Binance Square
ScamRiskWarning
5.6M views
1,642 Posts
Hot
Latest
LIVE
0x8o0M
--
Bias antara Tron & Ton sebagai umpan pengelabuan dan mereka akan berdalih "Eligible Procedure"... đŸ«Ł BullSh!t 👀 Sudahlah, lupakan mengerjakan semua AirDrop untuk setiap akhir tahun karena biasanya mereka scammer 😁 contoh nyata 👉 #REVOXAIRDROP yang jelas-jelas peserta BNBCHAIN CATALYST AWARDS itu SCAM ! puihhh.... @revox hanya menjual data penggunanya ke pihak ketiga untuk keuntungan sendiri. đŸ€” #ScamRiskWarning #CristmasMarketAnalysis
Bias antara Tron & Ton sebagai umpan pengelabuan dan mereka akan berdalih "Eligible Procedure"... đŸ«Ł BullSh!t 👀
Sudahlah, lupakan mengerjakan semua AirDrop untuk setiap akhir tahun karena biasanya mereka scammer 😁 contoh nyata 👉 #REVOXAIRDROP yang jelas-jelas peserta BNBCHAIN CATALYST AWARDS itu SCAM ! puihhh.... @REVOX hanya menjual data penggunanya ke pihak ketiga untuk keuntungan sendiri. đŸ€”

#ScamRiskWarning #CristmasMarketAnalysis
LIVE
Crypto Scoop
--
🚹 Beware: The Truth About Tronkeeper Scams! 🚹

Have you seen posts about claiming rewards on platforms like Tronkeeper? It might look tempting, but let’s break it down and uncover the truth behind their claims.

What They’re Saying:

According to their post:
1ïžâƒŁ Enter your USDT (TRC20) wallet and submit.
2ïžâƒŁ Pay a fee to claim your rewards, supposedly to cover "blockchain transfer costs."
They claim these fees are necessary to maintain smooth transactions for "millions of users."

Sounds professional, right? đŸ€” But there’s a catch, and users have started exposing it!

What Users Are Exposing:

đŸ”č Fee Mismatch: They demand 5 TON as a "gas fee" for withdrawing your $200. But here’s the issue—TON and TRON are two completely different blockchains! They cannot use TON to cover gas fees on TRON. This technical inconsistency screams red flag.

đŸ”č Community Feedback:
â–ȘYou want me to pay 5 TON to withdraw $200? That makes no sense!

â–ȘIf it’s legitimate, deduct the fee from my balance instead of asking for more money.

â–ȘAnything that requires paying money to receive money is pure scam behavior.

Why This is Dangerous

1ïžâƒŁ No Guarantee of Payouts: Once you send your money, it’s unlikely you’ll ever see your rewards.
2ïžâƒŁ Exploiting Trust: Scammers use technical jargon to confuse users into thinking it’s a legitimate transaction.
3ïžâƒŁ Loss of Funds: People spend time and effort accumulating these so-called rewards, only to be asked for fees they cannot recover.

How to Protect Yourself

🚹 Do Your Research: Always verify the platform’s credibility.
🚹 Understand Blockchain Basics: TON and TRON are different; knowing this can help you spot inconsistencies.
🚹 Avoid Upfront Payments: If you need to send money to receive money, it’s likely a scam.

Final Thought:

These scammers rely on trust and confusion to exploit users. Stay informed, share this knowledge, and protect yourself from falling for their tricks! 💡

⚠ Share this post to warn others!đŸ’Ș#scamriskwarning
💡QUICK TIP TO AVOID BEING ABUSED BY AIRDROPS💡 Exit from all airdrops that: - Contain alot of $TON transactions. - Change their toknomics. - Has youtubers/influencers involvment in advertisement. - Delaying dates (especially when the market is in bullish trend) - Has plans to launch exchange. A question that is being emphasized by influencers or in your own head you think that "Airdrops giveaways are free so why dont we just keep patience and keep farming?". This is the trickiest yet easiest riddle to solve but people don't pay attention. They just want you to keep playing their airdrops while they play with you by dropping $TON transactions, delaying dates till they gain enough popularity to make deals with bigger projects, companies and exchanges. Only youtubers/influencers and the project's team benefit from this not you! Take your time and think through before joining any airdrop. Your time is precious as gold, do not give it away for free. #scamriskwarning #ScamAwareness #AirdropAlert #AirdropScam
💡QUICK TIP TO AVOID BEING ABUSED BY AIRDROPS💡

Exit from all airdrops that:

- Contain alot of $TON transactions.
- Change their toknomics.
- Has youtubers/influencers involvment in advertisement.
- Delaying dates (especially when the market is in bullish trend)
- Has plans to launch exchange.

A question that is being emphasized by influencers or in your own head you think that "Airdrops giveaways are free so why dont we just keep patience and keep farming?".

This is the trickiest yet easiest riddle to solve but people don't pay attention.

They just want you to keep playing their airdrops while they play with you by dropping $TON transactions, delaying dates till they gain enough popularity to make deals with bigger projects, companies and exchanges.

Only youtubers/influencers and the project's team benefit from this not you!

Take your time and think through before joining any airdrop.

Your time is precious as gold, do not give it away for free.

#scamriskwarning #ScamAwareness #AirdropAlert #AirdropScam
#scamriskwarning #BtcNewHolder Bitcoin and Crypto Markets Dip As North Korean Hacking Threat Triggers $112,000,000 in Outflows From Hyperliquid At the tail end of the weekend, well-known blockchain security expert Taylor Monahan who works for crypto wallet MetaMask reported that several addresses linked to the DPRK were trading on Hyperliquid, a decentralized perpetuals exchange with its own chain. Monahan said the North Koreans were likely testing out the network before considering it as a target for their next attack. In its Discord channel, Hyperliquid disagreed with Monahan’s analysis and said that there was no threat from the DPRK. “We are aware of reports circulating regarding activity by supposed DPRK addresses. There has been no DPRK exploit – or any exploit for that matter – of Hyperliquid. All user funds are accounted for. Hyperliquid Labs takes opsec seriously. No vulnerabilities have been shared by any party.” However, HYPE, Hyperliquid’s native token, dropped nearly 20% while the exchange suffered nearly $113 million in stablecoin outflows, according to blockchain analytics platform Dune. HYPE has since stabilized and is currently trading at $26.75 with a market cap of $9.1 billion, and it’s correction is more or less in line with the rest of the crypto markets. Earlier this month, the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) said it was dismantling North Korea’s digital asset money laundering network by sanctioning Chinese nationals Lu Huaying and Zhang Jian who used a front company in the United Arab Emirates (UAE) to launder illicit money and convert crypto funds for the DPRK. Says Acting Under Secretary of the Treasury for Terrorism and Financial Intelligence Bradley T. Smith, “As the DPRK continues to use complex criminal schemes to fund its WMD and ballistic missile programs—including through the exploitation of digital assets—Treasury remains focused on disrupting the networks that facilitate this flow of funds to the regime.” More interesting news – subscribe $BTC
#scamriskwarning #BtcNewHolder

Bitcoin and Crypto Markets Dip As North Korean Hacking Threat Triggers $112,000,000 in Outflows From Hyperliquid

At the tail end of the weekend, well-known blockchain security expert Taylor Monahan who works for crypto wallet MetaMask reported that several addresses linked to the DPRK were trading on Hyperliquid, a decentralized perpetuals exchange with its own chain.
Monahan said the North Koreans were likely testing out the network before considering it as a target for their next attack.
In its Discord channel, Hyperliquid disagreed with Monahan’s analysis and said that there was no threat from the DPRK.
“We are aware of reports circulating regarding activity by supposed DPRK addresses. There has been no DPRK exploit – or any exploit for that matter – of Hyperliquid. All user funds are accounted for. Hyperliquid Labs takes opsec seriously. No vulnerabilities have been shared by any party.”
However, HYPE, Hyperliquid’s native token, dropped nearly 20% while the exchange suffered nearly $113 million in stablecoin outflows, according to blockchain analytics platform Dune.
HYPE has since stabilized and is currently trading at $26.75 with a market cap of $9.1 billion, and it’s correction is more or less in line with the rest of the crypto markets.
Earlier this month, the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) said it was dismantling North Korea’s digital asset money laundering network by sanctioning Chinese nationals Lu Huaying and Zhang Jian who used a front company in the United Arab Emirates (UAE) to launder illicit money and convert crypto funds for the DPRK.
Says Acting Under Secretary of the Treasury for Terrorism and Financial Intelligence Bradley T. Smith,
“As the DPRK continues to use complex criminal schemes to fund its WMD and ballistic missile programs—including through the exploitation of digital assets—Treasury remains focused on disrupting the networks that facilitate this flow of funds to the regime.”

