#CryptoCrime

R. Scott (i47i) :freebsd_logo:i47i@hachyderm.io
2026-01-28

Chinese-language crime networks (CMLNs) are now powering ~20% of global crypto money laundering!

According to a fresh Asia Times report (Jan 28, 2026), these groups processed a staggering $16.1B in illicit funds last year— that's $44M per day.

With over 1,799 active wallets, their inflows exploded thousands of times faster than centralized exchanges or DeFi since 2020.

These aren't small-time ops; they're "laundering-as-a-service" pros, exploiting crypto's speed & anonymity.

Key methods include:
Running Point Brokers: Recruiting folks to "rent" bank accounts or wallets as entry points for dirty money.

Money Mule Motorcades: Layering funds through complex account networks to hide origins.

Informal OTC/P2P Services: Unregulated trading to dodge capital controls & ID checks.

Black U Services: Ultra-fast laundering—hit $1B in just 236 days!

Gambling Platforms: Mixing illicit cash via online casinos, sometimes with rigged games.

Money Movement Services: Crypto mixing/swapping to break transaction trails.

Central hubs like Huione & Xinbi act as "guarantee platforms" --- think escrow with vendor ratings for crooks. They create trust in this shady ecosystem, but enforcement is cracking down: US/UK sanctions on groups like Prince Group & Huione.

Why the boom? Blame China's capital controls—wealthy folks moving money abroad created liquidity, now hijacked by global crime rings. CMLNs launder for pig butchering scams, hacks, trafficking & more. A true cross-border threat!
(Part 1/2 - Continued in reply)

asiatimes.com/2026/01/chinese-

#CryptoCrime #MoneyLaundering #Blockchain #CyberSecurity #China

2026-01-21

Cryptocurrency thieves have found a new way to turn trusted Linux software packages on the Snap Store into crypto-stealing malware

helpnetsecurity.com/2026/01/21

#Linux #Malware #CryptoCrime #Cybersecurity

BGDon 🇨🇦 🇺🇸 👨‍💻BrentD@techhub.social
2026-01-19

This is old news - but worth repeating, as evidence of the crypto wild wild west!

Binance failed to police customer accounts executing suspicious transactions after it's s Nov 2023, settlement with the US Government for violations of sanctions and Bank Secrecy Laws.

Some accounts moved eight or nine figure sums, with a total of $144M in suspicious transfers. The operator of four cryptocurrency wallets involved has a history of transferring illicit funds for Hezbollah, the Houthis in Yemen, and the Assad regime in Syria. comsuregroup.com/news/13-suspi.. #Crypto #CryptoCurrencies #Regulations #BankingLaw #Binance #USGov #CryptoCrime #MoneyLaundering #KYC #OFAC #Zhao

Crypto Currencies
2025-12-30

International arrest tied to crypto malware.

A KMSAuto-based clipper malware campaign infected 2.8M systems and stole ~$1.2M by hijacking crypto wallet addresses.

Details:
technadu.com/hacker-arrested-i

#CryptoCrime #Malware #Infosec

Hacker Arrested in KMSAuto Clipper Malware Campaign Targeting Cryptocurrency
2025-12-19

Alright team, it's been a packed 24 hours in the cyber world! We've got a flurry of actively exploited zero-days and critical vulnerabilities to cover, alongside some significant breaches, new threat actor insights, and a few noteworthy law enforcement actions. Let's dive in:

