37 million). Notebooks confiscated by law enforcement revealed the criminals' methods, including the use of deepfake technology to appear more convincing.
How the Fraudsters Lured Their Victims
The fraudsters pretended to be wealthy single women, crafting stories about interests such as learning Japanese, playing golf, or tasting luxury wines worth over HK$100,000 (USD 12,850) per bottle. These methods were documented in the notebooks seized during the operation.
The investigation resulted in the arrest of 31 individuals connected to a criminal syndicate. This group used artificial intelligence to create realistic images of attractive women, which were then used to lure victims into romantic and investment scams.
The Problem of Deepfake Scams
Byron Boston, a former police officer and CEO of Crypto Track, warned that the combination of deepfake technology and social engineering presents significant challenges for investigators and law enforcement. AI-generated images make criminals more convincing and enable them to execute more complex scams.
Boston highlighted an incident from November 2022, where a fake video impersonating FTX founder Sam Bankman-Fried was used in a phishing attack targeting FTX users. This incident demonstrates how deepfake technologies can be exploited to steal cryptocurrency assets from victims.
Scams Targeting Young People
Confiscated materials revealed that the fraudsters specifically targeted young people seeking quick earnings. Victims were often convinced they were communicating with ideal women from Taiwan, Singapore, and Malaysia.
Challenges in Combating These Crimes
Boston emphasized that effective collaboration and swift action are key to fighting these sophisticated scams. However, he noted that many local law enforcement agencies, particularly in the U.S., lack the necessary tools and expertise to track stolen cryptocurrency or cooperate with international exchanges.
Criminals leveraging technologies like deepfake and social engineering remain a significant challenge for security forces worldwide.

#Deepfake , #CryptoFraud , #CryptoScams , #cybercrime , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Six Men Kidnap Chicago Family, Forcing a $15 Million Crypto RansomArmed Kidnapping Leads to Crypto Ransom Demand A shocking kidnapping took place in Chicago, where six men forcibly abducted a three-member family and their nanny, demanding a $15 million cryptocurrency ransom. According to a February 12 report by the Chicago Tribune, citing an unsealed FBI affidavit, the kidnappers knocked on the family’s door under the pretense that they had accidentally damaged their garage door. Once inside, they forced their way in at gunpoint. The abductors then forced the family into a van, taking them first to a rented Airbnb about an hour away and later transferring them to another house. Five Days in Captivity and a Cryptocurrency Ransom The kidnappers demanded a ransom in Bitcoin, Ethereum, and other cryptocurrencies, threatening to kill the victims if their demands were not met. 📌 The victims were held captive for five days. 📌 One of the abductees managed to contact his father via the WeChat app, informing him about the kidnapping. 📌 On November 1, the family was released and sought help at a nearby dry cleaner before taking an Uber to a hospital. While it was reported that $15 million in cryptocurrency was transferred, U.S. authorities have only been able to recover $6 million so far. Six Suspects Indicted for the Kidnapping On December 13, six men were officially charged in connection with the abduction. The only suspect arrested so far is 34-year-old Zehuan Wei, who was detained on January 17 while attempting to re-enter the U.S. from Mexico. 🔹 Other suspects: Fan Zhang, Huajing Yan, Shengnan Jiang, Shiqiang Lian, and Ye Cao. 🔹 Some of them are believed to have fled to China after Wei’s arrest. Key Evidence Collected by U.S. Authorities Investigators gathered crucial evidence, including: ✅ Airbnb records where the victims were held. ✅ Analysis of cryptocurrency wallets to trace the ransom transactions. ✅ Search of a white Ford van used by the kidnappers. 🔹 DNA samples were taken from a white Chrysler Pacifica, rented by Wei on October 29. 🔹 Authorities matched surveillance footage with a photo of Ye Cao, captured by U.S. Customs and Border Protection. 🔹 Driver’s licenses of other suspects were analyzed for identity verification. 📌 At least two victims were able to identify some of the alleged kidnappers from photographs. The investigation is ongoing, with U.S. authorities working to track down the remaining suspects and recover the stolen cryptocurrency. #CryptoNewss , #CryptoSecurity , #cybercrime , #CryptoSecurity , #CryptoScamAlert Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Six Men Kidnap Chicago Family, Forcing a $15 Million Crypto Ransom

