Binance Square

CyberSecurity

775,597 views
454 Discussing
Salma6422
--
🚨 INTERPOL just dismantled 20,000+ malicious IPs linked to 69 info-stealing malware strains across 26 countries! ✅ 32 arrests ✅ 41 servers seized (phishing, fraud, scams) ✅ Major blow to global cybercrime The digital underworld just took a hit. 💥 #CyberSecurity #Malware CheckDot is SAFU research on CheckDot $CDT
🚨 INTERPOL just dismantled 20,000+ malicious IPs linked to 69 info-stealing malware strains across 26 countries!

✅ 32 arrests
✅ 41 servers seized (phishing, fraud, scams)
✅ Major blow to global cybercrime

The digital underworld just took a hit. 💥 #CyberSecurity #Malware

CheckDot is SAFU research on CheckDot $CDT
🧟‍♂️ Librarian Ghouls Hackers Hijack Russian Devices to Mine Crypto ....... 🕵️‍♂️ Cybersecurity firm Kaspersky reports that a group known as Librarian Ghouls (aka Rare Werewolf) has compromised hundreds of Russian systems for cryptojacking. 📩 Attack vector: Phishing emails mimicking payment orders & official documents. ⚙️ The hackers use legit third-party utilities to stay stealthy — a common hacktivist tactic. 💰 Endgame: Mining crypto on infected machines without the user’s consent. 🧠 Kaspersky suggests ideological motives behind the attack. 🔗 Cointelegraph #CyberSecurity #Binance #HackerAlert #bitcoin $BTC $XRP
🧟‍♂️ Librarian Ghouls Hackers Hijack Russian Devices to Mine Crypto

.......

🕵️‍♂️ Cybersecurity firm Kaspersky reports that a group known as Librarian Ghouls (aka Rare Werewolf) has compromised hundreds of Russian systems for cryptojacking.

📩 Attack vector: Phishing emails mimicking payment orders & official documents.

⚙️ The hackers use legit third-party utilities to stay stealthy — a common hacktivist tactic.

💰 Endgame: Mining crypto on infected machines without the user’s consent.

🧠 Kaspersky suggests ideological motives behind the attack.

🔗 Cointelegraph

#CyberSecurity #Binance #HackerAlert #bitcoin

$BTC $XRP
Warning: Popular App Accused of Seizing Crypto from Users with Inactive WalletsAlby, a widely used app among Bitcoin enthusiasts, is facing criticism from the community. According to recent reports, the platform has allegedly withdrawn funds from inactive Bitcoin wallets — without the users’ explicit consent. 🔍 What Happened? Multiple users on forums and social media claim that Alby reset balances in certain shared wallets that had seen no activity for 12 months. The issue appears to affect older accounts created in 2023 or earlier. While users argue they were not properly warned, Alby maintains that the policy was clearly stated in its terms of service. 📜 What Do Alby’s Terms Say? According to Alby’s official website, shared wallets tied to inactive accounts may have their remaining balances removed after 12 months of no transactions. The company says this measure was introduced to “help manage inactive accounts.” Alby insists users have been informed about this rule for a long time, but many argue the notices were not visible or clear enough. 🎯 Who Is Affected? This controversial practice does not apply to active accounts. It also does not impact: 🔹 actively used wallets 🔹 Alby Hubs 🔹 fee credit balances 🔹 externally connected wallets ⚡ What Is Alby? Alby is a popular browser extension that allows users to send and receive Bitcoin payments using the Lightning Network — directly through their web browser. It's especially favored by Bitcoin users looking for a simple and efficient way to handle BTC without separate apps or hardware wallets. 💬 Final Thoughts The crypto community is calling for more transparency and clearer communication from Alby, particularly regarding how the platform handles prolonged account inactivity. While the company defends its move as a technical necessity, critics see it as unjustified seizure of crypto assets. ❗ Are you using Alby? Check your account activity — you don’t want to be the next surprised user. #CryptoWarnings , #bitcoin , #CryptoSecurity , #CyberSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Warning: Popular App Accused of Seizing Crypto from Users with Inactive Wallets

Alby, a widely used app among Bitcoin enthusiasts, is facing criticism from the community. According to recent reports, the platform has allegedly withdrawn funds from inactive Bitcoin wallets — without the users’ explicit consent.