Actively Exploited Zero-Days and Critical Vulnerabilities ⚠️

- Cisco is battling a maximum-severity zero-day (CVE-2025-20393) in its AsyncOS software for Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances. Suspected Chinese-government-linked threat actors (UAT-9686) have been exploiting this flaw since late November, deploying persistent Python-based backdoors like AquaShell, along with tunneling tools. There's no patch yet, so Cisco advises customers to assess exposure, limit internet access to the Spam Quarantine feature, and rebuild compromised appliances.
- The React2Shell vulnerability (CVE-2025-55182) in React Server Components continues to spread, with Microsoft confirming hundreds of compromised machines across diverse organisations. Attackers are leveraging this RCE flaw for reverse shells, lateral movement, data theft, and even ransomware deployment (Weaxor ransomware). This critical bug now holds the highest verified public exploit count of any CVE, with new related defects (CVE-2025-55183, CVE-2025-67779, CVE-2025-55184) also emerging. Patching is crucial, but won't evict existing attackers.
- HPE has patched a maximum-severity RCE flaw (CVE-2025-37164) in its OneView infrastructure management software, affecting all versions prior to v11.00. This vulnerability allows unauthenticated attackers to execute arbitrary code with low complexity. Admins should update immediately as no workarounds exist.
- SonicWall is warning customers about an actively exploited zero-day (CVE-2025-40602) in its SMA 1000 remote-access appliance. This bug, stemming from insufficient authorisation checks, can be chained with a previously patched flaw (CVE-2025-23006) to achieve unauthenticated root-level RCE. Immediate updates and restricting console access to trusted networks are advised.
- CISA has added CVE-2025-59374, a critical supply chain compromise impacting ASUS Live Update, to its Known Exploited Vulnerabilities (KEV) catalog. This flaw, linked to 2019's Operation ShadowHammer, allowed attackers to distribute trojanised software to specific targets. ASUS Live Update has reached end-of-support, so federal agencies are urged to discontinue its use.
- The Zeroday Cloud hacking competition in London saw researchers demonstrate 11 zero-day vulnerabilities in critical cloud infrastructure components like Redis, PostgreSQL, Grafana, MariaDB, and the Linux kernel. This highlights significant security gaps in widely used cloud systems, including a container escape flaw in the Linux kernel that could break isolation between cloud tenants.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🕵🏼 The Register | go.theregister.com/feed/www.th
📰 The Hacker News | thehackernews.com/2025/12/cisc
🗞️ The Record | therecord.media/chinese-attack
🤫 CyberScoop | cyberscoop.com/react2shell-vul
📰 The Hacker News | thehackernews.com/2025/12/thre (React2Shell Exploited in Ransomware Attacks)
🕵🏼 The Register | go.theregister.com/feed/www.th
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
📰 The Hacker News | thehackernews.com/2025/12/hpe-
🕵🏼 The Register | go.theregister.com/feed/www.th
📰 The Hacker News | thehackernews.com/2025/12/cisa
🤖 Bleeping Computer | bleepingcomputer.com/news/secu

Recent Cyber Attacks and Breaches 🔒

- Amazon's AWS GuardDuty team has warned of an ongoing cryptomining campaign leveraging compromised IAM credentials to exploit Elastic Compute Cloud (EC2) and Elastic Container Service (ECS) instances. Attackers establish persistence by disabling API termination, hindering incident response.
- France's Ministry of the Interior confirmed a cyberattack on its internal email servers, compromising document files. A 22-year-old suspect, previously convicted for similar offences, has been arrested. The notorious BreachForums claimed responsibility, citing revenge for prior arrests, and alleged the theft of 16 million police records, though French authorities have not confirmed this.
- PornHub and SoundCloud have both disclosed data breaches stemming from a compromise at their data analytics service provider, Mixpanel. PornHub stated limited analytics events were extracted, while SoundCloud reported email addresses and public profile information for approximately 20% of its 200 million users were accessed. The ShinyHunters group has allegedly taken credit for the Mixpanel attacks.
- DXS International, a tech supplier for the NHS, is investigating a cyberattack on its internal office servers. While the company claims minimal impact on frontline clinical services, the incident highlights the ongoing risk to critical infrastructure via third-party suppliers.
- The University of Sydney suffered a data breach after hackers accessed an online coding repository, stealing personal information of over 27,000 current and former staff, affiliates, students, and alumni. The stolen data includes names, dates of birth, phone numbers, home addresses, and job details, though no evidence of online publication or misuse has been found yet.
- French authorities arrested a Latvian crew member of an Italian passenger ferry, suspected of installing malware that could allow remote control of the vessel. The incident is being investigated as suspected foreign interference.
- The Clop ransomware gang is actively targeting internet-exposed Gladinet CentreStack file servers in a new data theft extortion campaign. It's currently unclear if Clop is exploiting a new zero-day or an unpatched N-day vulnerability, but over 200 CentreStack servers are potentially vulnerable.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🕵🏼 The Register | go.theregister.com/feed/www.th
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🗞️ The Record | therecord.media/france-interio
🗞️ The Record | therecord.media/millions-impac
🕵🏼 The Register | go.theregister.com/feed/www.th
🗞️ The Record | therecord.media/uk-nhs-tech-pr
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🤖 Bleeping Computer | bleepingcomputer.com/news/secu