More interesting news – subscribe

$BTC
🚹 Beware: The Truth About Tronkeeper Scams! 🚹 Have you seen posts about claiming rewards on platforms like Tronkeeper? It might look tempting, but let’s break it down and uncover the truth behind their claims. What They’re Saying: According to their post: 1ïžâƒŁ Enter your USDT (TRC20) wallet and submit. 2ïžâƒŁ Pay a fee to claim your rewards, supposedly to cover "blockchain transfer costs." They claim these fees are necessary to maintain smooth transactions for "millions of users." Sounds professional, right? đŸ€” But there’s a catch, and users have started exposing it! What Users Are Exposing: đŸ”č Fee Mismatch: They demand 5 TON as a "gas fee" for withdrawing your $200. But here’s the issue—TON and TRON are two completely different blockchains! They cannot use TON to cover gas fees on TRON. This technical inconsistency screams red flag. đŸ”č Community Feedback: â–ȘYou want me to pay 5 TON to withdraw $200? That makes no sense! â–ȘIf it’s legitimate, deduct the fee from my balance instead of asking for more money. â–ȘAnything that requires paying money to receive money is pure scam behavior. Why This is Dangerous 1ïžâƒŁ No Guarantee of Payouts: Once you send your money, it’s unlikely you’ll ever see your rewards. 2ïžâƒŁ Exploiting Trust: Scammers use technical jargon to confuse users into thinking it’s a legitimate transaction. 3ïžâƒŁ Loss of Funds: People spend time and effort accumulating these so-called rewards, only to be asked for fees they cannot recover. How to Protect Yourself 🚹 Do Your Research: Always verify the platform’s credibility. 🚹 Understand Blockchain Basics: TON and TRON are different; knowing this can help you spot inconsistencies. 🚹 Avoid Upfront Payments: If you need to send money to receive money, it’s likely a scam. Final Thought: These scammers rely on trust and confusion to exploit users. Stay informed, share this knowledge, and protect yourself from falling for their tricks! 💡 ⚠ Share this post to warn others!đŸ’Ș#scamriskwarning
🚹 Beware: The Truth About Tronkeeper Scams! 🚹

Have you seen posts about claiming rewards on platforms like Tronkeeper? It might look tempting, but let’s break it down and uncover the truth behind their claims.

What They’re Saying:

According to their post:
1ïžâƒŁ Enter your USDT (TRC20) wallet and submit.
2ïžâƒŁ Pay a fee to claim your rewards, supposedly to cover "blockchain transfer costs."
They claim these fees are necessary to maintain smooth transactions for "millions of users."

Sounds professional, right? đŸ€” But there’s a catch, and users have started exposing it!

What Users Are Exposing:

đŸ”č Fee Mismatch: They demand 5 TON as a "gas fee" for withdrawing your $200. But here’s the issue—TON and TRON are two completely different blockchains! They cannot use TON to cover gas fees on TRON. This technical inconsistency screams red flag.

đŸ”č Community Feedback:
â–ȘYou want me to pay 5 TON to withdraw $200? That makes no sense!

â–ȘIf it’s legitimate, deduct the fee from my balance instead of asking for more money.

â–ȘAnything that requires paying money to receive money is pure scam behavior.

Why This is Dangerous

1ïžâƒŁ No Guarantee of Payouts: Once you send your money, it’s unlikely you’ll ever see your rewards.
2ïžâƒŁ Exploiting Trust: Scammers use technical jargon to confuse users into thinking it’s a legitimate transaction.
3ïžâƒŁ Loss of Funds: People spend time and effort accumulating these so-called rewards, only to be asked for fees they cannot recover.

How to Protect Yourself

🚹 Do Your Research: Always verify the platform’s credibility.
🚹 Understand Blockchain Basics: TON and TRON are different; knowing this can help you spot inconsistencies.
🚹 Avoid Upfront Payments: If you need to send money to receive money, it’s likely a scam.

Final Thought:

These scammers rely on trust and confusion to exploit users. Stay informed, share this knowledge, and protect yourself from falling for their tricks! 💡

⚠ Share this post to warn others!đŸ’Ș#scamriskwarning
Giovanna Rolstad vHcc:
Thanks for the info
Blum🍋🍋đŸ€Ș So, here’s my new record in Blum! A Christmas event is currently underway, so if you believe in Blum or, like me, play out of boredom, this is your chance to beat my record! #Blum #BlumRecord #ScamRiskWarning
Blum🍋🍋đŸ€Ș
So, here’s my new record in Blum!
A Christmas event is currently underway, so if you believe in Blum or, like me, play out of boredom, this is your chance to beat my record!

#Blum #BlumRecord #ScamRiskWarning
--
Bullish
🚹 Nigerian Crypto-Romance Scams: A Wake-Up Call 🚹 🌮 Cairns Romance Scam: 60yo Woman Loses $200k to Online Fraudster đŸ˜± 💔 Scam Details: - 60-year-old woman from Cairns, Australia, met a scammer on a dating app 💘 - Scammer posed as a US soldier, gained her trust, and asked for crypto investments 💾 - Woman lost $200,000 to the scammer, leaving her financially devastated 😱 📊 Alarming Stats: - 1 in 5 Australians have been targeted by romance scams 📊 - $200 million lost to romance scams in Australia in 2022 💾 - Nigerian crypto-romance scams are on the rise, targeting vulnerable individuals worldwide 🌎 đŸš« Red Flags: - Unrealistic or generic profiles 💔 - Quick requests for crypto or financial info 🚹 - Poor grammar or inconsistent communication 📝 🔒 Protect Yourself: - Verify profiles and research potential partners 🔍 - Never send crypto or financial info to strangers đŸš« - Use reputable dating apps/sites and report suspicious activity 📊 đŸ€ Report Scams: - File a complaint with the Australian Competition and Consumer Commission (ACCC) or local authorities 📊 - Share your story to help others avoid similar scams 💬 Stay vigilant and prioritize your online safety! đŸ’»đŸ”’ $BTC {spot}(BTCUSDT) $COMP {spot}(COMPUSDT) $NEXO {spot}(NEXOUSDT) #BinanceLaunchpoolBIO #BinanceAlphaAlert #MicroStrategyInNasdaq100 #scamriskwarning #Write2Earn
🚹 Nigerian Crypto-Romance Scams: A Wake-Up Call 🚹

🌮 Cairns Romance Scam: 60yo Woman Loses $200k to Online Fraudster đŸ˜±

💔 Scam Details:

- 60-year-old woman from Cairns, Australia, met a scammer on a dating app 💘
- Scammer posed as a US soldier, gained her trust, and asked for crypto investments 💾
- Woman lost $200,000 to the scammer, leaving her financially devastated 😱

📊 Alarming Stats:

- 1 in 5 Australians have been targeted by romance scams 📊
- $200 million lost to romance scams in Australia in 2022 💾
- Nigerian crypto-romance scams are on the rise, targeting vulnerable individuals worldwide 🌎

đŸš« Red Flags:

- Unrealistic or generic profiles 💔
- Quick requests for crypto or financial info 🚹
- Poor grammar or inconsistent communication 📝

🔒 Protect Yourself:

- Verify profiles and research potential partners 🔍
- Never send crypto or financial info to strangers đŸš«
- Use reputable dating apps/sites and report suspicious activity 📊

đŸ€ Report Scams:

- File a complaint with the Australian Competition and Consumer Commission (ACCC) or local authorities 📊
- Share your story to help others avoid similar scams 💬

Stay vigilant and prioritize your online safety! đŸ’»đŸ”’

$BTC
$COMP
$NEXO
#BinanceLaunchpoolBIO #BinanceAlphaAlert #MicroStrategyInNasdaq100 #scamriskwarning #Write2Earn
Critical Analysis of the "Act I: The AI Prophecy" ($ACT) Project: Scam or Not?$SOL {spot}(SOLUSDT) The cryptocurrency market has recently witnessed significant controversy surrounding the legitimacy of the "Act I: The AI Prophecy" ($ACT) token. The token faces accusations of being a scam. In this article, we provide a comprehensive analysis of the project based on the available evidence, offering a critical review supported by credible sources. 1. Allegations and Accusations: 1.1 Intellectual Property Theft Allegations: According to "Cyborgism Wiki," the $ACT project is accused of appropriating ideas and trademarks from an original developer who had withdrawn from the project. These claims suggest unauthorized use of the original project's materials. Source: Cyborgism Wiki - ACT 1.2 Fraud Allegations: Reports circulating on social media platforms and cryptocurrency forums like "Bitcointalk" claim that the project team comprises individuals with unclear backgrounds, raising further doubts about their intentions. Source: Bitcointalk Forum$XRP {spot}(XRPUSDT) 2. Project Analysis: 2.1 Official Documents and Future Plans: Whitepaper: A review of the project's technical document reveals that the provided information is vague, lacking clear technical details or a roadmap.Source: Whitepaper of the $ACT project (Note: The link to the whitepaper should be verified directly from the project website or trusted forums).Lack of Transparency: No information is available regarding the founding team or their professional backgrounds. 2.2 Financial Activities and Suspicious Practices: Sudden Price Surge: As reported by "Crypto Times," the token experienced an unjustified 2000% price surge after being listed on Binance, raising concerns about potential market manipulation.Source: Crypto TimesRandom Token Distribution: Several reports highlight that users received large quantities of the token unsolicited, a common tactic used to deceive investors.Source: CoinDesk 3. Community Warnings and Independent Sources: Cryptocurrency Forums: On forums like "Gate.io," users have described the token as fraudulent, citing the absence of real utility or sustainable development.Source: Gate.io ForumExpert Reports: No reputable institutions have released reports endorsing the project’s credibility.Source: Bitcoin Magazine 4. Criteria for Identifying Scams: To determine whether the project is a scam, its behaviors were compared to common scam patterns: Unrealistic Returns Promises: There is no tangible product or service supporting the promised outcomes.Source: CoinTelegraphLack of Transparency: The founding team remains anonymous, and there are no clear plans for the future.Source: DecryptSuspicious Market Activities: Evident market manipulation and sudden price increases.Source: CryptoSlate Conclusion and Recommendations: Based on the available evidence, "Act I: The AI Prophecy" ($ACT) exhibits all signs indicative of being a scam: Lack of transparency.Intellectual property theft allegations.Unjustified and suspicious activities. Recommendation: Investors are advised to avoid this token unless independent reports and analyses substantiate its credibility. Caution should always be exercised when dealing with cryptocurrency projects that lack transparency and reliability. References: Solscan Token Overview: Solscan Token OverviewCyborgism Wiki - ACT: Cyborgism Wiki - ACTCrypto Times: Crypto TimesBitcointalk Forum: Bitcointalk ForumGate.io Forum: Gate.io ForumBitcoin Magazine: Bitcoin MagazineCoinDesk: CoinDeskCoinTelegraph: CoinTelegraphDecrypt: DecryptCryptoSlate: CryptoSlate #BinanceSquareFamily #ACTCoin #altsesaon #ScamRiskWarning #BTCNextMove

