Binance Square

cybercrime

655,933 visningar
69 diskuterar
Moon5labs
--
Microsoft Strikes Back: Over 2,300 Lumma Malware Websites Takedown in Global Cybercrime CrackdownIn a major blow against digital crime, Microsoft joined forces with international partners to dismantle a vast cybercriminal network that used over 2,300 malicious websites to spread the notorious Lumma Stealer malware. These sites were responsible for stealing login credentials, credit card data, and access to cryptocurrency wallets. The operation, led by Microsoft’s Digital Crimes Unit, was authorized by a federal court in Georgia to disable and seize critical components of Lumma’s infrastructure. Authorities also took control of Lumma’s command system and shut down its marketplace where the malware was being sold to other cybercriminals. 🔹 The international coalition included Cloudflare, BitSight, and Lumen, as well as Europol and Japanese law enforcement agencies, who worked together to shut down Lumma’s local server infrastructure. Lumma: The Silent Data Thief Lumma Stealer first emerged on underground forums in 2022 and quickly became a favorite tool among hackers for automated data theft. Between March and May 2025, Microsoft detected over 394,000 infected Windows machines. Criminals used it in phishing schemes—such as fake Booking.com pages—and attacks on gaming platforms, healthcare, logistics, and more. The malware spreads through malicious emails, browser extensions, and infected files, and once installed, immediately starts collecting and transmitting sensitive data. Crypto Crime in Numbers: Millions Vanished 🔹 In March, Lumma was used to target educational systems and online gaming communities. 🔹 Chinese printer company Procolored was recently accused of distributing crypto-stealing malware through its official drivers—leading to $953,000 in stolen assets. Crypto attacks are also becoming commercialized, with ready-to-use tools available via SaaS models for as little as $100, opening the doors to amateur hackers. According to the FBI, Americans lost over $9 billion to crypto scams in 2024 alone, with seniors over 60 being the most vulnerable. Chainalysis reported global losses of $51 billion, citing the rise of professional criminal rings, cartels, state-sponsored hacking, and AI-powered fraud. Microsoft Issues a Warning: The Threat Grows Microsoft warns that crypto theft and data breaches are accelerating, with hackers using increasingly sophisticated tactics—including artificial intelligence and decentralized swapping protocols like THORChain. But the operation also proves that collaboration between tech firms and global authorities can deliver real results. By dismantling Lumma, Microsoft sends a clear message to the cyber underworld: justice in the digital world is real—and it's swift. #CyberSecurity , #Malwareattack , #cybercrime , #CryptoSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Microsoft Strikes Back: Over 2,300 Lumma Malware Websites Takedown in Global Cybercrime Crackdown

In a major blow against digital crime, Microsoft joined forces with international partners to dismantle a vast cybercriminal network that used over 2,300 malicious websites to spread the notorious Lumma Stealer malware. These sites were responsible for stealing login credentials, credit card data, and access to cryptocurrency wallets.
The operation, led by Microsoft’s Digital Crimes Unit, was authorized by a federal court in Georgia to disable and seize critical components of Lumma’s infrastructure. Authorities also took control of Lumma’s command system and shut down its marketplace where the malware was being sold to other cybercriminals.
🔹 The international coalition included Cloudflare, BitSight, and Lumen, as well as Europol and Japanese law enforcement agencies, who worked together to shut down Lumma’s local server infrastructure.

Lumma: The Silent Data Thief
Lumma Stealer first emerged on underground forums in 2022 and quickly became a favorite tool among hackers for automated data theft. Between March and May 2025, Microsoft detected over 394,000 infected Windows machines. Criminals used it in phishing schemes—such as fake Booking.com pages—and attacks on gaming platforms, healthcare, logistics, and more.
The malware spreads through malicious emails, browser extensions, and infected files, and once installed, immediately starts collecting and transmitting sensitive data.

Crypto Crime in Numbers: Millions Vanished
🔹 In March, Lumma was used to target educational systems and online gaming communities.

🔹 Chinese printer company Procolored was recently accused of distributing crypto-stealing malware through its official drivers—leading to $953,000 in stolen assets.
Crypto attacks are also becoming commercialized, with ready-to-use tools available via SaaS models for as little as $100, opening the doors to amateur hackers.
According to the FBI, Americans lost over $9 billion to crypto scams in 2024 alone, with seniors over 60 being the most vulnerable. Chainalysis reported global losses of $51 billion, citing the rise of professional criminal rings, cartels, state-sponsored hacking, and AI-powered fraud.

Microsoft Issues a Warning: The Threat Grows
Microsoft warns that crypto theft and data breaches are accelerating, with hackers using increasingly sophisticated tactics—including artificial intelligence and decentralized swapping protocols like THORChain.
But the operation also proves that collaboration between tech firms and global authorities can deliver real results. By dismantling Lumma, Microsoft sends a clear message to the cyber underworld: justice in the digital world is real—and it's swift.

#CyberSecurity , #Malwareattack , #cybercrime , #CryptoSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Житель Нової Зеландії звинувачується в крадіжці $265 млн у криптовалютахПоліція Нової Зеландії затримала жителя Веллінгтона, якого підозрюють у причетності до міжнародної злочинної групи, що викрала криптовалюту на суму $265 млн (450 млн новозеландських доларів). Злочинна діяльність тривала з березня по серпень 2024 року, і за цей період група обдурила численних жертв, використовуючи складні схеми. Міністерство юстиції США висунуло обвинуваченому звинувачення у рекеті, змові з метою шахрайства через електронні засоби та відмиванні грошей. За даними слідства, злочинці відмивали кошти через криптовалютні біржі, а потім інвестували їх у предмети розкоші: люксові автомобілі, нерухомість, годинники та цінні папери. Цей випадок став ще одним прикладом зростаючої загрози кіберзлочинності у криптосфері, що викликає занепокоєння щодо безпеки цифрових активів. Розслідування триває, і список обвинувачень може розширитися. Ця подія підкреслює важливість посилення регулювання крипторинку та захисту інвесторів. Слідкуйте за оновленнями у світі криптовалют та підписуйтесь на #MiningUpdates , щоб бути в курсі останніх новин! #CryptoScam #NewZealand #cybercrime #Cryptocurrency #FBI #BlockchainSecurity #MiningUpdates