Armed Kidnapping Leads to Crypto Ransom Demand
A shocking kidnapping took place in Chicago, where six men forcibly abducted a three-member family and their nanny, demanding a $15 million cryptocurrency ransom.
According to a February 12 report by the Chicago Tribune, citing an unsealed FBI affidavit, the kidnappers knocked on the family’s door under the pretense that they had accidentally damaged their garage door. Once inside, they forced their way in at gunpoint.
The abductors then forced the family into a van, taking them first to a rented Airbnb about an hour away and later transferring them to another house.
Five Days in Captivity and a Cryptocurrency Ransom
The kidnappers demanded a ransom in Bitcoin, Ethereum, and other cryptocurrencies, threatening to kill the victims if their demands were not met.
📌 The victims were held captive for five days.
📌 One of the abductees managed to contact his father via the WeChat app, informing him about the kidnapping.
📌 On November 1, the family was released and sought help at a nearby dry cleaner before taking an Uber to a hospital.
While it was reported that $15 million in cryptocurrency was transferred, U.S. authorities have only been able to recover $6 million so far.
Six Suspects Indicted for the Kidnapping
On December 13, six men were officially charged in connection with the abduction.
The only suspect arrested so far is 34-year-old Zehuan Wei, who was detained on January 17 while attempting to re-enter the U.S. from Mexico.
🔹 Other suspects: Fan Zhang, Huajing Yan, Shengnan Jiang, Shiqiang Lian, and Ye Cao.
🔹 Some of them are believed to have fled to China after Wei’s arrest.

Key Evidence Collected by U.S. Authorities
Investigators gathered crucial evidence, including:
✅ Airbnb records where the victims were held.
✅ Analysis of cryptocurrency wallets to trace the ransom transactions.
✅ Search of a white Ford van used by the kidnappers.
🔹 DNA samples were taken from a white Chrysler Pacifica, rented by Wei on October 29.
🔹 Authorities matched surveillance footage with a photo of Ye Cao, captured by U.S. Customs and Border Protection.
🔹 Driver’s licenses of other suspects were analyzed for identity verification.
📌 At least two victims were able to identify some of the alleged kidnappers from photographs.
The investigation is ongoing, with U.S. authorities working to track down the remaining suspects and recover the stolen cryptocurrency.

#CryptoNewss , #CryptoSecurity , #cybercrime , #CryptoSecurity , #CryptoScamAlert

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨Crypto Losses to #hacks Exceed $313M in August 🚨 Cryptocurrency hackers stole $313.86 million in digital assets across more than 10 #cyberattacks in August, raising significant doubts about the broader acceptance of the asset class. The alarming figure highlights a growing trend of sophisticated #cybercrime targeting the crypto industry. This wave of thefts has prompted renewed calls for stricter regulation and better security measures within the sector. The recent hacks add pressure on #exchanges and custodians to bolster their defenses and protect user assets. 🌐Source: #Cointelegraph Follow me to keep yourself updated ❗❕❗
🚨Crypto Losses to #hacks Exceed $313M in August 🚨

Cryptocurrency hackers stole $313.86 million in digital assets across more than 10 #cyberattacks in August, raising significant doubts about the broader acceptance of the asset class.

The alarming figure highlights a growing trend of sophisticated #cybercrime targeting the crypto industry.

This wave of thefts has prompted renewed calls for stricter regulation and better security measures within the sector.

The recent hacks add pressure on #exchanges and custodians to bolster their defenses and protect user assets.

🌐Source: #Cointelegraph

Follow me to keep yourself updated ❗❕❗
Ransomware Payouts Drop 35% as Victims Resist DemandsRansomware Attacks Surge, but Payouts Decline Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands. According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified. Declining Payouts Despite Increasing Attacks 🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023. 🔹 The first half of the year saw a 2.3% increase in successful extortion attempts. 🔹 The Dark Angels Group alone collected $75 million. 🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations. Law Enforcement Crackdowns Disrupt Cybercrime Operations 🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks. 🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering. According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat. Ransomware Victims Increasingly Refuse to Pay 🔹 Less than 50% of ransomware attacks resulted in payouts. 🔹 Those who did comply paid up to $250,000 in ransom on average. 🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks. Cybercriminals Adapt to Heightened Security Measures 🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying. 🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code. 🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration. Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake. While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨 #CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Ransomware Payouts Drop 35% as Victims Resist Demands

Ransomware Attacks Surge, but Payouts Decline
Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands.
According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified.
Declining Payouts Despite Increasing Attacks
🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023.
🔹 The first half of the year saw a 2.3% increase in successful extortion attempts.
🔹 The Dark Angels Group alone collected $75 million.
🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations.
Law Enforcement Crackdowns Disrupt Cybercrime Operations
🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks.
🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering.
According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat.