Critical Analysis of the "Act I: The AI Prophecy" ($ACT) Project: Scam or Not?

$SOL

The cryptocurrency market has recently witnessed significant controversy surrounding the legitimacy of the "Act I: The AI Prophecy" ($ACT) token. The token faces accusations of being a scam. In this article, we provide a comprehensive analysis of the project based on the available evidence, offering a critical review supported by credible sources.
1. Allegations and Accusations:
1.1 Intellectual Property Theft Allegations:
According to "Cyborgism Wiki," the $ACT project is accused of appropriating ideas and trademarks from an original developer who had withdrawn from the project. These claims suggest unauthorized use of the original project's materials.
Source: Cyborgism Wiki - ACT
1.2 Fraud Allegations:
Reports circulating on social media platforms and cryptocurrency forums like "Bitcointalk" claim that the project team comprises individuals with unclear backgrounds, raising further doubts about their intentions.
Source: Bitcointalk Forum$XRP 2. Project Analysis:
2.1 Official Documents and Future Plans:
Whitepaper: A review of the project's technical document reveals that the provided information is vague, lacking clear technical details or a roadmap.Source: Whitepaper of the $ACT project (Note: The link to the whitepaper should be verified directly from the project website or trusted forums).Lack of Transparency: No information is available regarding the founding team or their professional backgrounds.
2.2 Financial Activities and Suspicious Practices:
Sudden Price Surge: As reported by "Crypto Times," the token experienced an unjustified 2000% price surge after being listed on Binance, raising concerns about potential market manipulation.Source: Crypto TimesRandom Token Distribution: Several reports highlight that users received large quantities of the token unsolicited, a common tactic used to deceive investors.Source: CoinDesk
3. Community Warnings and Independent Sources:
Cryptocurrency Forums: On forums like "Gate.io," users have described the token as fraudulent, citing the absence of real utility or sustainable development.Source: Gate.io ForumExpert Reports: No reputable institutions have released reports endorsing the project’s credibility.Source: Bitcoin Magazine
4. Criteria for Identifying Scams:
To determine whether the project is a scam, its behaviors were compared to common scam patterns:
Unrealistic Returns Promises: There is no tangible product or service supporting the promised outcomes.Source: CoinTelegraphLack of Transparency: The founding team remains anonymous, and there are no clear plans for the future.Source: DecryptSuspicious Market Activities: Evident market manipulation and sudden price increases.Source: CryptoSlate
Conclusion and Recommendations:
Based on the available evidence, "Act I: The AI Prophecy" ($ACT) exhibits all signs indicative of being a scam:
Lack of transparency.Intellectual property theft allegations.Unjustified and suspicious activities.
Recommendation: Investors are advised to avoid this token unless independent reports and analyses substantiate its credibility. Caution should always be exercised when dealing with cryptocurrency projects that lack transparency and reliability.
References:
Solscan Token Overview: Solscan Token OverviewCyborgism Wiki - ACT: Cyborgism Wiki - ACTCrypto Times: Crypto TimesBitcointalk Forum: Bitcointalk ForumGate.io Forum: Gate.io ForumBitcoin Magazine: Bitcoin MagazineCoinDesk: CoinDeskCoinTelegraph: CoinTelegraphDecrypt: DecryptCryptoSlate: CryptoSlate

#BinanceSquareFamily

#ACTCoin

#altsesaon

#ScamRiskWarning

#BTCNextMove
Kiara Driever OoXd:
i see the team in x make so good he is working
#ScamRiskWarning Treasury Department Disrupts North Korean Crypto Money Laundering Operation Using UAE-Based Shell Company The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) says it is dismantling North Korea’s digital asset money laundering network by taking action against individuals and entities involved in the operation. In a statement, the OFAC says it is sanctioning Chinese nationals Lu Huaying and Zhang Jian who worked for the network that used a front company in the United Arab Emirates (UAE) to launder illicit money and convert crypto funds for North Korea. The OFAC says the Hermit Kingdom is using agents and proxies to access the international financial system and engage in illicit revenue generation schemes such as conducting fraudulent IT work and stealing digital assets. The agency says representatives set up shell companies and manage bank accounts to move and disguise funds that will be used to finance North Korea’s unlawful weapons of mass destruction (WMD) and ballist1c missile programs. Says Acting Under Secretary of the Treasury for Terrorism and Financial Intelligence Bradley T. Smith, “As the DPRK continues to use complex criminal schemes to fund its WMD and ballist1c missile programs—including through the exploitation of digital assets—Treasury remains focused on disrupting the networks that facilitate this flow of funds to the regime.” The OFAC says Lu cashed out crypto from North Korea’s revenue-generation projects into fiat on behalf of the OFAC-sanctioned Sim Hyon Sop, who leads the laundering network. Zhang helped facilitate the exchange of fiat currency and served as a courier for Sim. The OFAC is also sanctioning Green Alpine Trading, the UAE-based shell company used by the laundering network. More interesting news – subscribe – I will be grateful for tips $USDC
#ScamRiskWarning

Treasury Department Disrupts North Korean Crypto Money Laundering Operation Using UAE-Based Shell Company

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) says it is dismantling North Korea’s digital asset money laundering network by taking action against individuals and entities involved in the operation.
In a statement, the OFAC says it is sanctioning Chinese nationals Lu Huaying and Zhang Jian who worked for the network that used a front company in the United Arab Emirates (UAE) to launder illicit money and convert crypto funds for North Korea.
The OFAC says the Hermit Kingdom is using agents and proxies to access the international financial system and engage in illicit revenue generation schemes such as conducting fraudulent IT work and stealing digital assets.
The agency says representatives set up shell companies and manage bank accounts to move and disguise funds that will be used to finance North Korea’s unlawful weapons of mass destruction (WMD) and ballist1c missile programs.
Says Acting Under Secretary of the Treasury for Terrorism and Financial Intelligence Bradley T. Smith,
“As the DPRK continues to use complex criminal schemes to fund its WMD and ballist1c missile programs—including through the exploitation of digital assets—Treasury remains focused on disrupting the networks that facilitate this flow of funds to the regime.”
The OFAC says Lu cashed out crypto from North Korea’s revenue-generation projects into fiat on behalf of the OFAC-sanctioned Sim Hyon Sop, who leads the laundering network.
Zhang helped facilitate the exchange of fiat currency and served as a courier for Sim.
The OFAC is also sanctioning Green Alpine Trading, the UAE-based shell company used by the laundering network.

More interesting news – subscribe – I will be grateful for tips

$USDC
--
LIVE
TIGRE_48
--
Esta navidad 🎄 , trae muchos regalos đŸ„łđŸŽ .

Pero tambiĂ©n muchas estafas đŸ‘źâ€â™‚ïžđŸš“đŸšš .

Por eso te recordamos ✍ ( Ten cuidado ⚠ )

✋ No participes de cualquier sorteo đŸš«

✋ No compartas tu informaciĂłn đŸš«

đŸ‘źâ€â™‚ïž Las empresas no te escriben al privado para regalarle dinero ( son estafadores ) 🚓🚹.