🔍 What Happened?
Multiple users on forums and social media claim that Alby reset balances in certain shared wallets that had seen no activity for 12 months. The issue appears to affect older accounts created in 2023 or earlier.
While users argue they were not properly warned, Alby maintains that the policy was clearly stated in its terms of service.

📜 What Do Alby’s Terms Say?
According to Alby’s official website, shared wallets tied to inactive accounts may have their remaining balances removed after 12 months of no transactions. The company says this measure was introduced to “help manage inactive accounts.”
Alby insists users have been informed about this rule for a long time, but many argue the notices were not visible or clear enough.

🎯 Who Is Affected?
This controversial practice does not apply to active accounts. It also does not impact:

🔹 actively used wallets

🔹 Alby Hubs

🔹 fee credit balances

🔹 externally connected wallets

⚡ What Is Alby?
Alby is a popular browser extension that allows users to send and receive Bitcoin payments using the Lightning Network — directly through their web browser.
It's especially favored by Bitcoin users looking for a simple and efficient way to handle BTC without separate apps or hardware wallets.

💬 Final Thoughts
The crypto community is calling for more transparency and clearer communication from Alby, particularly regarding how the platform handles prolonged account inactivity. While the company defends its move as a technical necessity, critics see it as unjustified seizure of crypto assets.
❗ Are you using Alby? Check your account activity — you don’t want to be the next surprised user.

#CryptoWarnings , #bitcoin , #CryptoSecurity , #CyberSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
What Happens If Your ADB Port Is Open? | Hidden Hacking Threat! Did you know your Android phone may have a secret backdoor open? It’s called the ADB Port (5555) — and hackers love it! 🛠️ ADB (Android Debug Bridge) lets developers: Transfer files Install/uninstall apps Access system shell But if someone runs: adb tcpip 5555 ADB goes into WiFi mode, exposing port 5555 to the local network. ⚠️ What Can Hackers Do? If you're on the same WiFi as a hacker, and ADB port is open, they can: Connect to your phone: adb connect your_ip:5555 Pull all your files Access camera/mic Reboot your phone Install malware silently 🔍 How to Check: Go to: Settings > Developer Options > Wireless Debugging Or use: nmap -p 5555 [device_ip] 🛡️ Stay Safe: Turn off Wireless Debugging when not needed Avoid using Developer Mode on public WiFi Disable ADB over WiFi: adb usb Avoid shady apps with ADB-related permissions 🔐 ADB Port = An open door If the door's open, someone will walk in. Be aware, stay protected. #CyberSecurity #AndroidSecurity #TechAwareness #MobileSecurity #Binacefeed
What Happens If Your ADB Port Is Open? | Hidden Hacking Threat!

Did you know your Android phone may have a secret backdoor open?
It’s called the ADB Port (5555) — and hackers love it!

🛠️ ADB (Android Debug Bridge) lets developers:

Transfer files
Install/uninstall apps
Access system shell

But if someone runs:
adb tcpip 5555
ADB goes into WiFi mode, exposing port 5555 to the local network.

⚠️ What Can Hackers Do?

If you're on the same WiFi as a hacker, and ADB port is open, they can:

Connect to your phone:
adb connect your_ip:5555

Pull all your files
Access camera/mic
Reboot your phone
Install malware silently

🔍 How to Check:
Go to: Settings > Developer Options > Wireless Debugging

Or use:
nmap -p 5555 [device_ip]

🛡️ Stay Safe:

Turn off Wireless Debugging when not needed

Avoid using Developer Mode on public WiFi

Disable ADB over WiFi:

adb usb

Avoid shady apps with ADB-related permissions

🔐 ADB Port = An open door
If the door's open, someone will walk in. Be aware, stay protected.