Ransomware Victims Increasingly Refuse to Pay
🔹 Less than 50% of ransomware attacks resulted in payouts.
🔹 Those who did comply paid up to $250,000 in ransom on average.
🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks.
Cybercriminals Adapt to Heightened Security Measures
🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying.
🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code.
🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration.
Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake.
While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨

#CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
An Indian citizen, Chirag Tomar, admitted guilt in a U.S. court for orchestrating a $9.5 million crypto heist by creating a fake Coinbase website. 😱💰 Tomar, 30, was apprehended at Atlanta airport in December 2023, facing charges of wire fraud and money laundering with a potential 20-year sentence. 🛑⛓️ Initially flagged by Seamus Hughes of CourtWatch, Tomar tricked users into giving up their Coinbase login info through a spoofed Coinbase Pro site, defrauding over 542 victims from June 2021 to late 2023. 🕵️‍♂️💻 Court documents revealed Tomar's sloppy trail, including using his real name in emails, maintaining victim spreadsheets, and searching for scam methods. 📝💼 Despite impending sentencing, Tomar flaunted his stolen wealth, indulging in luxury watches, cars, and global travel. 🌎✈️ Stay alert in the digital realm—your security is paramount. 🔒💡 -Professor Mende signing off! #cybercrime #CryptoHeist #digitalsecurity #coinbase?
An Indian citizen, Chirag Tomar, admitted guilt in a U.S. court for orchestrating a $9.5 million crypto heist by creating a fake Coinbase website. 😱💰 Tomar, 30, was apprehended at Atlanta airport in December 2023, facing charges of wire fraud and money laundering with a potential 20-year sentence. 🛑⛓️ Initially flagged by Seamus Hughes of CourtWatch, Tomar tricked users into giving up their Coinbase login info through a spoofed Coinbase Pro site, defrauding over 542 victims from June 2021 to late 2023. 🕵️‍♂️💻 Court documents revealed Tomar's sloppy trail, including using his real name in emails, maintaining victim spreadsheets, and searching for scam methods. 📝💼 Despite impending sentencing, Tomar flaunted his stolen wealth, indulging in luxury watches, cars, and global travel. 🌎✈️ Stay alert in the digital realm—your security is paramount. 🔒💡 -Professor Mende signing off!
#cybercrime #CryptoHeist #digitalsecurity #coinbase?
Une Cyberattaque d'une Ampleur Historique Frappe le Système Bancaire Iranien !🚨💥 Une cyberattaque d'une ampleur historique frappe le système bancaire iranien ! Une offensive numérique spectaculaire vient de secouer le système bancaire de la République islamique, perturbant gravement plusieurs institutions financières, y compris la Banque centrale d'Iran (CBI). D’après "Iran International", cette attaque pourrait bien être l'une des plus dévastatrices jamais orchestrées contre les infrastructures de l'Iran. L'identité des auteurs reste mystérieuse, mais les premières analyses prévoient des répercussions économiques majeures pour un pays déjà fragilisé. Les spécialistes s’accordent à dire que cette cyberattaque pourrait aggraver la crise économique iranienne. Rappelons qu'un incident similaire avait eu lieu en 2023, lorsque "Le Prédateur Rapace" avait paralysé une grande partie du réseau de stations-service en Iran. Les autorités iraniennes n’ont pas encore réagi officiellement, mais l’impact diplomatique et sécuritaire pourrait être considérable. Ce nouvel affrontement numérique survient alors que les tensions entre l'Iran et les puissances occidentales sont déjà élevées, notamment à cause du programme nucléaire iranien. Les spéculations sur l'origine de l'attaque s'intensifient et mettent en lumière la vulnérabilité croissante des systèmes financiers face aux menaces cybernétiques modernes. Ne manquez pas cette actualité explosive et suivez les développements en temps réel ! #Iranian #cybercrime ❤️ Like | 💬 Comment | ↪️ Share 🚀 🔥 Please follow @Coinaute e Binance Square account ! 🚀🔥 Binance Square #coinaute

Une Cyberattaque d'une Ampleur Historique Frappe le Système Bancaire Iranien !