Житель Нової Зеландії звинувачується в крадіжці $265 млн у криптовалютах

Поліція Нової Зеландії затримала жителя Веллінгтона, якого підозрюють у причетності до міжнародної злочинної групи, що викрала криптовалюту на суму $265 млн (450 млн новозеландських доларів). Злочинна діяльність тривала з березня по серпень 2024 року, і за цей період група обдурила численних жертв, використовуючи складні схеми. Міністерство юстиції США висунуло обвинуваченому звинувачення у рекеті, змові з метою шахрайства через електронні засоби та відмиванні грошей.
За даними слідства, злочинці відмивали кошти через криптовалютні біржі, а потім інвестували їх у предмети розкоші: люксові автомобілі, нерухомість, годинники та цінні папери. Цей випадок став ще одним прикладом зростаючої загрози кіберзлочинності у криптосфері, що викликає занепокоєння щодо безпеки цифрових активів. Розслідування триває, і список обвинувачень може розширитися.
Ця подія підкреслює важливість посилення регулювання крипторинку та захисту інвесторів. Слідкуйте за оновленнями у світі криптовалют та підписуйтесь на #MiningUpdates , щоб бути в курсі останніх новин!
#CryptoScam #NewZealand #cybercrime #Cryptocurrency #FBI #BlockchainSecurity #MiningUpdates
🔒 VIOLENT 'WRENCH ATTACKS' TARGET CRYPTO EXECUTIVES WORLDWIDE 🔒 As cryptocurrency adoption expands, so too does a disturbing trend: violent "wrench attacks" targeting crypto executives. Named after the hypothetical scenario where someone is forced to hand over their crypto keys at wrench-point, these attacks are no longer confined to imagination—they're happening in real life. Unlike traditional cyber hacks, wrench attacks are physical assaults aimed at gaining access to digital wallets. Criminals bypass complex encryption by exploiting human vulnerability, threatening or torturing victims into revealing private keys or passwords. With cryptocurrencies being largely irreversible and anonymous once transferred, victims often have no recourse. In recent years, high-profile executives and early crypto investors have become targets. In the U.K., a tech entrepreneur was tied up and beaten in front of his family by masked intruders demanding access to his Bitcoin wallet. Similar incidents have been reported in the U.S., India, the Netherlands, and even Hong Kong, where attackers monitor social media and blockchain activity to identify wealthy crypto holders. The decentralization that makes crypto attractive also makes it risky. Without centralized security measures or account recovery options, personal safety becomes the final line of defense. This has pushed many executives to invest in advanced home security, digital vaults, and operational security (OpSec) protocols. Experts advise storing only small amounts of crypto in easily accessible wallets and keeping the majority in cold storage—offline wallets protected by multiple layers of security. In addition, executives are encouraged to limit public sharing of their crypto involvement and adopt a low-profile lifestyle. #CryptoSecurity #WrenchAttack #CyberCrime #CryptoNews #BitcoinSecurity
🔒 VIOLENT 'WRENCH ATTACKS' TARGET CRYPTO EXECUTIVES WORLDWIDE 🔒

As cryptocurrency adoption expands, so too does a disturbing trend: violent "wrench attacks" targeting crypto executives. Named after the hypothetical scenario where someone is forced to hand over their crypto keys at wrench-point, these attacks are no longer confined to imagination—they're happening in real life.

Unlike traditional cyber hacks, wrench attacks are physical assaults aimed at gaining access to digital wallets. Criminals bypass complex encryption by exploiting human vulnerability, threatening or torturing victims into revealing private keys or passwords. With cryptocurrencies being largely irreversible and anonymous once transferred, victims often have no recourse.

In recent years, high-profile executives and early crypto investors have become targets. In the U.K., a tech entrepreneur was tied up and beaten in front of his family by masked intruders demanding access to his Bitcoin wallet. Similar incidents have been reported in the U.S., India, the Netherlands, and even Hong Kong, where attackers monitor social media and blockchain activity to identify wealthy crypto holders.

The decentralization that makes crypto attractive also makes it risky. Without centralized security measures or account recovery options, personal safety becomes the final line of defense. This has pushed many executives to invest in advanced home security, digital vaults, and operational security (OpSec) protocols.

Experts advise storing only small amounts of crypto in easily accessible wallets and keeping the majority in cold storage—offline wallets protected by multiple layers of security. In addition, executives are encouraged to limit public sharing of their crypto involvement and adopt a low-profile lifestyle.

#CryptoSecurity
#WrenchAttack
#CyberCrime
#CryptoNews
#BitcoinSecurity
Hong Kong Fraud Group Using Deepfakes Exposed – Pretended to Be Wealthy Single WomenSeized Notebooks Revealed Sophisticated Scams Hong Kong police uncovered a sophisticated fraud scheme that used artificial intelligence to deceive victims. The investigation led to the seizure of over HK$34 million (approximately USD 3.37 million). Notebooks confiscated by law enforcement revealed the criminals' methods, including the use of deepfake technology to appear more convincing. How the Fraudsters Lured Their Victims The fraudsters pretended to be wealthy single women, crafting stories about interests such as learning Japanese, playing golf, or tasting luxury wines worth over HK$100,000 (USD 12,850) per bottle. These methods were documented in the notebooks seized during the operation. The investigation resulted in the arrest of 31 individuals connected to a criminal syndicate. This group used artificial intelligence to create realistic images of attractive women, which were then used to lure victims into romantic and investment scams. The Problem of Deepfake Scams Byron Boston, a former police officer and CEO of Crypto Track, warned that the combination of deepfake technology and social engineering presents significant challenges for investigators and law enforcement. AI-generated images make criminals more convincing and enable them to execute more complex scams. Boston highlighted an incident from November 2022, where a fake video impersonating FTX founder Sam Bankman-Fried was used in a phishing attack targeting FTX users. This incident demonstrates how deepfake technologies can be exploited to steal cryptocurrency assets from victims. Scams Targeting Young People Confiscated materials revealed that the fraudsters specifically targeted young people seeking quick earnings. Victims were often convinced they were communicating with ideal women from Taiwan, Singapore, and Malaysia. Challenges in Combating These Crimes Boston emphasized that effective collaboration and swift action are key to fighting these sophisticated scams. However, he noted that many local law enforcement agencies, particularly in the U.S., lack the necessary tools and expertise to track stolen cryptocurrency or cooperate with international exchanges. Criminals leveraging technologies like deepfake and social engineering remain a significant challenge for security forces worldwide. #Deepfake , #CryptoFraud , #CryptoScams , #cybercrime , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Hong Kong Fraud Group Using Deepfakes Exposed – Pretended to Be Wealthy Single Women

Seized Notebooks Revealed Sophisticated Scams
Hong Kong police uncovered a sophisticated fraud scheme that used artificial intelligence to deceive victims. The investigation led to the seizure of over HK$34 million (approximately USD 3.37 million). Notebooks confiscated by law enforcement revealed the criminals' methods, including the use of deepfake technology to appear more convincing.
How the Fraudsters Lured Their Victims
The fraudsters pretended to be wealthy single women, crafting stories about interests such as learning Japanese, playing golf, or tasting luxury wines worth over HK$100,000 (USD 12,850) per bottle. These methods were documented in the notebooks seized during the operation.
The investigation resulted in the arrest of 31 individuals connected to a criminal syndicate. This group used artificial intelligence to create realistic images of attractive women, which were then used to lure victims into romantic and investment scams.
The Problem of Deepfake Scams
Byron Boston, a former police officer and CEO of Crypto Track, warned that the combination of deepfake technology and social engineering presents significant challenges for investigators and law enforcement. AI-generated images make criminals more convincing and enable them to execute more complex scams.
Boston highlighted an incident from November 2022, where a fake video impersonating FTX founder Sam Bankman-Fried was used in a phishing attack targeting FTX users. This incident demonstrates how deepfake technologies can be exploited to steal cryptocurrency assets from victims.
Scams Targeting Young People
Confiscated materials revealed that the fraudsters specifically targeted young people seeking quick earnings. Victims were often convinced they were communicating with ideal women from Taiwan, Singapore, and Malaysia.
Challenges in Combating These Crimes
Boston emphasized that effective collaboration and swift action are key to fighting these sophisticated scams. However, he noted that many local law enforcement agencies, particularly in the U.S., lack the necessary tools and expertise to track stolen cryptocurrency or cooperate with international exchanges.
Criminals leveraging technologies like deepfake and social engineering remain a significant challenge for security forces worldwide.