#CyberSecurity #AndroidSecurity #TechAwareness #MobileSecurity
#Binacefeed
#CryptoSecurity101 🔐 Your Crypto, Your Responsibility In crypto, security isn’t optional — it’s essential. Want to protect your assets like a pro? Follow these tips: 🛡️ Top Crypto Security Practices: ✅ Use 2FA (Two-Factor Authentication) ✅ Beware of phishing links & fake apps ✅ Never share your seed phrase 🧠 ✅ Use strong, unique passwords ✅ Enable withdrawal whitelist 🚫 ✅ Keep your software & wallet updated Remember: **Not your keys, not your coins.** Stay safe. Stay smart. Stay in control. 💪 🔖 **#CryptoSecurity101** #Web3Safety #CyberSecurity #CryptoBasics #BlockchainSecurity
#CryptoSecurity101

🔐 Your Crypto, Your Responsibility

In crypto, security isn’t optional — it’s essential.
Want to protect your assets like a pro? Follow these tips:

🛡️ Top Crypto Security Practices:
✅ Use 2FA (Two-Factor Authentication)
✅ Beware of phishing links & fake apps
✅ Never share your seed phrase 🧠
✅ Use strong, unique passwords
✅ Enable withdrawal whitelist 🚫
✅ Keep your software & wallet updated

Remember: **Not your keys, not your coins.**
Stay safe. Stay smart. Stay in control. 💪

🔖 **#CryptoSecurity101** #Web3Safety #CyberSecurity #CryptoBasics #BlockchainSecurity
The Crypto Kidnapping That Shocked the Industry Part-20🚨 The Rise of Crypto Kidnappings – A New Threat In May 2025, a wealthy crypto investor, Michael Valentino Teofrasto Carturan, was kidnapped and tortured for 17 days in his $40,000-a-month Manhattan townhouse. His captors wanted access to his Bitcoin wallet, which allegedly contained $28 million. ✔️ The kidnappers used brutal methods, including electric shocks and threats with a chainsaw. ✔️ They forced Carturan to smoke crack cocaine, trying to break his will. ✔️ Despite the torture, he refused to give up his private keys, eventually escaping. This wasn’t just another crypto crime—it was a terrifying real-world attack on digital wealth. 💰 The Kidnapping – How It Happened 🚨 Carturan was targeted because of his public crypto investments, making him an easy mark. 🚨 The attackers ambushed him in his home, turning it into a torture chamber. 🚨 After 17 days, he managed to escape, leading to the arrest of his captors. For years, crypto crime was limited to online hacks, but now, it was spilling into the real world. 🔥 The Exposure – The Aftermath of the Attack ✔️ Authorities arrested the kidnappers, charging them with assault and attempted extortion. ✔️ Crypto security experts warned investors, advising them to keep their holdings private. ✔️ Insurance companies began offering policies for crypto kidnappings, recognizing the growing threat. This case wasn’t just another Bitcoin theft—it was a wake-up call for crypto security. ⚖️ The Aftermath – A Warning for Crypto Investors 🚨 Crypto’s anonymity makes it attractive for criminals, but it also raises ethical concerns. 🚨 Regulators are tightening security, making laundering more difficult. 🚨 Blockchain transparency can expose hidden financial operations, proving that no entity is truly anonymous. This scandal wasn’t just about money—it was a defining moment for crypto’s role in real-world crime. 🔮 Lessons Learned – What This Means for the Future 🚨 Crypto security must improve, as physical attacks are becoming more common. 🚨 Regulation is evolving, making it harder for criminals to escape justice. 🚨 Blockchain transparency is both a strength and a weakness, as it can expose criminals but also be exploited. The story of Michael Carturan’s crypto kidnapping isn’t just speculation—it’s a real case that revealed the dark side of crypto crime. $BTC #CryptoKidnapping #BitcoinCrime #CyberSecurity #CryptoHistory #Write2Earn 🚀🔥

The Crypto Kidnapping That Shocked the Industry Part-20

🚨 The Rise of Crypto Kidnappings – A New Threat

In May 2025, a wealthy crypto investor, Michael Valentino Teofrasto Carturan, was kidnapped and tortured for 17 days in his $40,000-a-month Manhattan townhouse. His captors wanted access to his Bitcoin wallet, which allegedly contained $28 million.