#StaySafeInTheCryptoWorld
#ScamT48
#ScamRiskWarning Crypto Platforms Suffered $2,200,000,000 in Losses From Hacks in 2024 Leading blockchain data analysis firm Chainalysis says hackers stole over $2 billion from crypto platforms this year. Even more alarming, according to the Chainalysis report, stolen funds saw more than a 20% increase from 2023. “Crypto hacking remains a persistent threat, with four years in the past decade individually seeing more than a billion dollars worth of crypto stolen (2018, 2021, 2022, and 2023). 2024 marks the fifth year to reach this troubling milestone, highlighting how, as crypto adoption and prices rise, so too does the amount that can be stolen. In 2024, funds stolen increased by approximately 21.07% year-over-year (YoY) to $2.2 billion, and the number of individual hacking incidents increased from 282 in 2023 to 303 in 2024.” Curiously, however, Chainalysis notes that hacking has slowed dramatically in the second half of 2024. “In our mid-year crime update, we noted that cumulative value stolen between January 2024 and July 2024 had already reached $1.58 billion, approximately 84.4% higher than the value stolen over the same period in 2023
 However, 2024’s upward trend slowed considerably after July, after which it remained relatively steady.” Despite the slowdown, Chainalysis also reveals a daunting fact: North Korean hackers stole more crypto in 2024 than ever before. “In 2023, North Korea-affiliated hackers stole approximately $660.50 million across 20 incidents; in 2024, this number increased to $1.34 billion stolen across 47 incidents — a 102.88% increase in value stolen. These figures represent 61% of the total amount stolen for the year, and 20% of total incidents.” More interesting news – subscribe – I will be grateful for tips $USDC
#ScamRiskWarning

Crypto Platforms Suffered $2,200,000,000 in Losses From Hacks in 2024

Leading blockchain data analysis firm Chainalysis says hackers stole over $2 billion from crypto platforms this year.
Even more alarming, according to the Chainalysis report, stolen funds saw more than a 20% increase from 2023.
“Crypto hacking remains a persistent threat, with four years in the past decade individually seeing more than a billion dollars worth of crypto stolen (2018, 2021, 2022, and 2023). 2024 marks the fifth year to reach this troubling milestone, highlighting how, as crypto adoption and prices rise, so too does the amount that can be stolen.
In 2024, funds stolen increased by approximately 21.07% year-over-year (YoY) to $2.2 billion, and the number of individual hacking incidents increased from 282 in 2023 to 303 in 2024.”

Curiously, however, Chainalysis notes that hacking has slowed dramatically in the second half of 2024.
“In our mid-year crime update, we noted that cumulative value stolen between January 2024 and July 2024 had already reached $1.58 billion, approximately 84.4% higher than the value stolen over the same period in 2023

However, 2024’s upward trend slowed considerably after July, after which it remained relatively steady.”
Despite the slowdown, Chainalysis also reveals a daunting fact: North Korean hackers stole more crypto in 2024 than ever before.
“In 2023, North Korea-affiliated hackers stole approximately $660.50 million across 20 incidents; in 2024, this number increased to $1.34 billion stolen across 47 incidents — a 102.88% increase in value stolen. These figures represent 61% of the total amount stolen for the year, and 20% of total incidents.”

More interesting news – subscribe – I will be grateful for tips

$USDC
#CrudoProtocol RED FLAG Ola todos. Hoje estava a dar a minha volta pelos meus airdrops, investimentos e carteiras quando de repente me deparei com uma mensagem no grupo da Crudo Protocol a dizer que o token jĂĄ nĂŁo iria ser lançado atĂ© ao dia 31 de Dezembro. Foi explicado que eram necessĂĄrios mais fundos para ter parcerias maiores com exchanges maiores. Ora foi colocado num chat da equipa Crudo Protocol uma poll para que os membros se pronunciassem sobre o adiamento do lançamento do token (uma votação bastante suspeita) onde claro, por larga maioria as pessoas atĂ© entenderam e pareciam quase felizes atĂ© . 😅 SABEM AQUELA BANDEIRA VERMELHA ? Pois. Eu apenas disse que era de esperar porque a prĂ©-venda nĂŁo tinha terminado e que o erro tinha sido prometer algo que tĂŁo bĂĄsico de compreendet como: Se nĂŁo terminam os estĂĄgios de prĂ©-venda nĂŁo podem cumprir a promessa de plano de investimento . Eu tenho 20$ de crudo e nem me importava nada que o token saĂ­sse mais tarde mas por dizer que foi errado andar a vender sob promessa de honra e que o lançamento seria atĂ© 31 de Dezembro nĂŁo importava quais os estĂĄgios de pre venda nem condiçÔes do mercado existissem... FUI BANIDO. E isso Ă© uma grande #REDFLAG Sinto pena e quem meteu milhares ĂĄ espera de ter um retorno este ano honestamente. De resto, quem lia essa narrativa de sai em que condiçÔes forem atĂ© 31 de dezembro jĂĄ desconfiava, por isso, apenas investi 20$ Fujam de projetos de equipas anĂłnimas e se virem o historial das carteiras que criaram o Token na rede BNB logo e percebe que algo nĂŁo estĂĄ certo. NÃO PERCA O SEU DINHEIRO đŸ’¶ OS MEMBROS ESTÃO A SER EXPULSOS DOS GRUPOS E A NARRARIVA DO HÁ SCAMMERS A AGIREM POR NÓS JÁ APARECEU. (Prints atached) #Crudo #CrudoProtocol #ScamRiskWarning
#CrudoProtocol RED FLAG

Ola todos.
Hoje estava a dar a minha volta pelos meus airdrops, investimentos e carteiras quando de repente me deparei com uma mensagem no grupo da Crudo Protocol a dizer que o token jå não iria ser lançado até ao dia 31 de Dezembro.

Foi explicado que eram necessĂĄrios mais fundos para ter parcerias maiores com exchanges maiores.

Ora foi colocado num chat da equipa Crudo Protocol uma poll para que os membros se pronunciassem sobre o adiamento do lançamento do token (uma votação bastante suspeita) onde claro, por larga maioria as pessoas atĂ© entenderam e pareciam quase felizes atĂ© . 😅

SABEM AQUELA BANDEIRA VERMELHA ?

Pois. Eu apenas disse que era de esperar porque a pré-venda não tinha terminado e que o erro tinha sido prometer algo que tão båsico de compreendet como:

Se não terminam os estågios de pré-venda não podem cumprir a promessa de plano de investimento .

Eu tenho 20$ de crudo e nem me importava nada que o token saísse mais tarde mas por dizer que foi errado andar a vender sob promessa de honra e que o lançamento seria até 31 de Dezembro não importava quais os estågios de pre venda nem condiçÔes do mercado existissem...

FUI BANIDO.
E isso Ă© uma grande #REDFLAG

Sinto pena e quem meteu milhares ĂĄ espera de ter um retorno este ano honestamente.

De resto, quem lia essa narrativa de sai em que condiçÔes forem até 31 de dezembro jå desconfiava, por isso, apenas investi 20$

Fujam de projetos de equipas anĂłnimas e se virem o historial das carteiras que criaram o Token na rede BNB logo e percebe que algo nĂŁo estĂĄ certo.

NÃO PERCA O SEU DINHEIRO đŸ’¶

OS MEMBROS ESTÃO A SER EXPULSOS DOS GRUPOS E A NARRARIVA DO HÁ SCAMMERS A AGIREM POR NÓS JÁ APARECEU. (Prints atached)

#Crudo #CrudoProtocol #ScamRiskWarning
🚹BREAKING NEWS: ANTHROPICAI'S X ACCOUNT HACKED, POSTS RUG PULL SCAM. #scamriskwarning
🚹BREAKING NEWS: ANTHROPICAI'S X ACCOUNT HACKED, POSTS RUG PULL SCAM.
#scamriskwarning
🚹 Stay Alert: Beware of Fake Airdrops! 🚹Scammers: "Claim free tokens! Just send us your wallet keys or pay a small fee!" đŸȘ™âœš You: "Free tokens? Sounds amazing!" 5 minutes later: "Why is my wallet empty? đŸ˜±" How Fake Airdrops Work: 1ïžâƒŁ Too-Good-to-Be-True Promises – Flashy posts claiming "Exclusive Airdrops!" 2ïžâƒŁ Suspicious Links – Direct you to shady websites or forms. 3ïžâƒŁ Scam Requests – Asking for your private keys or a small "processing fee." 4ïžâƒŁ Poof! – Your wallet is drained faster than you can say "blockchain." How to Protect Yourself: đŸš« Never share your private keys or seed phrases. 🛑 Real airdrops never require upfront fees. ✅ Always verify announcements from official sources. #FreeAirDrop #scamriskwarning #beaware #FakeAirdrops Don't let scammers "take" your funds! Stay safe and protect your wallet. đŸ’Ș $BNB $TON

🚹 Stay Alert: Beware of Fake Airdrops! 🚹

Scammers: "Claim free tokens! Just send us your wallet keys or pay a small fee!" đŸȘ™âœš
You: "Free tokens? Sounds amazing!"
5 minutes later: "Why is my wallet empty? đŸ˜±"

How Fake Airdrops Work:

1ïžâƒŁ Too-Good-to-Be-True Promises – Flashy posts claiming "Exclusive Airdrops!"
2ïžâƒŁ Suspicious Links – Direct you to shady websites or forms.
3ïžâƒŁ Scam Requests – Asking for your private keys or a small "processing fee."
4ïžâƒŁ Poof! – Your wallet is drained faster than you can say "blockchain."