🚨💥 Une cyberattaque d'une ampleur historique frappe le système bancaire iranien !
Une offensive numérique spectaculaire vient de secouer le système bancaire de la République islamique, perturbant gravement plusieurs institutions financières, y compris la Banque centrale d'Iran (CBI). D’après "Iran International", cette attaque pourrait bien être l'une des plus dévastatrices jamais orchestrées contre les infrastructures de l'Iran.
L'identité des auteurs reste mystérieuse, mais les premières analyses prévoient des répercussions économiques majeures pour un pays déjà fragilisé. Les spécialistes s’accordent à dire que cette cyberattaque pourrait aggraver la crise économique iranienne.
Rappelons qu'un incident similaire avait eu lieu en 2023, lorsque "Le Prédateur Rapace" avait paralysé une grande partie du réseau de stations-service en Iran. Les autorités iraniennes n’ont pas encore réagi officiellement, mais l’impact diplomatique et sécuritaire pourrait être considérable. Ce nouvel affrontement numérique survient alors que les tensions entre l'Iran et les puissances occidentales sont déjà élevées, notamment à cause du programme nucléaire iranien. Les spéculations sur l'origine de l'attaque s'intensifient et mettent en lumière la vulnérabilité croissante des systèmes financiers face aux menaces cybernétiques modernes.
Ne manquez pas cette actualité explosive et suivez les développements en temps réel !
#Iranian #cybercrime
❤️ Like | 💬 Comment | ↪️ Share 🚀
🔥 Please follow @Coinaute e Binance Square account ! 🚀🔥
Binance Square #coinaute
Cryptocurrency hacks are becoming more frequent and damaging, with losses from cybercrime in the crypto space surging by 21% in 2024. According to a report from Chainalysis, total losses reached an alarming $2.2 billion, marking the fourth consecutive year in which crypto hack losses have exceeded $1 billion. This rise in losses underscores the growing need for robust cybersecurity measures in the digital asset market. As the cryptocurrency industry continues to expand, it is becoming an increasingly attractive target for cybercriminals. Hacks range from wallet breaches to large-scale attacks on exchanges and smart contracts. These cybercrimes not only lead to substantial financial losses for investors but also undermine trust in the security of the entire crypto ecosystem. One of the most significant concerns is the anonymity that cryptocurrencies offer. While this feature is beneficial for privacy and decentralization, it also allows hackers to operate with relative ease, moving stolen funds across borders without easy traceability. This has led to a rise in illegal activities, such as ransomware attacks and phishing scams, that target both individual investors and large institutions. The crypto community is working tirelessly to improve security standards, with many exchanges and platforms adopting two-factor authentication, multi-signature wallets, and other security protocols to protect users. However, the constant evolution of hacking techniques means that staying ahead of cybercriminals is a continuous battle. For investors, it is crucial to stay informed about potential risks and take necessary precautions. Always use reputable exchanges, enable strong security measures, and consider using hardware wallets for storing significant amounts of cryptocurrency. As the crypto market grows, so does the importance of securing digital assets against rising threats. The future of cryptocurrency depends not only on market innovation but also on the industry’s ability to protect its users from cyberattacks. #CryptoSecurity #cryptohacks #cybercrime
Cryptocurrency hacks are becoming more frequent and damaging, with losses from cybercrime in the crypto space surging by 21% in 2024. According to a report from Chainalysis, total losses reached an alarming $2.2 billion, marking the fourth consecutive year in which crypto hack losses have exceeded $1 billion. This rise in losses underscores the growing need for robust cybersecurity measures in the digital asset market.

As the cryptocurrency industry continues to expand, it is becoming an increasingly attractive target for cybercriminals. Hacks range from wallet breaches to large-scale attacks on exchanges and smart contracts. These cybercrimes not only lead to substantial financial losses for investors but also undermine trust in the security of the entire crypto ecosystem.

One of the most significant concerns is the anonymity that cryptocurrencies offer. While this feature is beneficial for privacy and decentralization, it also allows hackers to operate with relative ease, moving stolen funds across borders without easy traceability. This has led to a rise in illegal activities, such as ransomware attacks and phishing scams, that target both individual investors and large institutions.

The crypto community is working tirelessly to improve security standards, with many exchanges and platforms adopting two-factor authentication, multi-signature wallets, and other security protocols to protect users. However, the constant evolution of hacking techniques means that staying ahead of cybercriminals is a continuous battle.

For investors, it is crucial to stay informed about potential risks and take necessary precautions. Always use reputable exchanges, enable strong security measures, and consider using hardware wallets for storing significant amounts of cryptocurrency.

As the crypto market grows, so does the importance of securing digital assets against rising threats. The future of cryptocurrency depends not only on market innovation but also on the industry’s ability to protect its users from cyberattacks.