✔️ The kidnappers used brutal methods, including electric shocks and threats with a chainsaw.

✔️ They forced Carturan to smoke crack cocaine, trying to break his will.

✔️ Despite the torture, he refused to give up his private keys, eventually escaping.

This wasn’t just another crypto crime—it was a terrifying real-world attack on digital wealth.

💰 The Kidnapping – How It Happened

🚨 Carturan was targeted because of his public crypto investments, making him an easy mark.

🚨 The attackers ambushed him in his home, turning it into a torture chamber.

🚨 After 17 days, he managed to escape, leading to the arrest of his captors.

For years, crypto crime was limited to online hacks, but now, it was spilling into the real world.

🔥 The Exposure – The Aftermath of the Attack

✔️ Authorities arrested the kidnappers, charging them with assault and attempted extortion.

✔️ Crypto security experts warned investors, advising them to keep their holdings private.

✔️ Insurance companies began offering policies for crypto kidnappings, recognizing the growing threat.

This case wasn’t just another Bitcoin theft—it was a wake-up call for crypto security.

⚖️ The Aftermath – A Warning for Crypto Investors

🚨 Crypto’s anonymity makes it attractive for criminals, but it also raises ethical concerns.

🚨 Regulators are tightening security, making laundering more difficult.

🚨 Blockchain transparency can expose hidden financial operations, proving that no entity is truly anonymous.

This scandal wasn’t just about money—it was a defining moment for crypto’s role in real-world crime.

🔮 Lessons Learned – What This Means for the Future

🚨 Crypto security must improve, as physical attacks are becoming more common.

🚨 Regulation is evolving, making it harder for criminals to escape justice.

🚨 Blockchain transparency is both a strength and a weakness, as it can expose criminals but also be exploited.

The story of Michael Carturan’s crypto kidnapping isn’t just speculation—it’s a real case that revealed the dark side of crypto crime.

$BTC

#CryptoKidnapping #BitcoinCrime #CyberSecurity
#CryptoHistory #Write2Earn 🚀🔥
#CryptoSecurity101 5 Cybersecurity Red Flags You Shouldn’t Ignore in 2025” 🚨 Cyber attacks aren’t coming. They’re already here. Here are 5 red flags you need to watch for: 1. 🔗 Unfamiliar wallet connection requests 2. 📧 Emails with slightly altered domain names (e.g. amaz0n.com) 3. 📦 Free airdrops asking for your private key 4. 🧪 Projects without verifiable smart contract audits 5. 👤 Fake team profiles with no LinkedIn presence ✅ Tip: Always use a hardware wallet + check blockchain explorers to verify transactions. Web3 is powerful — but only if you protect your side of the chain. — abdulrehmanads #CyberSecurity #Web3Safety #CryptoScams #BlockchainSecurity
#CryptoSecurity101 5 Cybersecurity Red Flags You Shouldn’t Ignore in 2025”

🚨 Cyber attacks aren’t coming. They’re already here.

Here are 5 red flags you need to watch for:
1. 🔗 Unfamiliar wallet connection requests
2. 📧 Emails with slightly altered domain names (e.g. amaz0n.com)
3. 📦 Free airdrops asking for your private key
4. 🧪 Projects without verifiable smart contract audits
5. 👤 Fake team profiles with no LinkedIn presence

✅ Tip: Always use a hardware wallet + check blockchain explorers to verify transactions.

Web3 is powerful — but only if you protect your side of the chain.

— abdulrehmanads

#CyberSecurity #Web3Safety #CryptoScams #BlockchainSecurity
See original
ALEX Lab to compensate losses after $8.3 million hacking attackOn June 6, 2025, the DeFi platform ALEX Lab, operating on the Stacks blockchain, suffered a hacking attack that resulted in the theft of assets totaling $8.3 million. According to data from X, the attacker exploited a vulnerability in the self-listing logic, allowing them to withdraw 8.4 million STX, 21.85 $BTC , 149,850 USDC/USDT, and 2.8 WBTC. This is the second major breach of the platform in two years, following the attack in May 2024 for $4.3 million.