#Deepfake , #CryptoFraud , #CryptoScams , #cybercrime , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Six Men Kidnap Chicago Family, Forcing a $15 Million Crypto RansomArmed Kidnapping Leads to Crypto Ransom Demand A shocking kidnapping took place in Chicago, where six men forcibly abducted a three-member family and their nanny, demanding a $15 million cryptocurrency ransom. According to a February 12 report by the Chicago Tribune, citing an unsealed FBI affidavit, the kidnappers knocked on the family’s door under the pretense that they had accidentally damaged their garage door. Once inside, they forced their way in at gunpoint. The abductors then forced the family into a van, taking them first to a rented Airbnb about an hour away and later transferring them to another house. Five Days in Captivity and a Cryptocurrency Ransom The kidnappers demanded a ransom in Bitcoin, Ethereum, and other cryptocurrencies, threatening to kill the victims if their demands were not met. 📌 The victims were held captive for five days. 📌 One of the abductees managed to contact his father via the WeChat app, informing him about the kidnapping. 📌 On November 1, the family was released and sought help at a nearby dry cleaner before taking an Uber to a hospital. While it was reported that $15 million in cryptocurrency was transferred, U.S. authorities have only been able to recover $6 million so far. Six Suspects Indicted for the Kidnapping On December 13, six men were officially charged in connection with the abduction. The only suspect arrested so far is 34-year-old Zehuan Wei, who was detained on January 17 while attempting to re-enter the U.S. from Mexico. 🔹 Other suspects: Fan Zhang, Huajing Yan, Shengnan Jiang, Shiqiang Lian, and Ye Cao. 🔹 Some of them are believed to have fled to China after Wei’s arrest. Key Evidence Collected by U.S. Authorities Investigators gathered crucial evidence, including: ✅ Airbnb records where the victims were held. ✅ Analysis of cryptocurrency wallets to trace the ransom transactions. ✅ Search of a white Ford van used by the kidnappers. 🔹 DNA samples were taken from a white Chrysler Pacifica, rented by Wei on October 29. 🔹 Authorities matched surveillance footage with a photo of Ye Cao, captured by U.S. Customs and Border Protection. 🔹 Driver’s licenses of other suspects were analyzed for identity verification. 📌 At least two victims were able to identify some of the alleged kidnappers from photographs. The investigation is ongoing, with U.S. authorities working to track down the remaining suspects and recover the stolen cryptocurrency. #CryptoNewss , #CryptoSecurity , #cybercrime , #CryptoSecurity , #CryptoScamAlert Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Six Men Kidnap Chicago Family, Forcing a $15 Million Crypto Ransom

Armed Kidnapping Leads to Crypto Ransom Demand
A shocking kidnapping took place in Chicago, where six men forcibly abducted a three-member family and their nanny, demanding a $15 million cryptocurrency ransom.
According to a February 12 report by the Chicago Tribune, citing an unsealed FBI affidavit, the kidnappers knocked on the family’s door under the pretense that they had accidentally damaged their garage door. Once inside, they forced their way in at gunpoint.
The abductors then forced the family into a van, taking them first to a rented Airbnb about an hour away and later transferring them to another house.
Five Days in Captivity and a Cryptocurrency Ransom
The kidnappers demanded a ransom in Bitcoin, Ethereum, and other cryptocurrencies, threatening to kill the victims if their demands were not met.
📌 The victims were held captive for five days.
📌 One of the abductees managed to contact his father via the WeChat app, informing him about the kidnapping.
📌 On November 1, the family was released and sought help at a nearby dry cleaner before taking an Uber to a hospital.
While it was reported that $15 million in cryptocurrency was transferred, U.S. authorities have only been able to recover $6 million so far.
Six Suspects Indicted for the Kidnapping
On December 13, six men were officially charged in connection with the abduction.
The only suspect arrested so far is 34-year-old Zehuan Wei, who was detained on January 17 while attempting to re-enter the U.S. from Mexico.
🔹 Other suspects: Fan Zhang, Huajing Yan, Shengnan Jiang, Shiqiang Lian, and Ye Cao.
🔹 Some of them are believed to have fled to China after Wei’s arrest.

Key Evidence Collected by U.S. Authorities
Investigators gathered crucial evidence, including:
✅ Airbnb records where the victims were held.
✅ Analysis of cryptocurrency wallets to trace the ransom transactions.
✅ Search of a white Ford van used by the kidnappers.
🔹 DNA samples were taken from a white Chrysler Pacifica, rented by Wei on October 29.
🔹 Authorities matched surveillance footage with a photo of Ye Cao, captured by U.S. Customs and Border Protection.
🔹 Driver’s licenses of other suspects were analyzed for identity verification.
📌 At least two victims were able to identify some of the alleged kidnappers from photographs.
The investigation is ongoing, with U.S. authorities working to track down the remaining suspects and recover the stolen cryptocurrency.

#CryptoNewss , #CryptoSecurity , #cybercrime , #CryptoSecurity , #CryptoScamAlert

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨Crypto Losses to #hacks Exceed $313M in August 🚨 Cryptocurrency hackers stole $313.86 million in digital assets across more than 10 #cyberattacks in August, raising significant doubts about the broader acceptance of the asset class. The alarming figure highlights a growing trend of sophisticated #cybercrime targeting the crypto industry. This wave of thefts has prompted renewed calls for stricter regulation and better security measures within the sector. The recent hacks add pressure on #exchanges and custodians to bolster their defenses and protect user assets. 🌐Source: #Cointelegraph Follow me to keep yourself updated ❗❕❗
🚨Crypto Losses to #hacks Exceed $313M in August 🚨

Cryptocurrency hackers stole $313.86 million in digital assets across more than 10 #cyberattacks in August, raising significant doubts about the broader acceptance of the asset class.

The alarming figure highlights a growing trend of sophisticated #cybercrime targeting the crypto industry.

This wave of thefts has prompted renewed calls for stricter regulation and better security measures within the sector.

The recent hacks add pressure on #exchanges and custodians to bolster their defenses and protect user assets.

🌐Source: #Cointelegraph

Follow me to keep yourself updated ❗❕❗
💥 Великобритания ударила по российским сетям отмывания денег! 💥 Национальное агентство по борьбе с преступностью (NCA) провело масштабную операцию и ликвидировало сразу две крупные сети отмывания денег — Smart и TGR. 💸 Эти организации, скрывающиеся за сложными криптовалютными схемами, занимались финансированием таких преступлений, как: 🚨 Наркоторговля 💻 Кибератаки с использованием вымогательского ПО 🕵️‍♂️ Шпионаж в интересах России Результат? 👇 📌 Арестовано 84 человека 📌 Изъято более £20 млн в наличных и криптовалюте И вот кто стал в центре внимания — Екатерина Жданова, предполагаемый лидер сети Smart. Она мастерски использовала криптовалюты для обхода санкций и отмывания денег элит и киберпреступников. 😮 Эта операция стала настоящим ударом по преступным группам, которые думали, что блокчейн поможет им остаться незамеченными. Но, как видим, даже сложные криптосхемы могут быть раскрыты! 🌐 Криптовалюта может быть инструментом свободы, но она точно не для нарушителей закона! 💪 #CryptoCrime #Blockchain #NCA #AntiMoneyLaundering #CyberCrime
💥 Великобритания ударила по российским сетям отмывания денег! 💥

Национальное агентство по борьбе с преступностью (NCA) провело масштабную операцию и ликвидировало сразу две крупные сети отмывания денег — Smart и TGR. 💸 Эти организации, скрывающиеся за сложными криптовалютными схемами, занимались финансированием таких преступлений, как:

🚨 Наркоторговля

💻 Кибератаки с использованием вымогательского ПО

🕵️‍♂️ Шпионаж в интересах России

Результат? 👇
📌 Арестовано 84 человека
📌 Изъято более £20 млн в наличных и криптовалюте

И вот кто стал в центре внимания — Екатерина Жданова, предполагаемый лидер сети Smart. Она мастерски использовала криптовалюты для обхода санкций и отмывания денег элит и киберпреступников. 😮

Эта операция стала настоящим ударом по преступным группам, которые думали, что блокчейн поможет им остаться незамеченными. Но, как видим, даже сложные криптосхемы могут быть раскрыты! 🌐

Криптовалюта может быть инструментом свободы, но она точно не для нарушителей закона! 💪