How to Protect Yourself:

đŸš« Never share your private keys or seed phrases.
🛑 Real airdrops never require upfront fees.
✅ Always verify announcements from official sources.
#FreeAirDrop #scamriskwarning #beaware #FakeAirdrops
Don't let scammers "take" your funds! Stay safe and protect your wallet. đŸ’Ș
$BNB
$TON
--
VELO's Rise and Fall - Is a Comeback Imminent or a Rug Pull Looming?"Velodrome Finance (VELO) has recently garnered significant attention in the cryptocurrency market, particularly following its listing on Binance. This article delves into the current state of VELO, examines the factors influencing its price movements, analyzes its performance since the Binance listing, provides a price prediction, and assesses the potential risks associated with the token. 1. Current Status of VELO Cryptocurrency: VELO is the native token of Velodrome Finance, a decentralized exchange (DEX) operating on the Optimism network. The platform has positioned itself as a major player in the decentralized finance (DeFi) space, offering competitive swap rates and innovative liquidity solutions. As of December 17, 2024, VELO is trading at approximately $0.03126, with a market capitalization of around $231 million and a 24-hour trading volume of about $65.72 million. 2. Post-Binance Listing Performance: VELO experienced a significant surge following its listing on Binance. On December 13, 2024, the token's price jumped by 170%, reaching a high of $0.39 shortly after the announcement. This listing increased the token's visibility and accessibility, contributing to heightened investor interest. 3. Analysis Since Binance Listing: Despite the initial surge, VELO's price has exhibited volatility. After peaking at $0.42, the token has retraced to its current level of approximately $0.03126. This decline suggests that the initial excitement may have waned, leading to profit-taking and market corrections. Such patterns are common following major exchange listings, where an initial pump is often followed by a consolidation phase. 4. Price Prediction: Predicting cryptocurrency prices involves considerable uncertainty due to market volatility and external factors. However, some analysts have identified bullish patterns for VELO. For instance, a cup and handle formation suggests a potential rise to $0.054, representing a 109% increase from current levels. This projection is contingent upon market conditions and investor sentiment remaining favorable. 5. Potential Risks and Rug Pull Concerns: A rug pull is a type of exit scam where developers abandon a project after securing substantial investor funds, leaving investors with worthless tokens. While there have been discussions on platforms like Reddit labeling VELO as a scam token, it's important to note that Velodrome Finance has undergone audits, with no major or high-risk issues identified. However, some low-risk recommendations were made. Investors should exercise caution, conduct thorough research, and remain vigilant for any red flags indicating potential fraud. Conclusion: VELO's journey post-Binance listing has been marked by significant volatility. While the initial surge showcased strong market interest, the subsequent correction underscores the inherent risks in cryptocurrency investments. Potential investors should conduct comprehensive due diligence, remain aware of market dynamics, and consider the speculative nature of such assets before making investment decisions. $VELODROME #Write2Earn! #scamriskwarning

VELO's Rise and Fall - Is a Comeback Imminent or a Rug Pull Looming?"

Velodrome Finance (VELO) has recently garnered significant attention in the cryptocurrency market, particularly following its listing on Binance. This article delves into the current state of VELO, examines the factors influencing its price movements, analyzes its performance since the Binance listing, provides a price prediction, and assesses the potential risks associated with the token.
1. Current Status of VELO Cryptocurrency:
VELO is the native token of Velodrome Finance, a decentralized exchange (DEX) operating on the Optimism network. The platform has positioned itself as a major player in the decentralized finance (DeFi) space, offering competitive swap rates and innovative liquidity solutions. As of December 17, 2024, VELO is trading at approximately $0.03126, with a market capitalization of around $231 million and a 24-hour trading volume of about $65.72 million.
2. Post-Binance Listing Performance:
VELO experienced a significant surge following its listing on Binance. On December 13, 2024, the token's price jumped by 170%, reaching a high of $0.39 shortly after the announcement. This listing increased the token's visibility and accessibility, contributing to heightened investor interest.
3. Analysis Since Binance Listing:
Despite the initial surge, VELO's price has exhibited volatility. After peaking at $0.42, the token has retraced to its current level of approximately $0.03126. This decline suggests that the initial excitement may have waned, leading to profit-taking and market corrections. Such patterns are common following major exchange listings, where an initial pump is often followed by a consolidation phase.
4. Price Prediction:
Predicting cryptocurrency prices involves considerable uncertainty due to market volatility and external factors. However, some analysts have identified bullish patterns for VELO. For instance, a cup and handle formation suggests a potential rise to $0.054, representing a 109% increase from current levels. This projection is contingent upon market conditions and investor sentiment remaining favorable.
5. Potential Risks and Rug Pull Concerns:
A rug pull is a type of exit scam where developers abandon a project after securing substantial investor funds, leaving investors with worthless tokens. While there have been discussions on platforms like Reddit labeling VELO as a scam token, it's important to note that Velodrome Finance has undergone audits, with no major or high-risk issues identified. However, some low-risk recommendations were made. Investors should exercise caution, conduct thorough research, and remain vigilant for any red flags indicating potential fraud.
Conclusion:
VELO's journey post-Binance listing has been marked by significant volatility. While the initial surge showcased strong market interest, the subsequent correction underscores the inherent risks in cryptocurrency investments. Potential investors should conduct comprehensive due diligence, remain aware of market dynamics, and consider the speculative nature of such assets before making investment decisions.
$VELODROME #Write2Earn! #scamriskwarning
Ledger Wallet User Reports $1.5M in Losses, Crypto Community Links Incident to 2022 Phishing AttackA crypto enthusiast recently took to social media platform X to report a devastating loss of 10 Bitcoin (BTC) and $1.5 million worth of NFTs. Despite taking precautions with their Ledger Nano S wallet, the crypto community linked the incident to a phishing attack from 2022. The Incident: $1.5 Million and 10 BTC Gone On December 13, 2024, the user, known as "Anchor Drops," revealed their losses on X. They stated: "Hey @ledger, last night I lost 10 BTC and ~$1.5M of NFTs stored on my Ledger Nano S. The Ledger was purchased directly from you. The seed phrase was stored securely and never entered online. I have never signed any malicious transactions. Can you explain what happened?" The user emphasized that their seed phrase was kept in a secure location and that the wallet had not been used for over two months. They were searching for answers and clarity regarding the unexpected breach. Community Investigation: A 2022 Phishing Attack In response to the post, several members of the crypto community speculated that the loss stemmed from a phishing attack dating back to February 2022. One user, KDean, commented: "Sorry to hear that. Looks like the phish happened a few years ago and just woke up." KDean provided evidence tying the compromised Ethereum address to a phishing transaction labeled "Fake_Phishing5443." This transaction, dated February 22, 2022, reportedly involved the theft of sensitive wallet data, including the victim's seed phrase. How Did the Attack Unfold? Crypto experts suggest the phishing attack likely captured the seed phrase at the time, granting the hacker access to the victim’s funds across multiple blockchains. The hacker waited nearly three years before draining the wallet, a strategy often employed to evade suspicion. With Bitcoin currently valued at $105,000, the stolen 10 BTC translates to $1,050,000. Combined with the $1.5 million in NFTs, the total losses amount to over $2.5 million. Past Ledger Security Breaches This incident highlights ongoing security challenges for Ledger. Earlier this year, the company faced another attack where approximately $600,000 was stolen. The January 2024 breach involved phishing via the Ledger Connect Kit software, reportedly orchestrated by a former employee. In that case, malicious code redirected users’ funds to the hacker’s wallet during interactions with decentralized applications (dApps). Ledger reimbursed affected users and implemented tighter security measures following the incident. Lessons for Crypto Users This case underscores the importance of vigilance when safeguarding digital assets. While hardware wallets like Ledger Nano S offer enhanced security, phishing attacks targeting seed phrases remain a significant threat. Users must remain cautious, avoid sharing sensitive information, and monitor their wallets for unusual activity. Security in the crypto world is ever-evolving, and staying informed is key to protecting your assets. $BTC {spot}(BTCUSDT) #MarketNewHype #ETHHits4KAgain #BTCNewATH #ScamAware #scamriskwarning

Ledger Wallet User Reports $1.5M in Losses, Crypto Community Links Incident to 2022 Phishing Attack