New Threat Research on Threat Actors, Malware, and Techniques 🛡️

- North Korea's state-backed cybercriminals plundered over $2 billion in cryptocurrency in 2025, a 51% increase year-on-year, accounting for 76% of all crypto service compromises. This surge is largely attributed to a $1.5 billion theft from Bybit and an increased focus on personal wallets, often facilitated by social engineering tactics like posing as IT workers or recruiters.
- The Kimsuky threat actor is distributing a new DocSwap Android malware variant via QR codes on phishing sites mimicking CJ Logistics. The malware uses social engineering to bypass security warnings and provides extensive RAT capabilities, including keystroke logging, audio capture, and file operations.
- GreyNoise observed an automated password spraying campaign targeting Palo Alto Networks GlobalProtect and Cisco SSL VPN gateways. Originating from over 10,000 unique IPs, the attacks use common username/password combinations, indicating scripted credential probing rather than vulnerability exploitation.
- A new modular information stealer, SantaStealer, is being advertised on underground forums, designed to operate in-memory and exfiltrate sensitive documents, credentials, and wallets from a wide range of applications.
- Threat actors are using a new "GhostPairing" social engineering technique to hijack WhatsApp accounts by luring victims to scan QR codes or enter phone numbers on fake Facebook viewer pages, abusing the legitimate device-linking feature.
- Bad actors are observed hosting videos on RuTube, advertising Roblox cheats that lead to Trojan and stealer malware like Salat Stealer, mirroring tactics seen on YouTube.
- An analysis of DDoSia's multi-layered command-and-control (C2) infrastructure reveals an average of 6 control servers active at any given time, with short lifespans, used by pro-Russian hacktivist group NoName057(16) to target Ukraine, European allies, and NATO states.
- A phishing campaign, attributed to Russian APT actors, is targeting entities in the Baltics and Balkans, spoofing government bodies with credential phishing emails that use blurred decoy documents and pop-ups to harvest credentials.
- New "ClickFix" attacks are leveraging fake CAPTCHA checks to trick users into running the `finger.exe` tool to retrieve malicious PowerShell code, attributed to clusters KongTuke and SmartApeSG.
- Threat actors are abusing Google's Application Integration service to send highly convincing phishing emails from authentic @google.com addresses, bypassing SPF, DKIM, and DMARC checks to steal Microsoft 365 credentials.
- Cato Networks observed large-scale reconnaissance and exploitation attempts targeting Modbus devices, including those controlling solar panel output. The rise of agentic AI tools is accelerating these attacks, reducing execution time from days to minutes.
- Bitsight research found approximately 1,000 Model Context Protocol (MCP) servers exposed on the internet without authorisation, leaking sensitive data and potentially allowing RCE or Kubernetes cluster management.
- A phishing campaign impersonating India's Income Tax Department is deploying legitimate remote access tools like LogMeIn Resolve, using tax irregularity themes to create urgency and bypass traditional Secure Email Gateway defenses.
- A previously unknown, China-aligned hacker group, LongNosedGoblin, is targeting government institutions across Southeast Asia and Japan. The group abuses Windows Group Policy to deploy malware like NosyHistorian (browser history collector) and NosyDoor (backdoor), with NosyDoor potentially offered as a commercial service.