#CryptoCrime #Blockchain #NCA #AntiMoneyLaundering #CyberCrime
🤑𝙂𝙀𝙏 𝙁𝙍𝙀𝙀 𝙍𝙀𝙒𝘼𝙍𝘿 𝙐𝙋𝙏𝙊 8$ 𝙐𝙎𝘿𝙏 𝘼𝙉𝘿 𝙋𝙀𝙋𝙀 𝘾𝙊𝙄𝙉𝙎 𝙁𝙍𝙊𝙈 𝙈𝙔 𝙏𝙒𝙊 📌 𝙋𝙄𝙉𝙉𝙀𝘿 𝙋𝙊𝙎𝙏𝙎💰🤑💸 Guys, P2P is extremely risky. I’ve been telling folks to avoid using any kind of P2P platforms, it’s an open invitation to trouble. I know so many people in India got notice from various govt authorities just because they unknowingly sent INR or received INR from someone who wasn’t the right person to deal with. And in P2P, as innocent customer you have no clue about it. Not even touching the topic of TDS non-compliance bit here! So stay safe guys! WARNING: Binance P2P can be extremely risky! I sold $560 USDT to a fraudulent seller and now my bank account has been frozen due to suspected money cheating. Cyber crime is involved, demanding the money be returned to the victim or for me to connect with them. The scammer was apparently giving out the cheating money he obtained from his call center scam to other Binance P2P users in exchange for USDT. This is a stark reminder to always be vigilant and cautious when conducting P2P transactions. Please be careful when conducting P2P transactions and only trade with reputable users. Let's work together to keep the Binance community safe and free from scams. #cybercrime  #BinanceP2P  #ScamRiskWarning @Binance Risk Sniper
🤑𝙂𝙀𝙏 𝙁𝙍𝙀𝙀 𝙍𝙀𝙒𝘼𝙍𝘿 𝙐𝙋𝙏𝙊 8$ 𝙐𝙎𝘿𝙏 𝘼𝙉𝘿 𝙋𝙀𝙋𝙀 𝘾𝙊𝙄𝙉𝙎 𝙁𝙍𝙊𝙈 𝙈𝙔 𝙏𝙒𝙊 📌 𝙋𝙄𝙉𝙉𝙀𝘿 𝙋𝙊𝙎𝙏𝙎💰🤑💸

Guys, P2P is extremely risky. I’ve been telling folks to avoid using any kind of P2P platforms, it’s an open invitation to trouble.

I know so many people in India got notice from various govt authorities just because they unknowingly sent INR or received INR from someone who wasn’t the right person to deal with. And in P2P, as innocent customer you have no clue about it.

Not even touching the topic of TDS non-compliance bit here! So stay safe guys!

WARNING: Binance P2P can be extremely risky! I sold $560 USDT to a fraudulent seller and now my bank account has been frozen due to suspected money cheating. Cyber crime is involved, demanding the money be returned to the victim or for me to connect with them.

The scammer was apparently giving out the cheating money he obtained from his call center scam to other Binance P2P users in exchange for USDT. This is a stark reminder to always be vigilant and cautious when conducting P2P transactions.

Please be careful when conducting P2P transactions and only trade with reputable users. Let's work together to keep the Binance community safe and free from scams. #cybercrime  #BinanceP2P  #ScamRiskWarning

@Binance Risk Sniper
Guys, P2P is extremely risky. I’ve been telling folks to avoid using any kind of P2P platforms, it’s an open invitation to trouble. I know so many people in India got notice from various govt authorities just because they unknowingly sent INR or received INR from someone who wasn’t the right person to deal with. And in P2P, as innocent customer you have no clue about it. Not even touching the topic of TDS non-compliance bit here! So stay safe guys! WARNING: Binance P2P can be extremely risky! I sold $560 USDT to a fraudulent seller and now my bank account has been frozen due to suspected money cheating. Cyber crime is involved, demanding the money be returned to the victim or for me to connect with them. The scammer was apparently giving out the cheating money he obtained from his call center scam to other Binance P2P users in exchange for USDT. This is a stark reminder to always be vigilant and cautious when conducting P2P transactions. Please be careful when conducting P2P transactions and only trade with reputable users. Let's work together to keep the Binance community safe and free from scams. #cybercrime  #BinanceP2P  #ScamRiskWarning @Binance Risk Sniper
Guys, P2P is extremely risky. I’ve been telling folks to avoid using any kind of P2P platforms, it’s an open invitation to trouble.

I know so many people in India got notice from various govt authorities just because they unknowingly sent INR or received INR from someone who wasn’t the right person to deal with. And in P2P, as innocent customer you have no clue about it.

Not even touching the topic of TDS non-compliance bit here! So stay safe guys!

WARNING: Binance P2P can be extremely risky! I sold $560 USDT to a fraudulent seller and now my bank account has been frozen due to suspected money cheating. Cyber crime is involved, demanding the money be returned to the victim or for me to connect with them.

The scammer was apparently giving out the cheating money he obtained from his call center scam to other Binance P2P users in exchange for USDT. This is a stark reminder to always be vigilant and cautious when conducting P2P transactions.

Please be careful when conducting P2P transactions and only trade with reputable users. Let's work together to keep the Binance community safe and free from scams. #cybercrime  #BinanceP2P  #ScamRiskWarning

@Binance Risk Sniper
Russian Citizen Assaulted and Robbed in Thailand Over Cryptocurrency DisputeIncident in Phuket: Crypto Debt Leads to Violent Robbery Thai police have launched an investigation into two Russian nationals accused of assaulting and robbing their compatriot over a cryptocurrency debt. The incident occurred at a hotel in Karon, Phuket. According to the local newspaper Khaosod, a 31-year-old man was attacked over a $120,000 debt linked to previous cryptocurrency transactions in Russia. The attackers, who were known to the victim, forced him to attempt unlocking his crypto wallet. When he refused, violence ensued. Assault and Suspects’ Escape One of the suspects, identified as Andrei, allegedly threatened to kill the victim if the debt was not paid. The victim was repeatedly punched, kicked, and eventually lost consciousness after being struck on the head. The attackers then stole $20,000 in cash and fled, leaving the victim tied up in the bathroom. Investigators revealed that one suspect remained in Thailand, while the other, Dmitri, fled to Dubai. Arrest warrants have been issued, and Thai authorities are collaborating with immigration and police agencies to apprehend the suspects. Cryptocurrencies as Targets of Violent Crime Rising Value of Cryptocurrencies Attracts Criminals The Phuket incident is part of a growing trend where cryptocurrencies play a role in severe criminal activities. The year 2024 saw numerous violent incidents linked to digital assets, ranging from kidnappings to extortion. In July, a 29-year-old tourist in Kyiv was kidnapped and murdered as criminals attempted to seize his 3 bitcoins. Authorities described the event as a calculated plan that ended with the victim's death after the forced transfer of cryptocurrency failed. Case in Costa Rica: Armed Robbery of Bitcoins A similar case occurred in August on a beach in Costa Rica, where 11 Israeli tourists were robbed of a significant amount of bitcoins. The attackers, disguised as police officers, used firearms during the assault, raising concerns about the involvement of organized crime groups with police training. Cryptocurrencies: Valuable Targets That Attract Danger As cryptocurrencies grow in popularity, incidents of violence and crime associated with these digital assets are on the rise. This trend underscores the need for enhanced security measures and better protection for investors on a global scale. #CryptoCrime , #Bitcoin❗ , #CryptoSafety , #cybercrime , #CryptoScamAlert Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Russian Citizen Assaulted and Robbed in Thailand Over Cryptocurrency Dispute