A crypto enthusiast recently took to social media platform X to report a devastating loss of 10 Bitcoin (BTC) and $1.5 million worth of NFTs. Despite taking precautions with their Ledger Nano S wallet, the crypto community linked the incident to a phishing attack from 2022.
The Incident: $1.5 Million and 10 BTC Gone
On December 13, 2024, the user, known as "Anchor Drops," revealed their losses on X. They stated:
"Hey @ledger, last night I lost 10 BTC and ~$1.5M of NFTs stored on my Ledger Nano S. The Ledger was purchased directly from you. The seed phrase was stored securely and never entered online. I have never signed any malicious transactions. Can you explain what happened?"
The user emphasized that their seed phrase was kept in a secure location and that the wallet had not been used for over two months. They were searching for answers and clarity regarding the unexpected breach.
Community Investigation: A 2022 Phishing Attack
In response to the post, several members of the crypto community speculated that the loss stemmed from a phishing attack dating back to February 2022. One user, KDean, commented:
"Sorry to hear that. Looks like the phish happened a few years ago and just woke up."
KDean provided evidence tying the compromised Ethereum address to a phishing transaction labeled "Fake_Phishing5443." This transaction, dated February 22, 2022, reportedly involved the theft of sensitive wallet data, including the victim's seed phrase.
How Did the Attack Unfold?
Crypto experts suggest the phishing attack likely captured the seed phrase at the time, granting the hacker access to the victim’s funds across multiple blockchains. The hacker waited nearly three years before draining the wallet, a strategy often employed to evade suspicion.
With Bitcoin currently valued at $105,000, the stolen 10 BTC translates to $1,050,000. Combined with the $1.5 million in NFTs, the total losses amount to over $2.5 million.
Past Ledger Security Breaches
This incident highlights ongoing security challenges for Ledger. Earlier this year, the company faced another attack where approximately $600,000 was stolen. The January 2024 breach involved phishing via the Ledger Connect Kit software, reportedly orchestrated by a former employee.
In that case, malicious code redirected users’ funds to the hacker’s wallet during interactions with decentralized applications (dApps). Ledger reimbursed affected users and implemented tighter security measures following the incident.
Lessons for Crypto Users
This case underscores the importance of vigilance when safeguarding digital assets. While hardware wallets like Ledger Nano S offer enhanced security, phishing attacks targeting seed phrases remain a significant threat. Users must remain cautious, avoid sharing sensitive information, and monitor their wallets for unusual activity.
Security in the crypto world is ever-evolving, and staying informed is key to protecting your assets.

$BTC
#MarketNewHype #ETHHits4KAgain #BTCNewATH #ScamAware #scamriskwarning
Binance Customer SupportBinance's customer support is accessible only via its official application. It is of utmost importance to exercise caution. Do not place your trust in individuals who reach out to you on social media, claiming to offer support. Such people are invariably scammers. We are grateful for your support. Please stay vigilant and safe. #Guidance #scamriskwarning

Binance Customer Support

Binance's customer support is accessible only via its official application.

It is of utmost importance to exercise caution. Do not place your trust in individuals who reach out to you on social media, claiming to offer support. Such people are invariably scammers.

We are grateful for your support. Please stay vigilant and safe.

#Guidance
#scamriskwarning
--
Bearish
--
Bearish
Real Comedian $BAN Crypto markets are not driven by analysis or indicators—it's the ćș„柶 (market makers) pulling the strings. Success lies in understanding their moves, not the charts. #scamriskwarning #AltcoinInvesting
Real Comedian $BAN

Crypto markets are not driven by analysis or indicators—it's the ćș„柶 (market makers) pulling the strings. Success lies in understanding their moves, not the charts.