#CryptoSecurity #cryptohacks #cybercrime
🚨 Япония разоблачила хакеров из TraderTraitor! В мае 2024 года биржа DMM Bitcoin стала жертвой кибератаки, унесшей активы на 48,2 млрд иен (~$320 млн) 💸. Хакеры использовали хитрый фишинг через LinkedIn, чтобы проникнуть во внутренние системы биржи и перевести средства на свои адреса 🕵️‍♂️. 🔎 Кто за этим стоит? TraderTraitor — группа, которую связывают с Северной Кореей 🌍. Это не первая их атака, но одна из самых громких! ❗️ Что важно знать? Будьте осторожны с неизвестными сообщениями в соцсетях 🤔. Компании должны усиливать безопасность своих систем 🛡️. 💬 А вы сталкивались с подозрительными предложениями через LinkedIn? Поделитесь своими историями! #CryptoSecurity #BitcoinHack #TraderTraitor #CyberCrime #CryptoNews
🚨 Япония разоблачила хакеров из TraderTraitor!

В мае 2024 года биржа DMM Bitcoin стала жертвой кибератаки, унесшей активы на 48,2 млрд иен (~$320 млн) 💸. Хакеры использовали хитрый фишинг через LinkedIn, чтобы проникнуть во внутренние системы биржи и перевести средства на свои адреса 🕵️‍♂️.

🔎 Кто за этим стоит?
TraderTraitor — группа, которую связывают с Северной Кореей 🌍. Это не первая их атака, но одна из самых громких!

❗️ Что важно знать?

Будьте осторожны с неизвестными сообщениями в соцсетях 🤔.

Компании должны усиливать безопасность своих систем 🛡️.

💬 А вы сталкивались с подозрительными предложениями через LinkedIn? Поделитесь своими историями!

#CryptoSecurity
#BitcoinHack
#TraderTraitor
#CyberCrime
#CryptoNews
--
Ανατιμητική
#HackerAlert : The Most Dangerous Hacker You’ve Never Heard Of: Park Jin Hyok! 🚨 💀 A ghostly figure feared by the world's biggest corporations and governments. He leaves no trace, yet his attacks reshape history. As a key member of Lazarus Group, he masterfully breaches financial systems, siphoning billions. 🔥 His most notorious cyber strikes: 🎬 Sony Pictures Hack (2014) – Hollywood in shock: classified data stolen, private emails leaked. 🏦 Bangladesh Central Bank Heist (2016) – $81M vanished in seconds through a SWIFT network breach. 💥 WannaCry Ransomware (2017) – A global cyberattack paralyzing hospitals and corporations. 💰 Bybit Crypto Heist (2025) – A staggering $1.46 billion stolen—a new record! 😱 How does he do it? He doesn’t just hack systems—he manipulates entire economies. His code is a weapon. His name is fear. And the scariest part? He’s still out there… #cybercrime
#HackerAlert : The Most Dangerous Hacker You’ve Never Heard Of: Park Jin Hyok! 🚨
💀 A ghostly figure feared by the world's biggest corporations and governments.
He leaves no trace, yet his attacks reshape history. As a key member of Lazarus Group, he masterfully breaches financial systems, siphoning billions.
🔥 His most notorious cyber strikes:
🎬 Sony Pictures Hack (2014) – Hollywood in shock: classified data stolen, private emails leaked.
🏦 Bangladesh Central Bank Heist (2016) – $81M vanished in seconds through a SWIFT network breach.
💥 WannaCry Ransomware (2017) – A global cyberattack paralyzing hospitals and corporations.
💰 Bybit Crypto Heist (2025) – A staggering $1.46 billion stolen—a new record!
😱 How does he do it?
He doesn’t just hack systems—he manipulates entire economies. His code is a weapon. His name is fear. And the scariest part? He’s still out there…
#cybercrime
🚨 The Most Dangerous Cyber Criminal You’ve Never Heard Of: Park Jin Hyok! 🚨💻 $BTC {spot}(BTCUSDT) Ek aisa cyber criminal jo headlines se door raha, lekin duniya bhar ke financial systems ko hila diya! 🇰🇵 Lazarus Group ka ek key player, Park Jin Hyok, pichle ek decade ke kuch sabse devastating cyber attacks ke peeche raha hai. 👨‍💻🔥 📉 Yeh Rahe Uske Badmashiyaan aur Chori Ki Rakam: 🎬 Sony Pictures Hack (2014) – Koi paisa nahi gaya, lekin Sony ka system poori tarah compromise ho gaya! 🎥🔓 🏦 Bangladesh Central Bank Hack (2016) – Fraudulent SWIFT transfers ke zariye $81 million uda diye! 💸💰 🦠 WannaCry Ransomware Attack (2017) – Global ransom payments se $140K kama liye! 💻💀 💥 Bybit Hack (2025) – Ab tak ka sabse bada crypto heist! Exchange se $1.46 BILLION ka chuna laga diya! 🔥🚀💸 Cybersecurity alert 🚨 – Yeh hacker abhi bhi kahin na kahin planning kar raha hoga! 🌍👀 ⚡ Trending Now: #CyberCrime #LazarusGroup #BybitHack #HackerAlert #CryptoHeist
🚨 The Most Dangerous Cyber Criminal You’ve Never Heard Of: Park Jin Hyok! 🚨💻
$BTC