Incident in Phuket: Crypto Debt Leads to Violent Robbery
Thai police have launched an investigation into two Russian nationals accused of assaulting and robbing their compatriot over a cryptocurrency debt. The incident occurred at a hotel in Karon, Phuket.
According to the local newspaper Khaosod, a 31-year-old man was attacked over a $120,000 debt linked to previous cryptocurrency transactions in Russia. The attackers, who were known to the victim, forced him to attempt unlocking his crypto wallet. When he refused, violence ensued.
Assault and Suspects’ Escape
One of the suspects, identified as Andrei, allegedly threatened to kill the victim if the debt was not paid. The victim was repeatedly punched, kicked, and eventually lost consciousness after being struck on the head. The attackers then stole $20,000 in cash and fled, leaving the victim tied up in the bathroom.
Investigators revealed that one suspect remained in Thailand, while the other, Dmitri, fled to Dubai. Arrest warrants have been issued, and Thai authorities are collaborating with immigration and police agencies to apprehend the suspects.
Cryptocurrencies as Targets of Violent Crime
Rising Value of Cryptocurrencies Attracts Criminals
The Phuket incident is part of a growing trend where cryptocurrencies play a role in severe criminal activities. The year 2024 saw numerous violent incidents linked to digital assets, ranging from kidnappings to extortion.
In July, a 29-year-old tourist in Kyiv was kidnapped and murdered as criminals attempted to seize his 3 bitcoins. Authorities described the event as a calculated plan that ended with the victim's death after the forced transfer of cryptocurrency failed.
Case in Costa Rica: Armed Robbery of Bitcoins
A similar case occurred in August on a beach in Costa Rica, where 11 Israeli tourists were robbed of a significant amount of bitcoins. The attackers, disguised as police officers, used firearms during the assault, raising concerns about the involvement of organized crime groups with police training.
Cryptocurrencies: Valuable Targets That Attract Danger
As cryptocurrencies grow in popularity, incidents of violence and crime associated with these digital assets are on the rise. This trend underscores the need for enhanced security measures and better protection for investors on a global scale.

#CryptoCrime , #Bitcoin❗ , #CryptoSafety , #cybercrime , #CryptoScamAlert

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Over 100,000 Gemini Records Allegedly for Sale on Dark Web – Concerns Rise After Binance WarningMore than 100,000 user records allegedly linked to cryptocurrency exchange Gemini have surfaced for sale on the dark web, sparking renewed concerns about data security in the crypto space. According to a March 27 report from The Dark Web Informer, a threat actor using the alias “AKM69” claimed to possess a large trove of Gemini user data, including full names, emails, phone numbers, and location data. Most entries are said to originate from the United States, with others allegedly tied to users in the UK and Singapore. While Gemini has not officially commented on the matter, it's currently unclear whether the data originated directly from its internal systems or via third-party vulnerabilities, such as phishing attacks or compromised user devices. Not an Isolated Case: Binance Data Leak Claims Resurface The Gemini incident comes just one day after a similar threat emerged involving Binance. A user going by “kiki88888” reportedly offered over 132,000 lines of Binance user data—including emails and passwords—for sale. The Dark Web Informer speculated that the Binance data might have originated from compromised endpoints, rather than Binance itself. Users were cautioned to avoid suspicious links and emails, highlighting the ongoing risk of phishing attacks. Notably, Binance has previously denied such claims, stating that its internal investigation found no breach in its core systems. In a past 2023 incident, an anonymous user “FireBear” had claimed access to 12.8 million user records, including names, email addresses, and home addresses. Binance responded by reaffirming that its security systems were uncompromised. Crypto Data Breaches: A Broader Industry Problem These incidents reflect a wider trend of data exposure across the crypto industry: In November 2023, Nigerian crypto exchange Bitnob reportedly exposed over 250,000 KYC documents due to misconfigured Amazon Web Services (AWS) storage.In December 2023, a breach affected over 58,000 customers of Byte Federal, a U.S.-based Bitcoin ATM operator.In January 2024, cybersecurity firm SlowMist warned that over 7 million email addresses from a 2022 OpenSea data leak had been fully exposed—leaving users vulnerable to phishing scams. Despite these incidents, it’s important to note that many platforms, including Binance, emphasize that their internal infrastructure remains secure and that most recent threats likely stem from individual user security lapses. As always, users are encouraged to practice safe online behavior, enable two-factor authentication, and avoid clicking on suspicious links or sharing credentials. #CryptoScamAlert , #CyberSecurity , #darkweb , #cybercrime , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Over 100,000 Gemini Records Allegedly for Sale on Dark Web – Concerns Rise After Binance Warning

More than 100,000 user records allegedly linked to cryptocurrency exchange Gemini have surfaced for sale on the dark web, sparking renewed concerns about data security in the crypto space.
According to a March 27 report from The Dark Web Informer, a threat actor using the alias “AKM69” claimed to possess a large trove of Gemini user data, including full names, emails, phone numbers, and location data. Most entries are said to originate from the United States, with others allegedly tied to users in the UK and Singapore.
While Gemini has not officially commented on the matter, it's currently unclear whether the data originated directly from its internal systems or via third-party vulnerabilities, such as phishing attacks or compromised user devices.
Not an Isolated Case: Binance Data Leak Claims Resurface
The Gemini incident comes just one day after a similar threat emerged involving Binance. A user going by “kiki88888” reportedly offered over 132,000 lines of Binance user data—including emails and passwords—for sale.
The Dark Web Informer speculated that the Binance data might have originated from compromised endpoints, rather than Binance itself. Users were cautioned to avoid suspicious links and emails, highlighting the ongoing risk of phishing attacks.
Notably, Binance has previously denied such claims, stating that its internal investigation found no breach in its core systems. In a past 2023 incident, an anonymous user “FireBear” had claimed access to 12.8 million user records, including names, email addresses, and home addresses. Binance responded by reaffirming that its security systems were uncompromised.
Crypto Data Breaches: A Broader Industry Problem
These incidents reflect a wider trend of data exposure across the crypto industry:
In November 2023, Nigerian crypto exchange Bitnob reportedly exposed over 250,000 KYC documents due to misconfigured Amazon Web Services (AWS) storage.In December 2023, a breach affected over 58,000 customers of Byte Federal, a U.S.-based Bitcoin ATM operator.In January 2024, cybersecurity firm SlowMist warned that over 7 million email addresses from a 2022 OpenSea data leak had been fully exposed—leaving users vulnerable to phishing scams.

Despite these incidents, it’s important to note that many platforms, including Binance, emphasize that their internal infrastructure remains secure and that most recent threats likely stem from individual user security lapses.
As always, users are encouraged to practice safe online behavior, enable two-factor authentication, and avoid clicking on suspicious links or sharing credentials.

#CryptoScamAlert , #CyberSecurity , #darkweb , #cybercrime , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Ransomware Payouts Drop 35% as Victims Resist DemandsRansomware Attacks Surge, but Payouts Decline Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands. According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified. Declining Payouts Despite Increasing Attacks 🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023. 🔹 The first half of the year saw a 2.3% increase in successful extortion attempts. 🔹 The Dark Angels Group alone collected $75 million. 🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations. Law Enforcement Crackdowns Disrupt Cybercrime Operations 🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks. 🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering. According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat. Ransomware Victims Increasingly Refuse to Pay 🔹 Less than 50% of ransomware attacks resulted in payouts. 🔹 Those who did comply paid up to $250,000 in ransom on average. 🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks. Cybercriminals Adapt to Heightened Security Measures 🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying. 🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code. 🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration. Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake. While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨 #CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Ransomware Payouts Drop 35% as Victims Resist Demands

Ransomware Attacks Surge, but Payouts Decline
Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands.
According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified.
Declining Payouts Despite Increasing Attacks
🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023.
🔹 The first half of the year saw a 2.3% increase in successful extortion attempts.
🔹 The Dark Angels Group alone collected $75 million.
🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations.
Law Enforcement Crackdowns Disrupt Cybercrime Operations
🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks.
🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering.
According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat.