#scamriskwarning #AltcoinInvesting
AI-Driven Scammers Target Web3 Professionals with Malware-Laced AppsLes fausses applications sont intĂ©grĂ©es au malware Realst, un outil de vol d'informations. Ces attaques ciblent des donnĂ©es sensibles, notamment les identifiants de portefeuilles de crypto-monnaies. On s'attend Ă  ce que ces applications soient liĂ©es Ă  la CorĂ©e du Nord, tout comme l'exploit de 50 millions de dollars de Radiant Capital. Entre-temps, les autoritĂ©s ont fait quelques progrĂšs avec l'arrestation de Dmitry V., ancien directeur de WEX, une bourse de crypto-monnaies liĂ©e Ă  la fraude et au blanchiment d'argent. Les employĂ©s de Web3 menacĂ©sLes professionnels du Web3 sont la cible d'une campagne de malware sophistiquĂ©e qui utilise de fausses applications de rĂ©union pour voler des informations sensibles, notamment des identifiants de sites Web, des applications et des portefeuilles de cryptomonnaies. Selon un rapport de Cado Security Labs, les escrocs utilisent l'intelligence artificielle pour crĂ©er des sites Web et des profils de mĂ©dias sociaux d'apparence lĂ©gitime pour des entreprises frauduleuses. Ces plateformes sont utilisĂ©es pour inciter les cibles Ă  tĂ©lĂ©charger une application de rĂ©union malveillante. L'application s'appelait auparavant « Meeten », mais elle s'appelle dĂ©sormais « Meetio » et change frĂ©quemment de nom de marque. Elle opĂ©rait auparavant sous des domaines tels que Clusee.com, Meeten.gg et Meetone.gg.L'application contient un malware de vol d'informations Realst conçu pour extraire des informations critiques, notamment les identifiants Telegram, les coordonnĂ©es bancaires et les identifiants de portefeuille cryptographique, qui sont ensuite envoyĂ©s aux attaquants. Le malware peut Ă©galement rĂ©colter des cookies de navigateur, remplir automatiquement les informations d'identification des navigateurs Web tels que Google Chrome et Microsoft Edge, et mĂȘme accĂ©der aux donnĂ©es liĂ©es aux portefeuilles matĂ©riels tels que Ledger et Trezor, ainsi qu'aux portefeuilles Binance.La campagne utilise Ă©galement des tactiques d'ingĂ©nierie sociale, les escrocs se faisant parfois passer pour des contacts connus afin d'instaurer la confiance. Dans un cas, une cible a dĂ©clarĂ© avoir Ă©tĂ© approchĂ©e sur Telegram par une personne se faisant passer pour un collĂšgue et avoir reçu une prĂ©sentation d'investissement volĂ©e Ă  sa propre entreprise. D'autres victimes ont racontĂ© avoir participĂ© Ă  des appels liĂ©s Ă  des projets Web3, avoir tĂ©lĂ©chargĂ© le logiciel malveillant et avoir ensuite perdu leur cryptomonnaie.Fausse application de rĂ©union (Source : Cado Security )Pour renforcer encore leur crĂ©dibilitĂ©, les escrocs ont crĂ©Ă© des sites Web d’entreprise remplis de blogs, de descriptions de produits et de comptes de rĂ©seaux sociaux gĂ©nĂ©rĂ©s par l’IA sur des plateformes comme X et Medium. Cette utilisation de l’IA leur permet de produire trĂšs rapidement du contenu trĂšs convaincant, ce qui rend leurs opĂ©rations frauduleuses lĂ©gitimes et plus difficiles Ă  dĂ©tecter. Dans certains cas, leurs faux sites Web incluent du JavaScript capable de voler les crypto-monnaies stockĂ©es dans les navigateurs Web avant mĂȘme que le logiciel malveillant ne soit tĂ©lĂ©chargĂ©.La campagne cible Ă  la fois les utilisateurs de macOS et de Windows et est active depuis prĂšs de quatre mois. Des escroqueries similaires ont Ă©tĂ© observĂ©es dans le domaine des crypto-monnaies. L'enquĂȘteur ZackXBT a dĂ©couvert un groupe de 21 dĂ©veloppeurs, vraisemblablement nord-corĂ©ens, travaillant sur des projets utilisant de fausses identitĂ©s. En septembre, le FBI a Ă©galement émis un avertissement concernant les pirates informatiques nord-corĂ©ens dĂ©ployant des logiciels malveillants dĂ©guisĂ©s en offres d'emploi pour cibler les sociĂ©tĂ©s de crypto-monnaies et les plateformes financiĂšres dĂ©centralisĂ©es.Un groupe nord-corĂ©en Ă  l'origine de la brĂšche dans Radiant CapitalRadiant Capital a rĂ©vĂ©lé que le piratage de 50 millions de dollars sur sa plateforme de finance dĂ©centralisĂ©e (DeFi) en octobre avait Ă©tĂ© orchestrĂ© par un pirate informatique liĂ© Ă  la CorĂ©e du Nord qui s'Ă©tait infiltrĂ© sur la plateforme Ă  l'aide d'un logiciel malveillant distribuĂ© via Telegram. L'attaquant s'est fait passer pour un ancien sous-traitant de confiance et a envoyĂ© un fichier zip Ă  un dĂ©veloppeur de Radiant le 11 septembre sous prĂ©texte de demander des commentaires sur un nouveau projet. La sociĂ©tĂ© de cybersĂ©curité Mandiant , sous contrat avec Radiant, a confirmĂ© avec une grande confiance que l'attaque avait Ă©tĂ© menĂ©e par un acteur malveillant affiliĂ© Ă  la RĂ©publique populaire dĂ©mocratique de CorĂ©e (RPDC).Le fichier zip malveillant semblait lĂ©gitime en raison de son caractĂšre courant dans les environnements professionnels et a Ă©tĂ© partagĂ© entre les dĂ©veloppeurs. Cela a permis au logiciel malveillant d'infecter plusieurs appareils. Les attaquants ont ensuite pris le contrĂŽle des clĂ©s privĂ©es et des contrats intelligents, ce qui a forcĂ© Radiant Ă  interrompre ses activitĂ©s de prĂȘt le 16 octobre. Le logiciel malveillant a Ă©galement usurpĂ© le site Web lĂ©gitime du sous-traitant, trompant encore plus les dĂ©veloppeurs. Alors que les vĂ©rifications traditionnelles et les simulations de transactions n'ont rĂ©vĂ©lĂ© aucune irrĂ©gularitĂ©, les attaquants ont manipulĂ© l'interface frontale pour afficher des donnĂ©es de transaction bĂ©nignes tout en exĂ©cutant des transactions malveillantes en arriĂšre-plan.L'auteur de la menace a Ă©tĂ© identifiĂ© comme « UNC4736 » ou « Citrine Sleet », et est associĂ© au Bureau gĂ©nĂ©ral de reconnaissance de la CorĂ©e du Nord et pourrait ĂȘtre un sous-groupe du tristement cĂ©lĂšbre groupe Lazarus. AprĂšs l'attaque, 52 millions de dollars des fonds volĂ©s ont Ă©tĂ© transfĂ©rĂ©s par les pirates le 24 octobre. Selon Radiant, mĂȘme des mesures de sĂ©curitĂ© plus avancĂ©es, notamment des portefeuilles matĂ©riels, des outils de simulation comme Tenderly et des procĂ©dures opĂ©rationnelles standard du secteur, n'Ă©taient pas suffisantes contre une menace aussi sophistiquĂ©e.TVL radiante (Source : DefiLlama )Cet incident est le deuxiĂšme compromis majeur pour Radiant cette annĂ©e, et s'est produit aprĂšs un exploit de prĂȘt flash de 4,5 millions de dollars en janvier . Une attaque de prĂȘt flash crypto est un type d'exploit sur les plateformes DeFi oĂč un attaquant profite des prĂȘts flash pour manipuler les conditions du marchĂ© ou exploiter les vulnĂ©rabilitĂ©s des contrats intelligents. Les prĂȘts flash sont des prĂȘts non garantis qui doivent ĂȘtre empruntĂ©s et remboursĂ©s en une seule transaction blockchain. Les attaquants utilisent ces prĂȘts pour exĂ©cuter des sĂ©quences d'actions complexes qui peuvent, par exemple, manipuler le prix des actifs, tromper les contrats intelligents pour dĂ©bloquer des fonds ou vider les rĂ©serves de liquiditĂ©s. Comme le prĂȘt et le remboursement se produisent presque instantanĂ©ment, l'attaquant peut en tirer profit sans risquer son propre capital. La sĂ©rie de piratages a sĂ©rieusement affectĂ© la rĂ©putation de la plateforme, sa valeur totale bloquĂ©e chutant de plus de 300 millions de dollars Ă  la fin de l'annĂ©e derniĂšre Ă  seulement 6,07 millions de dollars au 9 dĂ©cembre, selon DefiLlama .Les autoritĂ©s polonaises arrĂȘtent l’ancien chef du WEX, Dmitry V.Bien que la crypto-criminalitĂ© soit toujours un problĂšme, les autoritĂ©s travaillent d'arrache-pied pour traduire ces criminels en justice. Les autoritĂ©s polonaises ont arrĂȘté Dmitry V., l'ancien directeur de la bourse de crypto-monnaies russe WEX, Ă  Varsovie, aprĂšs une demande d'extradition du ministĂšre amĂ©ricain de la Justice. Le nom complet de Dmitry V. n'a pas Ă©tĂ© dĂ©voilĂ© en raison des lois locales. Il est accusĂ© de fraude et de blanchiment d'argent pendant sa gestion de WEX, successeur de BTC-e. L' arrestation a Ă©tĂ© confirmĂ©e par un porte-parole de la police polonaise, qui a dĂ©clarĂ© que Dmitry V. est en dĂ©tention et attend une procĂ©dure d'extradition. S'il est extradĂ© vers les États-Unis, il pourrait ĂȘtre condamnĂ© Ă  une peine de prison maximale de 20 ans.Dmitry V. a Ă©tĂ© arrĂȘtĂ© et libĂ©rĂ© dans plusieurs pays. En aoĂ»t 2021, il a Ă©tĂ© dĂ©tenu en Pologne, mais libĂ©rĂ© aprĂšs 40 jours. Il a Ă©tĂ© de nouveau arrĂȘtĂ© en Croatie en 2022 par Interpol Ă  l'aĂ©roport de Zagreb aprĂšs une demande d'extradition du Kazakhstan. En 2019, les autoritĂ©s italiennes l'ont arrĂȘtĂ©, mais il a ensuite Ă©tĂ© libĂ©rĂ© lorsque des erreurs dans la demande d'extradition ont Ă©tĂ© dĂ©couvertes.WEX s’est effondrĂ© en 2018, laissant environ 450 millions de dollars non comptabilisĂ©s. La plateforme Ă©tait souvent dĂ©crite comme une bourse « sombre » et Ă©tait connue pour son manque de vĂ©rification d’identitĂ© et son implication dans le blanchiment de fonds provenant de piratages cryptographiques de grande envergure, notamment la violation de Mt. Gox. À son apogĂ©e, WEX a traitĂ© plus de 9 milliards de dollars de transactions provenant de plus d’un million d’utilisateurs, dont de nombreux aux États-Unis.Cette derniĂšre arrestation de WEX intervient aprĂšs les Ă©vĂ©nements survenus avec Alexander Vinnik, l'ancien directeur de BTC-e, le prĂ©dĂ©cesseur de WEX. Vinnik Ă©tait surnommĂ© « M. Bitcoin » et a plaidĂ© coupable de complot en vue de commettre un blanchiment d'argent pour des activitĂ©s entre 2011 et 2017. Il a Ă©té arrĂȘté en GrĂšce en 2017, puis extradĂ© vers les États-Unis en 2022 aprĂšs avoir purgĂ© deux ans dans une prison française.#ScamRiskWarning #ScamAlert #Web3 #CryptoNewss

AI-Driven Scammers Target Web3 Professionals with Malware-Laced Apps

Les fausses applications sont intégrées au malware Realst, un outil de vol d'informations. Ces attaques ciblent des données sensibles, notamment les identifiants de portefeuilles de crypto-monnaies. On s'attend à ce que ces applications soient liées à la Corée du Nord, tout comme l'exploit de 50 millions de dollars de Radiant Capital. Entre-temps, les autorités ont fait quelques progrÚs avec l'arrestation de Dmitry V., ancien directeur de WEX, une bourse de crypto-monnaies liée à la fraude et au blanchiment d'argent.