ALEX Lab to compensate losses after $8.3 million hacking attack

On June 6, 2025, the DeFi platform ALEX Lab, operating on the Stacks blockchain, suffered a hacking attack that resulted in the theft of assets totaling $8.3 million. According to data from X, the attacker exploited a vulnerability in the self-listing logic, allowing them to withdraw 8.4 million STX, 21.85 $BTC , 149,850 USDC/USDT, and 2.8 WBTC. This is the second major breach of the platform in two years, following the attack in May 2024 for $4.3 million.
BREAKING NEWS: Major Surprise – Another Country Has Officially Adopted Bitcoin as Its CurrencyThe President of Paraguay announced on his official X account that his country will recognize Bitcoin as legal tender. The news was shared by Bloomberg, but it seems likely that the Paraguayan President's X account was hacked. A cryptocurrency wallet address was shared from the account. The Paraguayan government has confirmed that the Paraguayan President's account was hacked. #ParaguayBitcoinHack #bitcoin #BTC #CyberSecurity #blockchain $BTC $ETH $BNB

BREAKING NEWS: Major Surprise – Another Country Has Officially Adopted Bitcoin as Its Currency

The President of Paraguay announced on his official X account that his country will recognize Bitcoin as legal tender.

The news was shared by Bloomberg, but it seems likely that the Paraguayan President's X account was hacked. A cryptocurrency wallet address was shared from the account.

The Paraguayan government has confirmed that the Paraguayan President's account was hacked.
#ParaguayBitcoinHack #bitcoin #BTC #CyberSecurity #blockchain
$BTC $ETH $BNB
🔐 #CryptoSecurity101 : Protect your assets like a pro on #Binance and beyond! 🔹 Enable 2FA – Use Google Authenticator or a hardware key for extra login protection. 🔹 Use Strong Passwords – Long, complex, and unique. Never reuse! 🔹 Beware of Phishing – Double-check URLs, emails, and messages. Binance will never DM you for info. 🔹 Withdraw to Cold Wallets – For long-term storage, use offline wallets. 🔹 Keep Software Updated – Stay protected from the latest threats. Your keys, your crypto. Stay alert, stay secure. 🛡️🔑 #BinanceEducation #StaySafe #CryptoTrading #CyberSecurity $INJ $TRX $TON
🔐 #CryptoSecurity101 : Protect your assets like a pro on #Binance and beyond!

🔹 Enable 2FA – Use Google Authenticator or a hardware key for extra login protection.

🔹 Use Strong Passwords – Long, complex, and unique. Never reuse!

🔹 Beware of Phishing – Double-check URLs, emails, and messages. Binance will never DM you for info.

🔹 Withdraw to Cold Wallets – For long-term storage, use offline wallets.

🔹 Keep Software Updated – Stay protected from the latest threats.

Your keys, your crypto. Stay alert, stay secure. 🛡️🔑

#BinanceEducation #StaySafe #CryptoTrading #CyberSecurity

$INJ $TRX $TON
🚨🔥 DOJ Seizes $7.7M in Crypto From North Korean Hackers! 💰🕵️‍♂️ The U.S. Department of Justice is targeting $7.74 million in cryptocurrency linked to North Korean IT workers 🖥️👨‍💻 who used fake identities 🆔❌ to infiltrate U.S. and global blockchain companies 🌐🔗. These operatives laundered funds 💸🔄 through complex crypto schemes to fund North Korea’s regime 🇰🇵⚔️ and weapons programs, evading sanctions 🚫🛑. The FBI is investigating this growing threat 🔍👮‍♀️, as North Korea increasingly exploits remote IT jobs and crypto ecosystems worldwide 🌍💻. This sophisticated scheme highlights rising cyber risks from state-backed hackers blending in with legit tech workers 🤖🕶️. Source: Decrypt | #CyberSecurity
🚨🔥 DOJ Seizes $7.7M in Crypto From North Korean Hackers! 💰🕵️‍♂️

The U.S. Department of Justice is targeting $7.74 million in cryptocurrency linked to North Korean IT workers 🖥️👨‍💻 who used fake identities 🆔❌ to infiltrate U.S. and global blockchain companies 🌐🔗.