Ransomware Victims Increasingly Refuse to Pay
🔹 Less than 50% of ransomware attacks resulted in payouts.
🔹 Those who did comply paid up to $250,000 in ransom on average.
🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks.
Cybercriminals Adapt to Heightened Security Measures
🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying.
🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code.
🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration.
Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake.
While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨

#CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
⚡️ INSIGHT: A group of young cybercriminals stole $243 million worth of #Bitcoin — but what began as a high-stakes heist quickly spiraled into a harrowing kidnapping plot. From digital theft to real-world danger, this story reveals the dark side of crypto crime. #crypto #bitcoin #cybercrime
⚡️ INSIGHT: A group of young cybercriminals stole $243 million worth of #Bitcoin — but what began as a high-stakes heist quickly spiraled into a harrowing kidnapping plot.

From digital theft to real-world danger, this story reveals the dark side of crypto crime.

#crypto #bitcoin #cybercrime
An Indian citizen, Chirag Tomar, admitted guilt in a U.S. court for orchestrating a $9.5 million crypto heist by creating a fake Coinbase website. 😱💰 Tomar, 30, was apprehended at Atlanta airport in December 2023, facing charges of wire fraud and money laundering with a potential 20-year sentence. 🛑⛓️ Initially flagged by Seamus Hughes of CourtWatch, Tomar tricked users into giving up their Coinbase login info through a spoofed Coinbase Pro site, defrauding over 542 victims from June 2021 to late 2023. 🕵️‍♂️💻 Court documents revealed Tomar's sloppy trail, including using his real name in emails, maintaining victim spreadsheets, and searching for scam methods. 📝💼 Despite impending sentencing, Tomar flaunted his stolen wealth, indulging in luxury watches, cars, and global travel. 🌎✈️ Stay alert in the digital realm—your security is paramount. 🔒💡 -Professor Mende signing off! #cybercrime #CryptoHeist #digitalsecurity #coinbase?
An Indian citizen, Chirag Tomar, admitted guilt in a U.S. court for orchestrating a $9.5 million crypto heist by creating a fake Coinbase website. 😱💰 Tomar, 30, was apprehended at Atlanta airport in December 2023, facing charges of wire fraud and money laundering with a potential 20-year sentence. 🛑⛓️ Initially flagged by Seamus Hughes of CourtWatch, Tomar tricked users into giving up their Coinbase login info through a spoofed Coinbase Pro site, defrauding over 542 victims from June 2021 to late 2023. 🕵️‍♂️💻 Court documents revealed Tomar's sloppy trail, including using his real name in emails, maintaining victim spreadsheets, and searching for scam methods. 📝💼 Despite impending sentencing, Tomar flaunted his stolen wealth, indulging in luxury watches, cars, and global travel. 🌎✈️ Stay alert in the digital realm—your security is paramount. 🔒💡 -Professor Mende signing off!
#cybercrime #CryptoHeist #digitalsecurity #coinbase?
Singaporean Woman Sentenced to Nearly 10 Years for Stealing $4.2 Million from BybitFormer Payroll Manager Misused Company Funds Ho Kai Xin, a former outsourcing payroll manager, has been sentenced to nine years and 11 months in prison for embezzling $4.2 million from cryptocurrency exchange Bybit. According to Strait Times, the 32-year-old woman pleaded guilty to five counts of fraud, eight counts of benefiting from criminal proceeds, and one count of providing false information to a public officer. During her trial, 30 additional charges were considered before the final verdict. The court found that Ho used the stolen funds to finance a luxurious lifestyle. Between June 2022, she illegally withdrew SGD 5.7 million ($4.2 million) from Bybit Fintech. 📉 The embezzlement was carried out by manipulating Microsoft Excel spreadsheets while processing payroll for over 900 Bybit employees between October 2021 and October 2022. Ho Kai Xin Previously Jailed for Violating Court Order In addition to her primary sentence, Ho had already been sentenced to six weeks in prison for ignoring a court order and continuing to spend stolen funds. 🔹 Despite a civil court ruling that prohibited her from using the funds, she spent SGD 840,000 ($627,633) on luxury goods and a penthouse. 🔹 Her longer prison term will begin only after she completes these six weeks. How Ho Stole $4.2 Million from Bybit According to Deputy Public Prosecutor Jeremy Bin, Ho used the stolen funds to buy luxury items, including sunglasses, handbags, shoes, shirts, and jewelry from Louis Vuitton. She also placed a down payment of SGD 750,000 ($560,388) on a penthouse worth over SGD 3.7 million ($2.7 million). 📉 Her first theft occurred in May 2022, when she stole SGD 117,000 ($87,417) from Wechain, a company handling payroll processing for Bybit employees. Ho manipulated Excel spreadsheets to redirect funds from company accounts to her personal bank accounts. 🗣 "When she realized her fraud went undetected, she became emboldened and escalated her scheme to siphon funds from Bybit," prosecutor Bin stated. A Sophisticated Scheme of Theft and Money Laundering Ho operated six bank accounts and four cryptocurrency wallets on different platforms. 🔹 She altered payment records in Excel to ensure that payroll payments were sent to her crypto wallets instead of Bybit employees' wallets. 🔹 Between May and August 2022, Bybit processed eight crypto transfers totaling over 4.2 million USDT to her wallets. 🔹 She then converted the stolen crypto funds into fiat currency and used complex transfers to launder the money. 📉 Her crimes were exposed in September 2022, when Wechain’s CFO noticed unusually large crypto transactions. 🛑 An internal investigation uncovered discrepancies, leading Wechain to report Ho to the police in February 2023. She was arrested two months later. The Consequences and Long Road to Conviction Ho Kai Xin managed to conceal her fraudulent activities for several months, but her extravagant spending and suspicious transactions eventually raised red flags. ⚖ In April 2023, she was formally charged, and after more than a year of legal proceedings, she has now been sentenced to nearly 10 years in prison. 🔹 Bybit is currently working to recover the stolen funds, but a portion remains untraceable due to money laundering techniques. 🔹 This case serves as a stark warning for crypto companies about the security risks involved in internal fund management. #CryptoScamAlert , #CryptoFraud , #Singapore , #blockchain , #cybercrime Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Singaporean Woman Sentenced to Nearly 10 Years for Stealing $4.2 Million from Bybit