Les employĂ©s de Web3 menacĂ©sLes professionnels du Web3 sont la cible d'une campagne de malware sophistiquĂ©e qui utilise de fausses applications de rĂ©union pour voler des informations sensibles, notamment des identifiants de sites Web, des applications et des portefeuilles de cryptomonnaies. Selon un rapport de Cado Security Labs, les escrocs utilisent l'intelligence artificielle pour crĂ©er des sites Web et des profils de mĂ©dias sociaux d'apparence lĂ©gitime pour des entreprises frauduleuses. Ces plateformes sont utilisĂ©es pour inciter les cibles Ă  tĂ©lĂ©charger une application de rĂ©union malveillante. L'application s'appelait auparavant « Meeten », mais elle s'appelle dĂ©sormais « Meetio » et change frĂ©quemment de nom de marque. Elle opĂ©rait auparavant sous des domaines tels que Clusee.com, Meeten.gg et Meetone.gg.L'application contient un malware de vol d'informations Realst conçu pour extraire des informations critiques, notamment les identifiants Telegram, les coordonnĂ©es bancaires et les identifiants de portefeuille cryptographique, qui sont ensuite envoyĂ©s aux attaquants. Le malware peut Ă©galement rĂ©colter des cookies de navigateur, remplir automatiquement les informations d'identification des navigateurs Web tels que Google Chrome et Microsoft Edge, et mĂȘme accĂ©der aux donnĂ©es liĂ©es aux portefeuilles matĂ©riels tels que Ledger et Trezor, ainsi qu'aux portefeuilles Binance.La campagne utilise Ă©galement des tactiques d'ingĂ©nierie sociale, les escrocs se faisant parfois passer pour des contacts connus afin d'instaurer la confiance. Dans un cas, une cible a dĂ©clarĂ© avoir Ă©tĂ© approchĂ©e sur Telegram par une personne se faisant passer pour un collĂšgue et avoir reçu une prĂ©sentation d'investissement volĂ©e Ă  sa propre entreprise. D'autres victimes ont racontĂ© avoir participĂ© Ă  des appels liĂ©s Ă  des projets Web3, avoir tĂ©lĂ©chargĂ© le logiciel malveillant et avoir ensuite perdu leur cryptomonnaie.Fausse application de rĂ©union (Source : Cado Security )Pour renforcer encore leur crĂ©dibilitĂ©, les escrocs ont crĂ©Ă© des sites Web d’entreprise remplis de blogs, de descriptions de produits et de comptes de rĂ©seaux sociaux gĂ©nĂ©rĂ©s par l’IA sur des plateformes comme X et Medium. Cette utilisation de l’IA leur permet de produire trĂšs rapidement du contenu trĂšs convaincant, ce qui rend leurs opĂ©rations frauduleuses lĂ©gitimes et plus difficiles Ă  dĂ©tecter. Dans certains cas, leurs faux sites Web incluent du JavaScript capable de voler les crypto-monnaies stockĂ©es dans les navigateurs Web avant mĂȘme que le logiciel malveillant ne soit tĂ©lĂ©chargĂ©.La campagne cible Ă  la fois les utilisateurs de macOS et de Windows et est active depuis prĂšs de quatre mois. Des escroqueries similaires ont Ă©tĂ© observĂ©es dans le domaine des crypto-monnaies. L'enquĂȘteur ZackXBT a dĂ©couvert un groupe de 21 dĂ©veloppeurs, vraisemblablement nord-corĂ©ens, travaillant sur des projets utilisant de fausses identitĂ©s. En septembre, le FBI a Ă©galement émis un avertissement concernant les pirates informatiques nord-corĂ©ens dĂ©ployant des logiciels malveillants dĂ©guisĂ©s en offres d'emploi pour cibler les sociĂ©tĂ©s de crypto-monnaies et les plateformes financiĂšres dĂ©centralisĂ©es.Un groupe nord-corĂ©en Ă  l'origine de la brĂšche dans Radiant CapitalRadiant Capital a rĂ©vĂ©lé que le piratage de 50 millions de dollars sur sa plateforme de finance dĂ©centralisĂ©e (DeFi) en octobre avait Ă©tĂ© orchestrĂ© par un pirate informatique liĂ© Ă  la CorĂ©e du Nord qui s'Ă©tait infiltrĂ© sur la plateforme Ă  l'aide d'un logiciel malveillant distribuĂ© via Telegram. L'attaquant s'est fait passer pour un ancien sous-traitant de confiance et a envoyĂ© un fichier zip Ă  un dĂ©veloppeur de Radiant le 11 septembre sous prĂ©texte de demander des commentaires sur un nouveau projet. La sociĂ©tĂ© de cybersĂ©curité Mandiant , sous contrat avec Radiant, a confirmĂ© avec une grande confiance que l'attaque avait Ă©tĂ© menĂ©e par un acteur malveillant affiliĂ© Ă  la RĂ©publique populaire dĂ©mocratique de CorĂ©e (RPDC).Le fichier zip malveillant semblait lĂ©gitime en raison de son caractĂšre courant dans les environnements professionnels et a Ă©tĂ© partagĂ© entre les dĂ©veloppeurs. Cela a permis au logiciel malveillant d'infecter plusieurs appareils. Les attaquants ont ensuite pris le contrĂŽle des clĂ©s privĂ©es et des contrats intelligents, ce qui a forcĂ© Radiant Ă  interrompre ses activitĂ©s de prĂȘt le 16 octobre. Le logiciel malveillant a Ă©galement usurpĂ© le site Web lĂ©gitime du sous-traitant, trompant encore plus les dĂ©veloppeurs. Alors que les vĂ©rifications traditionnelles et les simulations de transactions n'ont rĂ©vĂ©lĂ© aucune irrĂ©gularitĂ©, les attaquants ont manipulĂ© l'interface frontale pour afficher des donnĂ©es de transaction bĂ©nignes tout en exĂ©cutant des transactions malveillantes en arriĂšre-plan.L'auteur de la menace a Ă©tĂ© identifiĂ© comme « UNC4736 » ou « Citrine Sleet », et est associĂ© au Bureau gĂ©nĂ©ral de reconnaissance de la CorĂ©e du Nord et pourrait ĂȘtre un sous-groupe du tristement cĂ©lĂšbre groupe Lazarus. AprĂšs l'attaque, 52 millions de dollars des fonds volĂ©s ont Ă©tĂ© transfĂ©rĂ©s par les pirates le 24 octobre. Selon Radiant, mĂȘme des mesures de sĂ©curitĂ© plus avancĂ©es, notamment des portefeuilles matĂ©riels, des outils de simulation comme Tenderly et des procĂ©dures opĂ©rationnelles standard du secteur, n'Ă©taient pas suffisantes contre une menace aussi sophistiquĂ©e.TVL radiante (Source : DefiLlama )Cet incident est le deuxiĂšme compromis majeur pour Radiant cette annĂ©e, et s'est produit aprĂšs un exploit de prĂȘt flash de 4,5 millions de dollars en janvier . Une attaque de prĂȘt flash crypto est un type d'exploit sur les plateformes DeFi oĂč un attaquant profite des prĂȘts flash pour manipuler les conditions du marchĂ© ou exploiter les vulnĂ©rabilitĂ©s des contrats intelligents. Les prĂȘts flash sont des prĂȘts non garantis qui doivent ĂȘtre empruntĂ©s et remboursĂ©s en une seule transaction blockchain. Les attaquants utilisent ces prĂȘts pour exĂ©cuter des sĂ©quences d'actions complexes qui peuvent, par exemple, manipuler le prix des actifs, tromper les contrats intelligents pour dĂ©bloquer des fonds ou vider les rĂ©serves de liquiditĂ©s. Comme le prĂȘt et le remboursement se produisent presque instantanĂ©ment, l'attaquant peut en tirer profit sans risquer son propre capital. La sĂ©rie de piratages a sĂ©rieusement affectĂ© la rĂ©putation de la plateforme, sa valeur totale bloquĂ©e chutant de plus de 300 millions de dollars Ă  la fin de l'annĂ©e derniĂšre Ă  seulement 6,07 millions de dollars au 9 dĂ©cembre, selon DefiLlama .Les autoritĂ©s polonaises arrĂȘtent l’ancien chef du WEX, Dmitry V.Bien que la crypto-criminalitĂ© soit toujours un problĂšme, les autoritĂ©s travaillent d'arrache-pied pour traduire ces criminels en justice. Les autoritĂ©s polonaises ont arrĂȘté Dmitry V., l'ancien directeur de la bourse de crypto-monnaies russe WEX, Ă  Varsovie, aprĂšs une demande d'extradition du ministĂšre amĂ©ricain de la Justice. Le nom complet de Dmitry V. n'a pas Ă©tĂ© dĂ©voilĂ© en raison des lois locales. Il est accusĂ© de fraude et de blanchiment d'argent pendant sa gestion de WEX, successeur de BTC-e. L' arrestation a Ă©tĂ© confirmĂ©e par un porte-parole de la police polonaise, qui a dĂ©clarĂ© que Dmitry V. est en dĂ©tention et attend une procĂ©dure d'extradition. S'il est extradĂ© vers les États-Unis, il pourrait ĂȘtre condamnĂ© Ă  une peine de prison maximale de 20 ans.Dmitry V. a Ă©tĂ© arrĂȘtĂ© et libĂ©rĂ© dans plusieurs pays. En aoĂ»t 2021, il a Ă©tĂ© dĂ©tenu en Pologne, mais libĂ©rĂ© aprĂšs 40 jours. Il a Ă©tĂ© de nouveau arrĂȘtĂ© en Croatie en 2022 par Interpol Ă  l'aĂ©roport de Zagreb aprĂšs une demande d'extradition du Kazakhstan. En 2019, les autoritĂ©s italiennes l'ont arrĂȘtĂ©, mais il a ensuite Ă©tĂ© libĂ©rĂ© lorsque des erreurs dans la demande d'extradition ont Ă©tĂ© dĂ©couvertes.WEX s’est effondrĂ© en 2018, laissant environ 450 millions de dollars non comptabilisĂ©s. La plateforme Ă©tait souvent dĂ©crite comme une bourse « sombre » et Ă©tait connue pour son manque de vĂ©rification d’identitĂ© et son implication dans le blanchiment de fonds provenant de piratages cryptographiques de grande envergure, notamment la violation de Mt. Gox. À son apogĂ©e, WEX a traitĂ© plus de 9 milliards de dollars de transactions provenant de plus d’un million d’utilisateurs, dont de nombreux aux États-Unis.Cette derniĂšre arrestation de WEX intervient aprĂšs les Ă©vĂ©nements survenus avec Alexander Vinnik, l'ancien directeur de BTC-e, le prĂ©dĂ©cesseur de WEX. Vinnik Ă©tait surnommĂ© « M. Bitcoin » et a plaidĂ© coupable de complot en vue de commettre un blanchiment d'argent pour des activitĂ©s entre 2011 et 2017. Il a Ă©té arrĂȘté en GrĂšce en 2017, puis extradĂ© vers les États-Unis en 2022 aprĂšs avoir purgĂ© deux ans dans une prison française.#ScamRiskWarning

#ScamAlert #Web3 #CryptoNewss