🕵🏼 The Register | go.theregister.com/feed/www.th
🗞️ The Record | therecord.media/over-3-billion
📰 The Hacker News | thehackernews.com/2025/12/kims
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
📰 The Hacker News | thehackernews.com/2025/12/thre (SantaStealer, GhostPairing, RuTube, DDoSia, APT phishing, ClickFix, Google service abused, AI-driven ICS scans, Exposed MCP servers, Fake tax scam)
🗞️ The Record | therecord.media/new-china-link

#CyberSecurity #ThreatIntelligence #ZeroDay #RCE #Vulnerability #Ransomware #APT #CyberAttack #DataBreach #InfoSec #IncidentResponse #CloudSecurity #SupplyChainSecurity #CryptoCrime

2025-12-06

OSINT points to possible arrest of crypto actor ‘Danny’ after seizure-style wallet flows

technadu.com/osint-signals-pos

• $18.58M consolidated into one wallet
• Flows match known LE seizure patterns
• Links to Genesis ($243M) & Kroll SIM-swap ($300M+)
• Reported Dubai villa raid + arrests

#OSINT #ThreatIntel #CryptoCrime #SIMSwap #GenesisBreach #KrollBreach

OSINT Signals Possible Raid and Arrest of Crypto Threat Actor Following Seizure-Style Wallet Transfers
2025-12-01

Internationale Strafverfolgende schalten CryptoGeldwäschedienst ab

Europol als auch BKA berichten über das Abschalten des CryptoGeldwäschedienstes cryptomixer[dot]io, der seit 2016 aktiv war.

Mehr: maniabel.work/archiv/606

#geldwäsche #cryptocrime #BKA #EuroPol #infosec #infosecnews

2025-11-15

DOJ: 5 guilty pleas tied to North Korea’s IT worker scheme. 136 U.S. companies hit, $2.2M earned, and $15M in stolen crypto seized from APT38/Lazarus operations.

#CyberSecurity #NorthKorea #APT38 #DOJ #ThreatIntel #CryptoCrime

Multiple US citizens plead guilty to helping North Korean IT workers earn $2 million
BGDon 🇨🇦 🇺🇸 👨‍💻BrentD@techhub.social
2025-10-09

Yowzers! New analysis indicates on-chain balances linked to criminal activity currently exceeds $75B. Bitcoin holds ~ 75% of total illicit entity balances and not surprising stablecoins and ether have grown substantially.

This situation presents law enforcement with an unprecedented opportunity: billions of dollars in illicit proceeds are sitting on public blockchains, and theoretically can be seized if authorities can coordinate action! chainalysis.com/blog/landscape #Crypto #CryptoCurrencies #IllicitActivity #CryptoAssets #CriminalActivities #BlockChain #DigitalAssets #CryptoCrime #MoneyLaundering #BTC #ETH #ShadowEconomy #StableCoins

Cyber Criminal
2025-09-30

Morning, cyber pros! ☕ It's been a packed 24 hours with some serious breaches, actively exploited vulnerabilities, and significant regulatory shifts. We're also seeing new threat actor TTPs and a massive crypto bust. Let's dive in:

Airline and Beverage Giant Hit by Cyberattacks ⚠️

- Canadian airline WestJet confirmed a June cyberattack exposed sensitive customer data, including full names, dates of birth, mailing addresses, and travel documents like passports and government IDs. No credit card or password data was compromised.
- Japanese beverage company Asahi experienced a cyberattack causing system failures that halted order, shipment, and call centre operations in Japan, though no personal or customer data leakage has been confirmed.
- These incidents highlight the ongoing vulnerability of major corporations to cyber threats, with WestJet's breach potentially linked to the Scattered Spider group, known for targeting aviation.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🗞️ The Record | therecord.media/asahi-japan-cy