Former Payroll Manager Misused Company Funds
Ho Kai Xin, a former outsourcing payroll manager, has been sentenced to nine years and 11 months in prison for embezzling $4.2 million from cryptocurrency exchange Bybit.
According to Strait Times, the 32-year-old woman pleaded guilty to five counts of fraud, eight counts of benefiting from criminal proceeds, and one count of providing false information to a public officer. During her trial, 30 additional charges were considered before the final verdict.
The court found that Ho used the stolen funds to finance a luxurious lifestyle. Between June 2022, she illegally withdrew SGD 5.7 million ($4.2 million) from Bybit Fintech.
📉 The embezzlement was carried out by manipulating Microsoft Excel spreadsheets while processing payroll for over 900 Bybit employees between October 2021 and October 2022.
Ho Kai Xin Previously Jailed for Violating Court Order
In addition to her primary sentence, Ho had already been sentenced to six weeks in prison for ignoring a court order and continuing to spend stolen funds.
🔹 Despite a civil court ruling that prohibited her from using the funds, she spent SGD 840,000 ($627,633) on luxury goods and a penthouse.
🔹 Her longer prison term will begin only after she completes these six weeks.
How Ho Stole $4.2 Million from Bybit
According to Deputy Public Prosecutor Jeremy Bin, Ho used the stolen funds to buy luxury items, including sunglasses, handbags, shoes, shirts, and jewelry from Louis Vuitton.
She also placed a down payment of SGD 750,000 ($560,388) on a penthouse worth over SGD 3.7 million ($2.7 million).
📉 Her first theft occurred in May 2022, when she stole SGD 117,000 ($87,417) from Wechain, a company handling payroll processing for Bybit employees.
Ho manipulated Excel spreadsheets to redirect funds from company accounts to her personal bank accounts.
🗣 "When she realized her fraud went undetected, she became emboldened and escalated her scheme to siphon funds from Bybit," prosecutor Bin stated.
A Sophisticated Scheme of Theft and Money Laundering
Ho operated six bank accounts and four cryptocurrency wallets on different platforms.
🔹 She altered payment records in Excel to ensure that payroll payments were sent to her crypto wallets instead of Bybit employees' wallets.
🔹 Between May and August 2022, Bybit processed eight crypto transfers totaling over 4.2 million USDT to her wallets.
🔹 She then converted the stolen crypto funds into fiat currency and used complex transfers to launder the money.
📉 Her crimes were exposed in September 2022, when Wechain’s CFO noticed unusually large crypto transactions.
🛑 An internal investigation uncovered discrepancies, leading Wechain to report Ho to the police in February 2023. She was arrested two months later.
The Consequences and Long Road to Conviction
Ho Kai Xin managed to conceal her fraudulent activities for several months, but her extravagant spending and suspicious transactions eventually raised red flags.
⚖ In April 2023, she was formally charged, and after more than a year of legal proceedings, she has now been sentenced to nearly 10 years in prison.
🔹 Bybit is currently working to recover the stolen funds, but a portion remains untraceable due to money laundering techniques.
🔹 This case serves as a stark warning for crypto companies about the security risks involved in internal fund management.

#CryptoScamAlert , #CryptoFraud , #Singapore , #blockchain , #cybercrime

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Skandal Sepasang Kekasih Mencuri 119.754 Bitcoin. Lichtenstein, meretas jaringan Bitfinex pada tahun 2016, menggunakan alat dan teknik peretasan yang canggih. Begitu masuk ke dalam jaringan, Lichtenstein secara curang mengizinkan lebih dari 2.000 transaksi yang mentransfer 119.754 bitcoin dari Bitfinex ke dompet mata uang kripto yang berada dalam kendali Lichtenstein. Lichtenstein kemudian mengambil langkah-langkah untuk menutupi jejaknya dengan menghapus kredensial akses jaringan Bitfinex dan berkas log lainnya yang dapat mengungkapkan perilakunya kepada penegak hukum. Setelah peretasan tersebut, Lichtenstein meminta bantuan istrinya, Heather Morgan, untuk mencuci uang yang dicuri. Lichtenstein, terkadang dengan bantuan Morgan, menggunakan sejumlah teknik pencucian uang yang canggih, termasuk menggunakan identitas fiktif untuk membuat akun daring; memanfaatkan program komputer untuk mengotomatiskan transaksi; menyetorkan dana curian ke dalam akun di berbagai pasar darknet dan bursa mata uang kripto, lalu menarik dana tersebut; mengonversi bitcoin ke bentuk mata uang kripto lain dalam praktik yang dikenal sebagai "chain hopping"; menyetorkan sebagian hasil kejahatan ke layanan pencampuran mata uang kripto; menggunakan akun bisnis berbasis di AS untuk melegitimasi aktivitas perbankan Lichtenstein dan Morgan; dan menukarkan sebagian dana curian menjadi koin emas. #Hacker #cybercrime $BTC {spot}(BTCUSDT)
Skandal Sepasang Kekasih Mencuri 119.754 Bitcoin.

Lichtenstein, meretas jaringan Bitfinex pada tahun 2016, menggunakan alat dan teknik peretasan yang canggih. Begitu masuk ke dalam jaringan, Lichtenstein secara curang mengizinkan lebih dari 2.000 transaksi yang mentransfer 119.754 bitcoin dari Bitfinex ke dompet mata uang kripto yang berada dalam kendali Lichtenstein. Lichtenstein kemudian mengambil langkah-langkah untuk menutupi jejaknya dengan menghapus kredensial akses jaringan Bitfinex dan berkas log lainnya yang dapat mengungkapkan perilakunya kepada penegak hukum. Setelah peretasan tersebut, Lichtenstein meminta bantuan istrinya, Heather Morgan, untuk mencuci uang yang dicuri.

Lichtenstein, terkadang dengan bantuan Morgan, menggunakan sejumlah teknik pencucian uang yang canggih, termasuk menggunakan identitas fiktif untuk membuat akun daring; memanfaatkan program komputer untuk mengotomatiskan transaksi; menyetorkan dana curian ke dalam akun di berbagai pasar darknet dan bursa mata uang kripto, lalu menarik dana tersebut; mengonversi bitcoin ke bentuk mata uang kripto lain dalam praktik yang dikenal sebagai "chain hopping"; menyetorkan sebagian hasil kejahatan ke layanan pencampuran mata uang kripto; menggunakan akun bisnis berbasis di AS untuk melegitimasi aktivitas perbankan Lichtenstein dan Morgan; dan menukarkan sebagian dana curian menjadi koin emas.

#Hacker #cybercrime $BTC
🚨 Япония разоблачила хакеров из TraderTraitor! В мае 2024 года биржа DMM Bitcoin стала жертвой кибератаки, унесшей активы на 48,2 млрд иен (~$320 млн) 💸. Хакеры использовали хитрый фишинг через LinkedIn, чтобы проникнуть во внутренние системы биржи и перевести средства на свои адреса 🕵️‍♂️. 🔎 Кто за этим стоит? TraderTraitor — группа, которую связывают с Северной Кореей 🌍. Это не первая их атака, но одна из самых громких! ❗️ Что важно знать? Будьте осторожны с неизвестными сообщениями в соцсетях 🤔. Компании должны усиливать безопасность своих систем 🛡️. 💬 А вы сталкивались с подозрительными предложениями через LinkedIn? Поделитесь своими историями! #CryptoSecurity #BitcoinHack #TraderTraitor #CyberCrime #CryptoNews
🚨 Япония разоблачила хакеров из TraderTraitor!

В мае 2024 года биржа DMM Bitcoin стала жертвой кибератаки, унесшей активы на 48,2 млрд иен (~$320 млн) 💸. Хакеры использовали хитрый фишинг через LinkedIn, чтобы проникнуть во внутренние системы биржи и перевести средства на свои адреса 🕵️‍♂️.

🔎 Кто за этим стоит?
TraderTraitor — группа, которую связывают с Северной Кореей 🌍. Это не первая их атака, но одна из самых громких!

❗️ Что важно знать?

Будьте осторожны с неизвестными сообщениями в соцсетях 🤔.

Компании должны усиливать безопасность своих систем 🛡️.

💬 А вы сталкивались с подозрительными предложениями через LinkedIn? Поделитесь своими историями!