These operatives laundered funds 💸🔄 through complex crypto schemes to fund North Korea’s regime 🇰🇵⚔️ and weapons programs, evading sanctions 🚫🛑.

The FBI is investigating this growing threat 🔍👮‍♀️, as North Korea increasingly exploits remote IT jobs and crypto ecosystems worldwide 🌍💻. This sophisticated scheme highlights rising cyber risks from state-backed hackers blending in with legit tech workers 🤖🕶️.
Source: Decrypt |

#CyberSecurity
🚨 U.S. Seizes $7.7M in Crypto from North Korean Hackers Using Fake IT Jobs The Scheme: North Korean hackers posed as remote IT workers to infiltrate U.S. & global companies, laundering crypto for the Pyongyang regime. 🔍 Key Details: ▪️ $7.7M forfeiture ordered by U.S. DOJ ▪️ Funds funneled through Sim Hyon Sop, a North Korean operative ▪️ Hackers used fake IDs, exchange accounts & NFT purchases to hide tracks ⚠️ Why This Matters: 💰 North Korea generates hundreds of millions yearly from such ops 🖥️ "Freelance devs" could be state-backed hackers 🌐 Sanctions evasion getting more sophisticated 🔥 The Bigger Threat: ✔️ FBI warns of rising complexity in these schemes ✔️ Fake IT workers = new front in cyber warfare #CyberSecurity #CryptoCrime #NorthKorea #USDC #Sanctions (Stay vigilant – verify who you hire!) 🔐
🚨 U.S. Seizes $7.7M in Crypto from North Korean Hackers Using Fake IT Jobs

The Scheme:
North Korean hackers posed as remote IT workers to infiltrate U.S. & global companies, laundering crypto for the Pyongyang regime.

🔍 Key Details:
▪️ $7.7M forfeiture ordered by U.S. DOJ
▪️ Funds funneled through Sim Hyon Sop, a North Korean operative
▪️ Hackers used fake IDs, exchange accounts & NFT purchases to hide tracks

⚠️ Why This Matters:
💰 North Korea generates hundreds of millions yearly from such ops
🖥️ "Freelance devs" could be state-backed hackers
🌐 Sanctions evasion getting more sophisticated

🔥 The Bigger Threat:
✔️ FBI warns of rising complexity in these schemes
✔️ Fake IT workers = new front in cyber warfare

#CyberSecurity #CryptoCrime #NorthKorea #USDC #Sanctions

(Stay vigilant – verify who you hire!) 🔐
See original
🚨 Scammers confessed to stealing $36.9M in crypto! Five members of an international crime group confessed to cryptocurrency fraud targeting U.S. residents. The money was transferred to Cambodia. 📉 The scheme was simple but insidious: — they used social networks and dating apps, — ingratiated themselves, — convinced victims to invest in fake crypto projects. 💸 Initially, the money was sent to fake accounts in the U.S., then converted to USDT and moved to wallets controlled from Cambodia. ⚖️ For their confession, Zhang and Wong could face up to 20 years in prison. The others – up to 5 years. --- 💬 What do you think can be done to protect against such schemes? ❤️ Likes, 🔁 shares, and ✍️ comments are welcome! 📲 Subscribe to not miss important news from the crypto world! #CryptoFraud #BlockchainScam #CryptoCrime #CryptoNews #CyberSecurity $BTC $ETH $SOL {spot}(SOLUSDT) {spot}(ETHUSDT) {spot}(BTCUSDT)
🚨 Scammers confessed to stealing $36.9M in crypto!

Five members of an international crime group confessed to cryptocurrency fraud targeting U.S. residents. The money was transferred to Cambodia.

📉 The scheme was simple but insidious:
— they used social networks and dating apps,
— ingratiated themselves,
— convinced victims to invest in fake crypto projects.

💸 Initially, the money was sent to fake accounts in the U.S., then converted to USDT and moved to wallets controlled from Cambodia.