Ek aisa cyber criminal jo headlines se door raha, lekin duniya bhar ke financial systems ko hila diya! 🇰🇵 Lazarus Group ka ek key player, Park Jin Hyok, pichle ek decade ke kuch sabse devastating cyber attacks ke peeche raha hai. 👨‍💻🔥

📉 Yeh Rahe Uske Badmashiyaan aur Chori Ki Rakam:

🎬 Sony Pictures Hack (2014) – Koi paisa nahi gaya, lekin Sony ka system poori tarah compromise ho gaya! 🎥🔓

🏦 Bangladesh Central Bank Hack (2016) – Fraudulent SWIFT transfers ke zariye $81 million uda diye! 💸💰

🦠 WannaCry Ransomware Attack (2017) – Global ransom payments se $140K kama liye! 💻💀

💥 Bybit Hack (2025) – Ab tak ka sabse bada crypto heist! Exchange se $1.46 BILLION ka chuna laga diya! 🔥🚀💸

Cybersecurity alert 🚨 – Yeh hacker abhi bhi kahin na kahin planning kar raha hoga! 🌍👀

⚡ Trending Now: #CyberCrime #LazarusGroup #BybitHack #HackerAlert #CryptoHeist
Singaporean Woman Sentenced to Nearly 10 Years for Stealing $4.2 Million from BybitFormer Payroll Manager Misused Company Funds Ho Kai Xin, a former outsourcing payroll manager, has been sentenced to nine years and 11 months in prison for embezzling $4.2 million from cryptocurrency exchange Bybit. According to Strait Times, the 32-year-old woman pleaded guilty to five counts of fraud, eight counts of benefiting from criminal proceeds, and one count of providing false information to a public officer. During her trial, 30 additional charges were considered before the final verdict. The court found that Ho used the stolen funds to finance a luxurious lifestyle. Between June 2022, she illegally withdrew SGD 5.7 million ($4.2 million) from Bybit Fintech. 📉 The embezzlement was carried out by manipulating Microsoft Excel spreadsheets while processing payroll for over 900 Bybit employees between October 2021 and October 2022. Ho Kai Xin Previously Jailed for Violating Court Order In addition to her primary sentence, Ho had already been sentenced to six weeks in prison for ignoring a court order and continuing to spend stolen funds. 🔹 Despite a civil court ruling that prohibited her from using the funds, she spent SGD 840,000 ($627,633) on luxury goods and a penthouse. 🔹 Her longer prison term will begin only after she completes these six weeks. How Ho Stole $4.2 Million from Bybit According to Deputy Public Prosecutor Jeremy Bin, Ho used the stolen funds to buy luxury items, including sunglasses, handbags, shoes, shirts, and jewelry from Louis Vuitton. She also placed a down payment of SGD 750,000 ($560,388) on a penthouse worth over SGD 3.7 million ($2.7 million). 📉 Her first theft occurred in May 2022, when she stole SGD 117,000 ($87,417) from Wechain, a company handling payroll processing for Bybit employees. Ho manipulated Excel spreadsheets to redirect funds from company accounts to her personal bank accounts. 🗣 "When she realized her fraud went undetected, she became emboldened and escalated her scheme to siphon funds from Bybit," prosecutor Bin stated. A Sophisticated Scheme of Theft and Money Laundering Ho operated six bank accounts and four cryptocurrency wallets on different platforms. 🔹 She altered payment records in Excel to ensure that payroll payments were sent to her crypto wallets instead of Bybit employees' wallets. 🔹 Between May and August 2022, Bybit processed eight crypto transfers totaling over 4.2 million USDT to her wallets. 🔹 She then converted the stolen crypto funds into fiat currency and used complex transfers to launder the money. 📉 Her crimes were exposed in September 2022, when Wechain’s CFO noticed unusually large crypto transactions. 🛑 An internal investigation uncovered discrepancies, leading Wechain to report Ho to the police in February 2023. She was arrested two months later. The Consequences and Long Road to Conviction Ho Kai Xin managed to conceal her fraudulent activities for several months, but her extravagant spending and suspicious transactions eventually raised red flags. ⚖ In April 2023, she was formally charged, and after more than a year of legal proceedings, she has now been sentenced to nearly 10 years in prison. 🔹 Bybit is currently working to recover the stolen funds, but a portion remains untraceable due to money laundering techniques. 🔹 This case serves as a stark warning for crypto companies about the security risks involved in internal fund management. #CryptoScamAlert , #CryptoFraud , #Singapore , #blockchain , #cybercrime Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Singaporean Woman Sentenced to Nearly 10 Years for Stealing $4.2 Million from Bybit