#CryptoSecurity
#BitcoinHack
#TraderTraitor
#CyberCrime
#CryptoNews
--
Hausse
#HackerAlert : The Most Dangerous Hacker You’ve Never Heard Of: Park Jin Hyok! 🚨 💀 A ghostly figure feared by the world's biggest corporations and governments. He leaves no trace, yet his attacks reshape history. As a key member of Lazarus Group, he masterfully breaches financial systems, siphoning billions. 🔥 His most notorious cyber strikes: 🎬 Sony Pictures Hack (2014) – Hollywood in shock: classified data stolen, private emails leaked. 🏦 Bangladesh Central Bank Heist (2016) – $81M vanished in seconds through a SWIFT network breach. 💥 WannaCry Ransomware (2017) – A global cyberattack paralyzing hospitals and corporations. 💰 Bybit Crypto Heist (2025) – A staggering $1.46 billion stolen—a new record! 😱 How does he do it? He doesn’t just hack systems—he manipulates entire economies. His code is a weapon. His name is fear. And the scariest part? He’s still out there… #cybercrime
#HackerAlert : The Most Dangerous Hacker You’ve Never Heard Of: Park Jin Hyok! 🚨
💀 A ghostly figure feared by the world's biggest corporations and governments.
He leaves no trace, yet his attacks reshape history. As a key member of Lazarus Group, he masterfully breaches financial systems, siphoning billions.
🔥 His most notorious cyber strikes:
🎬 Sony Pictures Hack (2014) – Hollywood in shock: classified data stolen, private emails leaked.
🏦 Bangladesh Central Bank Heist (2016) – $81M vanished in seconds through a SWIFT network breach.
💥 WannaCry Ransomware (2017) – A global cyberattack paralyzing hospitals and corporations.
💰 Bybit Crypto Heist (2025) – A staggering $1.46 billion stolen—a new record!
😱 How does he do it?
He doesn’t just hack systems—he manipulates entire economies. His code is a weapon. His name is fear. And the scariest part? He’s still out there…
#cybercrime
🚨 The Most Dangerous Cyber Criminal You’ve Never Heard Of: Park Jin Hyok! 🚨💻 $BTC {spot}(BTCUSDT) Ek aisa cyber criminal jo headlines se door raha, lekin duniya bhar ke financial systems ko hila diya! 🇰🇵 Lazarus Group ka ek key player, Park Jin Hyok, pichle ek decade ke kuch sabse devastating cyber attacks ke peeche raha hai. 👨‍💻🔥 📉 Yeh Rahe Uske Badmashiyaan aur Chori Ki Rakam: 🎬 Sony Pictures Hack (2014) – Koi paisa nahi gaya, lekin Sony ka system poori tarah compromise ho gaya! 🎥🔓 🏦 Bangladesh Central Bank Hack (2016) – Fraudulent SWIFT transfers ke zariye $81 million uda diye! 💸💰 🦠 WannaCry Ransomware Attack (2017) – Global ransom payments se $140K kama liye! 💻💀 💥 Bybit Hack (2025) – Ab tak ka sabse bada crypto heist! Exchange se $1.46 BILLION ka chuna laga diya! 🔥🚀💸 Cybersecurity alert 🚨 – Yeh hacker abhi bhi kahin na kahin planning kar raha hoga! 🌍👀 ⚡ Trending Now: #CyberCrime #LazarusGroup #BybitHack #HackerAlert #CryptoHeist
🚨 The Most Dangerous Cyber Criminal You’ve Never Heard Of: Park Jin Hyok! 🚨💻
$BTC

Ek aisa cyber criminal jo headlines se door raha, lekin duniya bhar ke financial systems ko hila diya! 🇰🇵 Lazarus Group ka ek key player, Park Jin Hyok, pichle ek decade ke kuch sabse devastating cyber attacks ke peeche raha hai. 👨‍💻🔥

📉 Yeh Rahe Uske Badmashiyaan aur Chori Ki Rakam:

🎬 Sony Pictures Hack (2014) – Koi paisa nahi gaya, lekin Sony ka system poori tarah compromise ho gaya! 🎥🔓

🏦 Bangladesh Central Bank Hack (2016) – Fraudulent SWIFT transfers ke zariye $81 million uda diye! 💸💰

🦠 WannaCry Ransomware Attack (2017) – Global ransom payments se $140K kama liye! 💻💀

💥 Bybit Hack (2025) – Ab tak ka sabse bada crypto heist! Exchange se $1.46 BILLION ka chuna laga diya! 🔥🚀💸

Cybersecurity alert 🚨 – Yeh hacker abhi bhi kahin na kahin planning kar raha hoga! 🌍👀

⚡ Trending Now: #CyberCrime #LazarusGroup #BybitHack #HackerAlert #CryptoHeist
Cryptocurrency hacks are becoming more frequent and damaging, with losses from cybercrime in the crypto space surging by 21% in 2024. According to a report from Chainalysis, total losses reached an alarming $2.2 billion, marking the fourth consecutive year in which crypto hack losses have exceeded $1 billion. This rise in losses underscores the growing need for robust cybersecurity measures in the digital asset market. As the cryptocurrency industry continues to expand, it is becoming an increasingly attractive target for cybercriminals. Hacks range from wallet breaches to large-scale attacks on exchanges and smart contracts. These cybercrimes not only lead to substantial financial losses for investors but also undermine trust in the security of the entire crypto ecosystem. One of the most significant concerns is the anonymity that cryptocurrencies offer. While this feature is beneficial for privacy and decentralization, it also allows hackers to operate with relative ease, moving stolen funds across borders without easy traceability. This has led to a rise in illegal activities, such as ransomware attacks and phishing scams, that target both individual investors and large institutions. The crypto community is working tirelessly to improve security standards, with many exchanges and platforms adopting two-factor authentication, multi-signature wallets, and other security protocols to protect users. However, the constant evolution of hacking techniques means that staying ahead of cybercriminals is a continuous battle. For investors, it is crucial to stay informed about potential risks and take necessary precautions. Always use reputable exchanges, enable strong security measures, and consider using hardware wallets for storing significant amounts of cryptocurrency. As the crypto market grows, so does the importance of securing digital assets against rising threats. The future of cryptocurrency depends not only on market innovation but also on the industry’s ability to protect its users from cyberattacks. #CryptoSecurity #cryptohacks #cybercrime
Cryptocurrency hacks are becoming more frequent and damaging, with losses from cybercrime in the crypto space surging by 21% in 2024. According to a report from Chainalysis, total losses reached an alarming $2.2 billion, marking the fourth consecutive year in which crypto hack losses have exceeded $1 billion. This rise in losses underscores the growing need for robust cybersecurity measures in the digital asset market.

As the cryptocurrency industry continues to expand, it is becoming an increasingly attractive target for cybercriminals. Hacks range from wallet breaches to large-scale attacks on exchanges and smart contracts. These cybercrimes not only lead to substantial financial losses for investors but also undermine trust in the security of the entire crypto ecosystem.

One of the most significant concerns is the anonymity that cryptocurrencies offer. While this feature is beneficial for privacy and decentralization, it also allows hackers to operate with relative ease, moving stolen funds across borders without easy traceability. This has led to a rise in illegal activities, such as ransomware attacks and phishing scams, that target both individual investors and large institutions.

The crypto community is working tirelessly to improve security standards, with many exchanges and platforms adopting two-factor authentication, multi-signature wallets, and other security protocols to protect users. However, the constant evolution of hacking techniques means that staying ahead of cybercriminals is a continuous battle.

For investors, it is crucial to stay informed about potential risks and take necessary precautions. Always use reputable exchanges, enable strong security measures, and consider using hardware wallets for storing significant amounts of cryptocurrency.

As the crypto market grows, so does the importance of securing digital assets against rising threats. The future of cryptocurrency depends not only on market innovation but also on the industry’s ability to protect its users from cyberattacks.

#CryptoSecurity #cryptohacks #cybercrime
Logga in för att utforska mer innehåll
Utforska de senaste kryptonyheterna
⚡️ Var en del av de senaste diskussionerna inom krypto
💬 Interagera med dina favoritkreatörer
👍 Ta del av innehåll som intresserar dig
E-post/telefonnummer