⚖️ For their confession, Zhang and Wong could face up to 20 years in prison. The others – up to 5 years.

---

💬 What do you think can be done to protect against such schemes?
❤️ Likes, 🔁 shares, and ✍️ comments are welcome!
📲 Subscribe to not miss important news from the crypto world!

#CryptoFraud #BlockchainScam #CryptoCrime #CryptoNews #CyberSecurity

$BTC $ETH $SOL
🚨 U.S. DOJ Targets $7.74M in Crypto Linked to North Korean IT Workers According to Odaily, the U.S. Department of Justice has filed a civil forfeiture lawsuit to seize $7.74M in crypto allegedly laundered by North Korean operatives. 💻 These individuals: Used fake identities to land jobs at U.S. crypto firms Were paid in stablecoins Laundered funds through various channels Funneled crypto back to North Korea 🕵️‍♂️ Yet another reminder of how cybercrime and crypto finance intersect on a global scale. $BTC {spot}(BTCUSDT) #CryptoCrime #NorthKorea #DOJ #Cryptocurrency #CyberSecurity #DeFi #Stablecoins #USLaw #BlockchainNews
🚨 U.S. DOJ Targets $7.74M in Crypto Linked to North Korean IT Workers

According to Odaily, the U.S. Department of Justice has filed a civil forfeiture lawsuit to seize $7.74M in crypto allegedly laundered by North Korean operatives.

💻 These individuals:

Used fake identities to land jobs at U.S. crypto firms

Were paid in stablecoins

Laundered funds through various channels

Funneled crypto back to North Korea

🕵️‍♂️ Yet another reminder of how cybercrime and crypto finance intersect on a global scale.
$BTC

#CryptoCrime #NorthKorea #DOJ #Cryptocurrency #CyberSecurity #DeFi #Stablecoins #USLaw #BlockchainNews
See original
🚨🚨The Office for the Fight Against Corruption in Argentina acknowledges that President Milei's promotion of the meme-crypto “Libra” was a personal act and does not constitute a violation of the applicable federal ethics laws for government officials🚨🚨#CyberSecurity #btc
🚨🚨The Office for the Fight Against Corruption in Argentina acknowledges that President Milei's promotion of the meme-crypto “Libra” was a personal act
and does not constitute a violation of the applicable federal ethics laws for government officials🚨🚨#CyberSecurity #btc
#CryptoSecurity101 #CryptoSecurity101 on Binance is all about protecting your assets. Always enable 2FA (Two-Factor Authentication), use strong, unique passwords, and never share your private keys. Be cautious of phishing emails and fake websites—double-check URLs before logging in. Use hardware wallets for long-term storage and avoid clicking on suspicious links. Keep your Binance account secure with regular security checks in your dashboard. Your crypto is only as safe as your habits. 🛡️ Secure your future—trade smart, stay protected. Visit Binance for more tips. #Binance #CryptoSafety #BlockchainSecurity #CyberSecurity
#CryptoSecurity101

#CryptoSecurity101
on Binance is all about protecting your assets. Always enable 2FA (Two-Factor Authentication), use strong, unique passwords, and never share your private keys. Be cautious of phishing emails and fake websites—double-check URLs before logging in. Use hardware wallets for long-term storage and avoid clicking on suspicious links. Keep your Binance account secure with regular security checks in your dashboard. Your crypto is only as safe as your habits. 🛡️
Secure your future—trade smart, stay protected. Visit Binance for more tips.
#Binance #CryptoSafety #BlockchainSecurity #CyberSecurity
#CryptoSecurity101 on Binance is all about protecting your assets. Always enable 2FA (Two-Factor Authentication), use strong, unique passwords, and never share your private keys. Be cautious of phishing emails and fake websites—double-check URLs before logging in. Use hardware wallets for long-term storage and avoid clicking on suspicious links. Keep your Binance account secure with regular security checks in your dashboard. Your crypto is only as safe as your habits. 🛡️ Secure your future—trade smart, stay protected. Visit Binance for more tips. #Binance #CryptoSafety #BlockchainSecurity #CyberSecurity
#CryptoSecurity101
on Binance is all about protecting your assets. Always enable 2FA (Two-Factor Authentication), use strong, unique passwords, and never share your private keys. Be cautious of phishing emails and fake websites—double-check URLs before logging in. Use hardware wallets for long-term storage and avoid clicking on suspicious links. Keep your Binance account secure with regular security checks in your dashboard. Your crypto is only as safe as your habits. 🛡️