Former Payroll Manager Misused Company Funds
Ho Kai Xin, a former outsourcing payroll manager, has been sentenced to nine years and 11 months in prison for embezzling $4.2 million from cryptocurrency exchange Bybit.
According to Strait Times, the 32-year-old woman pleaded guilty to five counts of fraud, eight counts of benefiting from criminal proceeds, and one count of providing false information to a public officer. During her trial, 30 additional charges were considered before the final verdict.
The court found that Ho used the stolen funds to finance a luxurious lifestyle. Between June 2022, she illegally withdrew SGD 5.7 million ($4.2 million) from Bybit Fintech.
📉 The embezzlement was carried out by manipulating Microsoft Excel spreadsheets while processing payroll for over 900 Bybit employees between October 2021 and October 2022.
Ho Kai Xin Previously Jailed for Violating Court Order
In addition to her primary sentence, Ho had already been sentenced to six weeks in prison for ignoring a court order and continuing to spend stolen funds.
🔹 Despite a civil court ruling that prohibited her from using the funds, she spent SGD 840,000 ($627,633) on luxury goods and a penthouse.
🔹 Her longer prison term will begin only after she completes these six weeks.
How Ho Stole $4.2 Million from Bybit
According to Deputy Public Prosecutor Jeremy Bin, Ho used the stolen funds to buy luxury items, including sunglasses, handbags, shoes, shirts, and jewelry from Louis Vuitton.
She also placed a down payment of SGD 750,000 ($560,388) on a penthouse worth over SGD 3.7 million ($2.7 million).
📉 Her first theft occurred in May 2022, when she stole SGD 117,000 ($87,417) from Wechain, a company handling payroll processing for Bybit employees.
Ho manipulated Excel spreadsheets to redirect funds from company accounts to her personal bank accounts.
🗣 "When she realized her fraud went undetected, she became emboldened and escalated her scheme to siphon funds from Bybit," prosecutor Bin stated.
A Sophisticated Scheme of Theft and Money Laundering
Ho operated six bank accounts and four cryptocurrency wallets on different platforms.
🔹 She altered payment records in Excel to ensure that payroll payments were sent to her crypto wallets instead of Bybit employees' wallets.
🔹 Between May and August 2022, Bybit processed eight crypto transfers totaling over 4.2 million USDT to her wallets.
🔹 She then converted the stolen crypto funds into fiat currency and used complex transfers to launder the money.
📉 Her crimes were exposed in September 2022, when Wechain’s CFO noticed unusually large crypto transactions.
🛑 An internal investigation uncovered discrepancies, leading Wechain to report Ho to the police in February 2023. She was arrested two months later.
The Consequences and Long Road to Conviction
Ho Kai Xin managed to conceal her fraudulent activities for several months, but her extravagant spending and suspicious transactions eventually raised red flags.
⚖ In April 2023, she was formally charged, and after more than a year of legal proceedings, she has now been sentenced to nearly 10 years in prison.
🔹 Bybit is currently working to recover the stolen funds, but a portion remains untraceable due to money laundering techniques.
🔹 This case serves as a stark warning for crypto companies about the security risks involved in internal fund management.