New Chinese Espionage Group "Phantom Taurus" Emerges 🇨🇳

- Palo Alto Networks' Unit 42 has identified a new, highly stealthy Chinese espionage group, "Phantom Taurus," targeting geopolitically significant victims in the Middle East, Africa, and Asia.
- This group uses a distinct set of custom malware, including the NET-STAR suite of web-based backdoors, designed for extreme stealth and long-term persistence to exfiltrate sensitive data.
- Phantom Taurus primarily gains initial access by exploiting known vulnerabilities in internet-facing devices, underscoring the importance of timely patching even against advanced threats.

🤫 CyberScoop | cyberscoop.com/phantom-taurus-

North Korean IT Worker Scheme Expands Globally 🇰🇵

- Okta's research reveals North Korea is significantly expanding its illicit IT worker scheme beyond the US tech sector, now targeting dozens of industries and countries worldwide, including finance, healthcare, and government.
- These workers use fake or stolen identities to secure high-paying remote roles, aiming to circumvent sanctions and generate millions for Pyongyang's military, with a notable increase in applications for AI-focused positions.
- The campaign's evolution into new markets, coupled with increased pressure from law enforcement, suggests North Korean threat actors may increasingly resort to ransomware, data theft, and extortion tactics.

🗞️ The Record | therecord.media/north-korea-it

MatrixPDF Toolkit Weaponises PDFs for Phishing 🎣

- A new toolkit called MatrixPDF is being sold on cybercrime forums, enabling attackers to transform ordinary PDF files into interactive phishing and malware lures that bypass email security.
- The tool allows embedding blurred content, fake "Secure Document" prompts, and clickable overlays that redirect victims to credential theft pages or malware downloads, leveraging JavaScript actions.
- MatrixPDF's design cleverly bypasses Gmail's phishing filters by not containing malicious binaries directly, instead relying on user interaction to open external malicious links, making it a potent new threat.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu

Google Drive Integrates AI for Ransomware Detection 🛡️

- Google has rolled out a new AI tool in Drive for desktop designed to detect ransomware activity, such as mass file encryption, and automatically pause syncing to limit damage spread.
- The model, trained on millions of real-world ransomware samples and leveraging VirusTotal threat intelligence, aims to provide early alerts and facilitate file restoration with a few clicks.
- While a significant defensive layer, Google clarifies this is not a silver bullet to prevent ransomware outright but rather to mitigate its impact, working in conjunction with traditional antivirus solutions.

🕵🏼 The Register | go.theregister.com/feed/www.th

Anthropic Enhances Claude Sonnet 4.5 for Safety and Security 🤖

- Anthropic has released Claude Sonnet 4.5, touting significant improvements in safety and security, including enhanced defences against prompt injection attacks and reduced concerning behaviours like sycophancy and deception.
- The model underwent AI Safety Level 3 training, incorporating increased internal security measures and safeguards to limit jailbreaking and refusal of harmful queries, particularly around weapons and influence operations.
- Sonnet 4.5 also shows "meaningful" improvements in defensive cybersecurity tasks like vulnerability discovery and code analysis, though it still operates "well below" the capabilities for autonomous end-to-end cyber operations.

🤫 CyberScoop | cyberscoop.com/anthrophic-sonn

Cisco ASA/FTD Flaws Actively Exploited, Thousands Remain Vulnerable 🚨

- Nearly 50,000 Cisco Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) instances remain internet-exposed and vulnerable to CVE-2025-20333 (RCE) and CVE-2025-20362 (VPN access bypass), which are actively exploited.
- Despite Cisco's warnings and a rare 24-hour CISA emergency directive for federal agencies to patch, a significant number of devices, particularly in the US, are yet to be secured.
- Attackers, potentially linked to the sophisticated ArcaneDoor campaign, are deploying 'RayInitiator' bootkit and 'Line Viper' shellcode loader, highlighting an advanced evolution in tradecraft targeting end-of-life or soon-to-be end-of-life devices.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🕵🏼 The Register | go.theregister.com/feed/www.th