Secure your future—trade smart, stay protected. Visit Binance for more tips.
#Binance #CryptoSafety #BlockchainSecurity #CyberSecurity
#CryptoSecurity101 on Binance is all about protecting your assets. Always enable 2FA (Two-Factor Authentication), use strong, unique passwords, and never share your private keys. Be cautious of phishing emails and fake websites—double-check URLs before logging in. Use hardware wallets for long-term storage and avoid clicking on suspicious links. Keep your Binance account secure with regular security checks in your dashboard. Your crypto is only as safe as your habits. 🛡️ Secure your future—trade smart, stay protected. Visit Binance for more tips. #Binance #CryptoSafety #BlockchainSecurity #CyberSecurity
#CryptoSecurity101 on Binance is all about protecting your assets. Always enable 2FA (Two-Factor Authentication), use strong, unique passwords, and never share your private keys. Be cautious of phishing emails and fake websites—double-check URLs before logging in. Use hardware wallets for long-term storage and avoid clicking on suspicious links. Keep your Binance account secure with regular security checks in your dashboard. Your crypto is only as safe as your habits. 🛡️

Secure your future—trade smart, stay protected. Visit Binance for more tips.
#Binance #CryptoSafety #BlockchainSecurity #CyberSecurity
U.S. Seizes $7.7M in Crypto from North Korean IT Workers Using Fake Identities$BTC The U.S. Department of Justice (DOJ) has seized approximately $7.7 million in cryptocurrency linked to a network of North Korean IT workers accused of infiltrating U.S. blockchain and crypto firms using fake identities. According to the DOJ, these individuals posed as remote IT freelancers to gain employment at American companies, concealing their true identities and affiliations.$XRP The scheme allegedly involved workers connected to North Korea’s state-run Lazarus Group, a notorious cybercrime organization under international sanctions. The workers used stolen or fictitious identities to get hired and funnel earnings back to the North Korean regime, helping fund weapons programs in violation of U.S. and U.N. sanctions.$BNB Federal prosecutors said the IT workers accessed internal systems of several companies, posing potential security risks, and were paid in cryptocurrency, which was laundered through complex transactions to obscure its origin. The DOJ collaborated with the FBI and international partners to trace and seize the funds. The case highlights ongoing efforts by North Korea to bypass sanctions through cyber operations and underscores the importance of vetting remote hires. U.S. authorities have issued fresh warnings to tech companies to remain vigilant against such infiltration tactics. #CyberSecurity #crypto
U.S. Seizes $7.7M in Crypto from North Korean IT Workers Using Fake Identities$BTC

The U.S. Department of Justice (DOJ) has seized approximately $7.7 million in cryptocurrency linked to a network of North Korean IT workers accused of infiltrating U.S. blockchain and crypto firms using fake identities. According to the DOJ, these individuals posed as remote IT freelancers to gain employment at American companies, concealing their true identities and affiliations.$XRP

The scheme allegedly involved workers connected to North Korea’s state-run Lazarus Group, a notorious cybercrime organization under international sanctions. The workers used stolen or fictitious identities to get hired and funnel earnings back to the North Korean regime, helping fund weapons programs in violation of U.S. and U.N. sanctions.$BNB

Federal prosecutors said the IT workers accessed internal systems of several companies, posing potential security risks, and were paid in cryptocurrency, which was laundered through complex transactions to obscure its origin. The DOJ collaborated with the FBI and international partners to trace and seize the funds.

The case highlights ongoing efforts by North Korea to bypass sanctions through cyber operations and underscores the importance of vetting remote hires. U.S. authorities have issued fresh warnings to tech companies to remain vigilant against such infiltration tactics.
#CyberSecurity #crypto
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number