#CryptoScamAlert , #CryptoFraud , #Singapore , #blockchain , #cybercrime

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Skandal Sepasang Kekasih Mencuri 119.754 Bitcoin. Lichtenstein, meretas jaringan Bitfinex pada tahun 2016, menggunakan alat dan teknik peretasan yang canggih. Begitu masuk ke dalam jaringan, Lichtenstein secara curang mengizinkan lebih dari 2.000 transaksi yang mentransfer 119.754 bitcoin dari Bitfinex ke dompet mata uang kripto yang berada dalam kendali Lichtenstein. Lichtenstein kemudian mengambil langkah-langkah untuk menutupi jejaknya dengan menghapus kredensial akses jaringan Bitfinex dan berkas log lainnya yang dapat mengungkapkan perilakunya kepada penegak hukum. Setelah peretasan tersebut, Lichtenstein meminta bantuan istrinya, Heather Morgan, untuk mencuci uang yang dicuri. Lichtenstein, terkadang dengan bantuan Morgan, menggunakan sejumlah teknik pencucian uang yang canggih, termasuk menggunakan identitas fiktif untuk membuat akun daring; memanfaatkan program komputer untuk mengotomatiskan transaksi; menyetorkan dana curian ke dalam akun di berbagai pasar darknet dan bursa mata uang kripto, lalu menarik dana tersebut; mengonversi bitcoin ke bentuk mata uang kripto lain dalam praktik yang dikenal sebagai "chain hopping"; menyetorkan sebagian hasil kejahatan ke layanan pencampuran mata uang kripto; menggunakan akun bisnis berbasis di AS untuk melegitimasi aktivitas perbankan Lichtenstein dan Morgan; dan menukarkan sebagian dana curian menjadi koin emas. #Hacker #cybercrime $BTC {spot}(BTCUSDT)
Skandal Sepasang Kekasih Mencuri 119.754 Bitcoin.

Lichtenstein, meretas jaringan Bitfinex pada tahun 2016, menggunakan alat dan teknik peretasan yang canggih. Begitu masuk ke dalam jaringan, Lichtenstein secara curang mengizinkan lebih dari 2.000 transaksi yang mentransfer 119.754 bitcoin dari Bitfinex ke dompet mata uang kripto yang berada dalam kendali Lichtenstein. Lichtenstein kemudian mengambil langkah-langkah untuk menutupi jejaknya dengan menghapus kredensial akses jaringan Bitfinex dan berkas log lainnya yang dapat mengungkapkan perilakunya kepada penegak hukum. Setelah peretasan tersebut, Lichtenstein meminta bantuan istrinya, Heather Morgan, untuk mencuci uang yang dicuri.

Lichtenstein, terkadang dengan bantuan Morgan, menggunakan sejumlah teknik pencucian uang yang canggih, termasuk menggunakan identitas fiktif untuk membuat akun daring; memanfaatkan program komputer untuk mengotomatiskan transaksi; menyetorkan dana curian ke dalam akun di berbagai pasar darknet dan bursa mata uang kripto, lalu menarik dana tersebut; mengonversi bitcoin ke bentuk mata uang kripto lain dalam praktik yang dikenal sebagai "chain hopping"; menyetorkan sebagian hasil kejahatan ke layanan pencampuran mata uang kripto; menggunakan akun bisnis berbasis di AS untuk melegitimasi aktivitas perbankan Lichtenstein dan Morgan; dan menukarkan sebagian dana curian menjadi koin emas.

#Hacker #cybercrime $BTC
🚨🚨 $1.5 Billion Cryptocurrency Hack! A devastating cyberattack has resulted in the theft of over 400,000 ETH and stETH worth a staggering $1.5 billion! The hackers exploited a potential vulnerability in a user interface, altering the smart contract logic and gaining control of the ETH Cold Wallet. Bybit assures users that their cryptocurrency holdings are safe, despite possible delays in processing withdrawals. The exchange claims to have more than enough assets to cover the loss, with AUM exceeding $20 billion. This massive hack is a stark reminder of the growing threat of cryptocurrency crime. According to Chainalysis, cryptocurrency criminal activity surged in 2024, with $2.2 billion stolen - a 20% year-over-year increase. #CryptocurrencySecurity #cybercrime #NavigatingAlpha2.0
🚨🚨 $1.5 Billion Cryptocurrency Hack!

A devastating cyberattack has resulted in the theft of over 400,000 ETH and stETH worth a staggering $1.5 billion!

The hackers exploited a potential vulnerability in a user interface, altering the smart contract logic and gaining control of the ETH Cold Wallet.

Bybit assures users that their cryptocurrency holdings are safe, despite possible delays in processing withdrawals. The exchange claims to have more than enough assets to cover the loss, with AUM exceeding $20 billion.

This massive hack is a stark reminder of the growing threat of cryptocurrency crime. According to Chainalysis, cryptocurrency criminal activity surged in 2024, with $2.2 billion stolen - a 20% year-over-year increase.

#CryptocurrencySecurity #cybercrime #NavigatingAlpha2.0
Συνδεθείτε για να εξερευνήσετε περισσότερα περιεχόμενα
Εξερευνήστε τα τελευταία νέα για τα κρύπτο
⚡️ Συμμετέχετε στις πιο πρόσφατες συζητήσεις για τα κρύπτο
💬 Αλληλεπιδράστε με τους αγαπημένους σας δημιουργούς
👍 Απολαύστε περιεχόμενο που σας ενδιαφέρει
Διεύθυνση email/αριθμός τηλεφώνου