Critical Sudo Flaw Under Active Exploitation 🐧

- CISA has added CVE-2025-32463, a critical privilege escalation vulnerability in the Linux Sudo package, to its Known Exploited Vulnerabilities catalog due to active exploitation.
- This flaw allows local attackers to execute arbitrary commands as root using the -R (--chroot) option, even if they are not listed in the sudoers file, affecting Sudo versions 1.9.14 through 1.9.17.
- Federal agencies have until October 20 to apply mitigations or discontinue Sudo use, underscoring the urgency for all organisations to patch immediately.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
📰 The Hacker News | thehackernews.com/2025/09/cisa

Fortra GoAnywhere MFT Vulnerability Actively Exploited 📁

- CISA has ordered federal agencies to patch CVE-2025-10035, a critical deserialization vulnerability (CVSS 10.0) in Fortra's GoAnywhere MFT solution, due to strong indications of active exploitation.
- The flaw primarily affects organisations with an internet-exposed GoAnywhere admin console and could lead to command injection, reminiscent of a 2023 GoAnywhere vulnerability exploited by ransomware gangs like Clop.
- Fortra has released a patch and mitigation guidance, urging customers to review configurations and remove public access from the Admin Console, despite not explicitly confirming in-the-wild exploitation.

🗞️ The Record | therecord.media/cisa-orders-fe
📰 The Hacker News | thehackernews.com/2025/09/fort

Broadcom Patches Actively Exploited VMware Zero-Day and NSA-Reported Flaws ☁️

- Broadcom has patched CVE-2025-41244, a high-severity privilege escalation vulnerability in VMware Aria Operations and VMware Tools, which has been exploited as a zero-day by the Chinese state-sponsored threat actor UNC5174 since October 2024.
- UNC5174 leverages this flaw by staging a malicious binary in common paths like /tmp/httpd, which is then picked up by VMware service discovery, leading to root-level code execution.
- Additionally, Broadcom fixed two high-severity VMware NSX username enumeration vulnerabilities (CVE-2025-41251, CVE-2025-41252) reported by the NSA, which could facilitate brute-force attacks.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🤖 Bleeping Computer | bleepingcomputer.com/news/secu

Google Gemini AI Flaws Disclosed 🧠

- Researchers have uncovered and Google has patched three "Gemini Trifecta" vulnerabilities in Google's Gemini AI assistant, which could have led to significant privacy risks and data theft.
- Flaws included prompt injection in Gemini Cloud Assist (exploiting log summarisation to compromise cloud resources), search-injection in Gemini Search Personalization (manipulating Chrome search history to leak user data), and indirect prompt injection in Gemini Browsing Tool (exfiltrating user data to external servers).
- These vulnerabilities highlight that AI itself can be an attack vector, not just a target, underscoring the need for robust security in AI adoption.

📰 The Hacker News | thehackernews.com/2025/09/rese

FTC Sues Sendit App for Child Data Collection and Deceptive Practices 🧒

- The FTC is suing Sendit, a popular social media companion app, and its CEO for allegedly violating COPPA by illegally collecting personal data (phone numbers, birthdates, photos, social media usernames) from over 116,000 US children under 13 without parental consent.
- The lawsuit also alleges deceptive practices, including generating fake, provocative anonymous messages to trick users into purchasing a "Diamond Membership" for up to $9.99 a week, falsely promising to reveal sender identities.
- These actions highlight serious concerns about child online privacy and manipulative subscription models, with the FTC seeking to hold the company accountable under COPPA, the FTC Act, and ROSCA.

🤖 Bleeping Computer | bleepingcomputer.com/news/lega
🗞️ The Record | therecord.media/ftc-alleges-se

Imgur Blocks UK Users Following Data Watchdog Fine Warning 🇬🇧

- Imgur has blocked access for all users in the United Kingdom after the Information Commissioner's Office (ICO) issued a notice of intent to fine its parent company, MediaLab, over concerns about protecting children's data under the Online Safety Act.
- The geoblock means UK users cannot log in, view content, or upload images, and embedded Imgur content on third-party sites is also unavailable, causing widespread impact.
- The ICO warns that blocking UK users does not exempt Imgur from any previously imposed fines, highlighting the serious consequences of non-compliance with data protection regulations.

🤖 Bleeping Computer | bleepingcomputer.com/news/tech

#CyberSecurity #ThreatIntelligence #Vulnerabilities #ZeroDay #ActiveExploitation #Ransomware #APT #NationState #DataPrivacy #Regulatory #CISA #AI #Phishing #Malware #CryptoCrime #InfoSec #IncidentResponse

2025-07-15

Heads up, crypto fam! 🚨 Two LA Sheriff deputies admitted to aiding a crypto "Godfather" in extortion schemes. 🤯 This highlights the need for vigilance! #CryptoCrime #LASD #Regulation

2025-07-15

Hey Crypto Fam! 👋 FOMO & lax regulations are fueling a crypto crime wave, says ex-DEA agent. Bad actors are profiting despite mistakes. Stay safe out there! 🛡️ #CryptoCrime #DeFi #Regulation

2025-07-08

UK court sentences two men to prison for a $2M cold-calling crypto scam impacting 65 investors. 🚨 Scam warning! Always DYOR. #CryptoScam #CryptoCrime #DYOR

BGDon 🇨🇦 🇺🇸 👨‍💻BrentD@techhub.social
2025-06-17

The U.S. Attorney’s Office for the Eastern District of Virginia has seized 145 darknet and traditional internet domains, and cryptocurrency funds associated with the BidenCash marketplace.

Between Oct 2022 and Feb 2023, the marketplace published 3.3 million stolen credit card data including credit card numbers, expiration dates, Card Verification Value (CVV) numbers, account holder names, addresses, email addresses, and phone numbers, and generated over $17 million in revenue during its operations.

justice.gov/usao-edva/pr/us-go #Crypto #Cryptocurrency #DarkNet #BidenCash #CryptoCrime #CreditCards #DOJ #Crime

Cryptocurrency
BGDon 🇨🇦 🇺🇸 👨‍💻BrentD@techhub.social
2025-06-10

Classic example of using a cryptocurrency company to execute a money laundering pipeline.

Justice Department prosecutors in Brooklyn NY charged the defendant routed ~ $530M in funds through the dollar-pegged stablecoin tether and falsified documents to mask funds tied to sanctioned Russian institutions were being laundered. Further, prosecutors say the defendant maintained ties to Russian intelligence, as well as officials in Iran. cnbc.com/2025/06/09/crypto-rus #Crypto #Cryptocurrency #Stablecoins #Tether #MoneyLaudering #Russia #Banking #CryptoCrime #BankFraud

Cryptocurrency
The Internet is Cracktheinternetiscrack
2025-06-07

“Digital currency is invisible—until the threat is right in front of you.”


2025-06-05

French "crypto kidnapping" mastermind arrested in Morocco! 🚨 Badiss Mohamed Amide Bajjou is accused of leading a series of crypto-related kidnappings in France. Justice is coming! #CryptoCrime #Morocco #Arrest

2025-05-23

⚖️ "No questions asked" Bitcoin launderer sentenced to 6 years in prison and ordered to forfeit $1.5M. Nguyen ran an unlicensed cash-to-BTC conversion service, ignoring regulations. Crime doesn't pay, folks! #CryptoCrime #Bitcoin #AML

IT InsightsITinsights
2025-05-17

🚨 12 crypto-criminelen stelen $230M! 🚨 De cryptowereld opgeschud door een mega-fraudezaak. Tijd voor betere beveiliging!  
itinsights.nl/analyses/12-cryp

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst