Binance Square
#cybercrime

cybercrime

893,142 показвания
262 обсъждат
Astik_Mondal_
·
--
🚨 India lost ₹36,448 crore to cyber scams in 2025. Only ₹60 crore was recovered. Let that number destroy you for a second. 24 lakh people filed complaints. Victims ranged from tech workers to an 82-year-old grandmother who lost ₹10.74 crore in 9 days to a fake judge, in a fake court, with fake officers on screen. She thought she was under arrest. They cleaned out her life savings before she realized none of it was real. This is the new face of financial crime. No guns. No break-ins. Just a WhatsApp message, a fake trading app, and a script so convincing that educated, successful people wire everything they own to strangers. ₹22,495 crore from crypto scams alone. Fake CBI officers. Fake TRAI notices. Fake investment groups promising 40% monthly returns with screenshots to prove it. The recovery rate is 0.2%. That's not a typo. Once the money moves it's gone. Forever. The scammers aren't in a basement somewhere. They're running call centers. They have HR departments. Shift schedules. Performance targets. This is organized crime at industrial scale and your family members are the product. Share this. Screenshot this. The warning is free. The lesson costs ₹36,000 crore. #CyberScam #CryptoScam #India #CyberCrime #DigitalArrest
🚨 India lost ₹36,448 crore to cyber scams in 2025.
Only ₹60 crore was recovered.
Let that number destroy you for a second.
24 lakh people filed complaints. Victims ranged from tech workers to an 82-year-old grandmother who lost ₹10.74 crore in 9 days to a fake judge, in a fake court, with fake officers on screen.
She thought she was under arrest. They cleaned out her life savings before she realized none of it was real.
This is the new face of financial crime.
No guns. No break-ins. Just a WhatsApp message, a fake trading app, and a script so convincing that educated, successful people wire everything they own to strangers.
₹22,495 crore from crypto scams alone.
Fake CBI officers. Fake TRAI notices. Fake investment groups promising 40% monthly returns with screenshots to prove it.
The recovery rate is 0.2%.
That's not a typo. Once the money moves it's gone. Forever.
The scammers aren't in a basement somewhere. They're running call centers. They have HR departments. Shift schedules. Performance targets.
This is organized crime at industrial scale and your family members are the product.
Share this. Screenshot this. The warning is free. The lesson costs ₹36,000 crore.
#CyberScam #CryptoScam #India #CyberCrime #DigitalArrest
Статия
🚨 BIG GLOBAL CRACKDOWN ON CRYPTO SCAMS 🌍In a major international breakthrough, 🇦🇪 Dubai Police led a powerful operation called Tri-Force Sentinel, targeting large-scale crypto scam networks operating across borders. 🤝 Authorities involved: • 🇦🇪 Dubai Police • 🇺🇸 FBI • 🇨🇳 Chinese law enforcement 🎯 Focus of the crackdown: • Fake crypto investment platforms • “Pig butchering” scams (long-term trust-building before draining victims) 📊 Key Results: ✓ 276 suspects arrested ✓ 9 scam centers dismantled ✓ Victims primarily from international regions, especially the United States 💡 These scam networks were running sophisticated fake trading platforms, promising unrealistically high returns — only to vanish once funds were deposited. ⚖️ Why this matters: This operation highlights a growing global shift — governments are now actively collaborating to fight crypto-related fraud. Even nations that rarely coordinate (like the US and China) joined forces for this mission. 🔥 Bottom Line: Scammers are evolving fast… but global law enforcement is catching up. ⚠️ Stay safe: • Never trust guaranteed profits • Avoid unknown investment platforms • Always verify before investing #CryptoNewss #ScamAlert. #DubaiPolice #cybercrime #StaySafeCryptoCommunity

🚨 BIG GLOBAL CRACKDOWN ON CRYPTO SCAMS 🌍

In a major international breakthrough, 🇦🇪 Dubai Police led a powerful operation called Tri-Force Sentinel, targeting large-scale crypto scam networks operating across borders.
🤝 Authorities involved:
• 🇦🇪 Dubai Police
• 🇺🇸 FBI
• 🇨🇳 Chinese law enforcement
🎯 Focus of the crackdown:
• Fake crypto investment platforms
• “Pig butchering” scams (long-term trust-building before draining victims)
📊 Key Results:
✓ 276 suspects arrested
✓ 9 scam centers dismantled
✓ Victims primarily from international regions, especially the United States
💡 These scam networks were running sophisticated fake trading platforms, promising unrealistically high returns — only to vanish once funds were deposited.
⚖️ Why this matters:
This operation highlights a growing global shift — governments are now actively collaborating to fight crypto-related fraud. Even nations that rarely coordinate (like the US and China) joined forces for this mission.
🔥 Bottom Line:
Scammers are evolving fast… but global law enforcement is catching up.
⚠️ Stay safe:
• Never trust guaranteed profits
• Avoid unknown investment platforms
• Always verify before investing
#CryptoNewss #ScamAlert. #DubaiPolice #cybercrime #StaySafeCryptoCommunity
❗ Iran's Largest Crypto Exchange Hacked Iran's most popular and largest crypto exchange, Nobitex, has been hacked by a hacker group called "Predatory Sparrow." 📌 According to reports, approximately $48–82 million in various cryptocurrencies (USDT, BTC, TON, and others) were stolen from the exchange. 🔐 The hackers claimed that not only did they transfer the funds to their own crypto accounts, but they also caused cyber damage to banks and ATM machines linked to Iran's Islamic Revolutionary Guard Corps (IRGC). 🗣️ Nobitex has officially confirmed the incident and stated: "We will compensate our customers for their losses." 🌐 Due to the risk of further cyberattacks, it is reported that Iran also restricted its internet access last night. #cyber #hacker #IsraelIranConflict #cybercrime
❗ Iran's Largest Crypto Exchange Hacked

Iran's most popular and largest crypto exchange, Nobitex, has been hacked by a hacker group called "Predatory Sparrow."

📌 According to reports, approximately $48–82 million in various cryptocurrencies (USDT, BTC, TON, and others) were stolen from the exchange.

🔐 The hackers claimed that not only did they transfer the funds to their own crypto accounts, but they also caused cyber damage to banks and ATM machines linked to Iran's Islamic Revolutionary Guard Corps (IRGC).

🗣️ Nobitex has officially confirmed the incident and stated:

"We will compensate our customers for their losses."

🌐 Due to the risk of further cyberattacks, it is reported that Iran also restricted its internet access last night.

#cyber #hacker #IsraelIranConflict #cybercrime
Статия
Insider Reveals How MIT Brothers Orchestrated a $25 Million Crypto Heist in Just 12 SecondsA shocking revelation has emerged in a Manhattan federal court. A former employee of the crypto trading firm 18decimal testified that two MIT-educated brothers — Anton and James Peraire-Bueno — allegedly spent months planning an elaborate Ethereum blockchain exploit that netted them $25 million in just 12 seconds. According to testimony, the operation — internally code-named “Omakase” — was designed to exploit a flaw in Ethereum’s MEV-Boost software, turning the tables on “sandwich bots”, automated trading algorithms that profit from price slippage between transactions. Operation Omakase: The 12-Second Crypto Heist Witness Travis Chen, a former quantitative trader who worked with the brothers, described to jurors how the plan unfolded. He said that as early as December 2022, the brothers had outlined a method to manipulate Ethereum’s transaction sequencing system to reorder blocks for their own gain. “It was an operation designed to profit at the expense of sandwich bots,” Chen testified. “Everything was timed down to the second — 12 seconds that decided a $25 million outcome.” Chen admitted to profiting $2.4 million from the scheme — a sum he agreed to forfeit under a non-prosecution deal with authorities. Months of Preparation, Bait Transactions, and a 12-Second Strike According to Chen, the brothers spent months analyzing trading patterns of automated bots before crafting eight “bait” transactions meant to lure them into a trap. When the bots engaged, the brothers allegedly exploited a vulnerability in MEV-Boost that allowed them to preview and reorder pending blocks before they were finalized — giving them an enormous, unfair advantage. By April 2, 2023, the plan was executed — and $25 million in crypto had been drained. Meeting notes shown to the jury revealed how meticulously the operation was planned: “The scale of the operation is huge… $6 million per batch. If we catch them all at once, the payout could be much higher.” Prosecutors: “They Googled How to Launder Crypto” Federal prosecutors claim the brothers knew exactly what they were doing. Among the evidence presented were Google searches for: “How to launder cryptocurrency” “Top crypto lawyers in the U.S.” Defense attorneys, however, argued that these searches were made during legitimate legal consultations and should not be considered evidence of intent. Both brothers face charges of wire fraud and money laundering, each carrying a potential 20-year prison sentence if convicted. Flashbots Fixed the Exploit Within 24 Hours The company behind the MEV-Boost software, Flashbots, responded quickly. Developer Robert Miller testified that the vulnerability was patched within 24 hours of the incident. Miller also revealed that the alleged perpetrators later contacted him anonymously, offering to share technical details of their exploit if he agreed not to call it a “hack.” “They said they’d explain how it worked — as long as we didn’t label it an exploit,” Miller told the court. Defense: “They Didn’t Know It Was Illegal” The defense claims the brothers believed their actions were a form of ethical hacking, not a crime. They argue that blockchain law remains largely undefined, and that no clear line existed between legal arbitrage and illegal manipulation. In a letter to the court, defense lawyers said that any remorse shown after the indictment is irrelevant to what the brothers knew or believed at the time of the incident. A Landmark Case for Crypto Law This case is shaping up to be one of the most significant crypto trials in history, testing the boundary between decentralized innovation and financial crime. If convicted, the brothers’ actions could set a precedent defining what constitutes “permissible blockchain manipulation” — and what becomes known as the cyber heist of the century. #cybercrime , #Cryptoscam , #CryptoSecurity , #CryptoNews , #crypto Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Insider Reveals How MIT Brothers Orchestrated a $25 Million Crypto Heist in Just 12 Seconds

A shocking revelation has emerged in a Manhattan federal court. A former employee of the crypto trading firm 18decimal testified that two MIT-educated brothers — Anton and James Peraire-Bueno — allegedly spent months planning an elaborate Ethereum blockchain exploit that netted them $25 million in just 12 seconds.
According to testimony, the operation — internally code-named “Omakase” — was designed to exploit a flaw in Ethereum’s MEV-Boost software, turning the tables on “sandwich bots”, automated trading algorithms that profit from price slippage between transactions.

Operation Omakase: The 12-Second Crypto Heist
Witness Travis Chen, a former quantitative trader who worked with the brothers, described to jurors how the plan unfolded.

He said that as early as December 2022, the brothers had outlined a method to manipulate Ethereum’s transaction sequencing system to reorder blocks for their own gain.
“It was an operation designed to profit at the expense of sandwich bots,” Chen testified.

“Everything was timed down to the second — 12 seconds that decided a $25 million outcome.”
Chen admitted to profiting $2.4 million from the scheme — a sum he agreed to forfeit under a non-prosecution deal with authorities.

Months of Preparation, Bait Transactions, and a 12-Second Strike
According to Chen, the brothers spent months analyzing trading patterns of automated bots before crafting eight “bait” transactions meant to lure them into a trap.

When the bots engaged, the brothers allegedly exploited a vulnerability in MEV-Boost that allowed them to preview and reorder pending blocks before they were finalized — giving them an enormous, unfair advantage.
By April 2, 2023, the plan was executed — and $25 million in crypto had been drained.
Meeting notes shown to the jury revealed how meticulously the operation was planned:
“The scale of the operation is huge… $6 million per batch. If we catch them all at once, the payout could be much higher.”

Prosecutors: “They Googled How to Launder Crypto”
Federal prosecutors claim the brothers knew exactly what they were doing.

Among the evidence presented were Google searches for:
“How to launder cryptocurrency”

“Top crypto lawyers in the U.S.”
Defense attorneys, however, argued that these searches were made during legitimate legal consultations and should not be considered evidence of intent.
Both brothers face charges of wire fraud and money laundering, each carrying a potential 20-year prison sentence if convicted.

Flashbots Fixed the Exploit Within 24 Hours
The company behind the MEV-Boost software, Flashbots, responded quickly.

Developer Robert Miller testified that the vulnerability was patched within 24 hours of the incident.
Miller also revealed that the alleged perpetrators later contacted him anonymously, offering to share technical details of their exploit if he agreed not to call it a “hack.”
“They said they’d explain how it worked — as long as we didn’t label it an exploit,” Miller told the court.

Defense: “They Didn’t Know It Was Illegal”
The defense claims the brothers believed their actions were a form of ethical hacking, not a crime.

They argue that blockchain law remains largely undefined, and that no clear line existed between legal arbitrage and illegal manipulation.
In a letter to the court, defense lawyers said that any remorse shown after the indictment is irrelevant to what the brothers knew or believed at the time of the incident.

A Landmark Case for Crypto Law
This case is shaping up to be one of the most significant crypto trials in history, testing the boundary between decentralized innovation and financial crime.
If convicted, the brothers’ actions could set a precedent defining what constitutes “permissible blockchain manipulation” — and what becomes known as the cyber heist of the century.


#cybercrime , #Cryptoscam , #CryptoSecurity , #CryptoNews , #crypto

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
·
--
Бичи
New Trend in Crypto Crime: Physical Coercion Becomes the Main Threat A disturbing incident in Tel Aviv has sent shockwaves through the crypto world — an investor with $600,000 in crypto was kidnapped and tortured until he gave up his wallet password. This terrifying tactic, known as a “wrench attack,” is now spreading globally. Instead of hacking complex systems, criminals are realizing it’s easier to attack the person behind the wallet. No amount of cold storage, multi-sig protection, or encryption matters when physical force is used. Experts warn that violent crypto thefts could surpass $4 billion this year, as criminals track wealthy users via social media before carrying out kidnappings and home invasions. The message is clear — your safety and privacy are part of your crypto security: Don’t flaunt your wealth online. Keep your holdings private. Consider professional custody or personal security if you manage large assets. In crypto, the biggest vulnerability isn’t your wallet — it’s exposure. Stay discreet. Stay safe. #CryptoSecurity #Bitcoin #WrenchAttack #DeFi #Cybercrime #Blockchain #CryptoNews
New Trend in Crypto Crime: Physical Coercion Becomes the Main Threat

A disturbing incident in Tel Aviv has sent shockwaves through the crypto world — an investor with $600,000 in crypto was kidnapped and tortured until he gave up his wallet password. This terrifying tactic, known as a “wrench attack,” is now spreading globally.

Instead of hacking complex systems, criminals are realizing it’s easier to attack the person behind the wallet. No amount of cold storage, multi-sig protection, or encryption matters when physical force is used.

Experts warn that violent crypto thefts could surpass $4 billion this year, as criminals track wealthy users via social media before carrying out kidnappings and home invasions.

The message is clear — your safety and privacy are part of your crypto security:

Don’t flaunt your wealth online.

Keep your holdings private.

Consider professional custody or personal security if you manage large assets.

In crypto, the biggest vulnerability isn’t your wallet — it’s exposure. Stay discreet. Stay safe.

#CryptoSecurity #Bitcoin #WrenchAttack #DeFi #Cybercrime #Blockchain #CryptoNews
🤑𝙂𝙀𝙏 𝙁𝙍𝙀𝙀 𝙍𝙀𝙒𝘼𝙍𝘿 𝙐𝙋𝙏𝙊 8$ 𝙐𝙎𝘿𝙏 𝘼𝙉𝘿 𝙋𝙀𝙋𝙀 𝘾𝙊𝙄𝙉𝙎 𝙁𝙍𝙊𝙈 𝙈𝙔 𝙏𝙒𝙊 📌 𝙋𝙄𝙉𝙉𝙀𝘿 𝙋𝙊𝙎𝙏𝙎💰🤑💸 Guys, P2P is extremely risky. I’ve been telling folks to avoid using any kind of P2P platforms, it’s an open invitation to trouble. I know so many people in India got notice from various govt authorities just because they unknowingly sent INR or received INR from someone who wasn’t the right person to deal with. And in P2P, as innocent customer you have no clue about it. Not even touching the topic of TDS non-compliance bit here! So stay safe guys! WARNING: Binance P2P can be extremely risky! I sold $560 USDT to a fraudulent seller and now my bank account has been frozen due to suspected money cheating. Cyber crime is involved, demanding the money be returned to the victim or for me to connect with them. The scammer was apparently giving out the cheating money he obtained from his call center scam to other Binance P2P users in exchange for USDT. This is a stark reminder to always be vigilant and cautious when conducting P2P transactions. Please be careful when conducting P2P transactions and only trade with reputable users. Let's work together to keep the Binance community safe and free from scams. #cybercrime  #BinanceP2P  #ScamRiskWarning @Binance Risk Sniper
🤑𝙂𝙀𝙏 𝙁𝙍𝙀𝙀 𝙍𝙀𝙒𝘼𝙍𝘿 𝙐𝙋𝙏𝙊 8$ 𝙐𝙎𝘿𝙏 𝘼𝙉𝘿 𝙋𝙀𝙋𝙀 𝘾𝙊𝙄𝙉𝙎 𝙁𝙍𝙊𝙈 𝙈𝙔 𝙏𝙒𝙊 📌 𝙋𝙄𝙉𝙉𝙀𝘿 𝙋𝙊𝙎𝙏𝙎💰🤑💸

Guys, P2P is extremely risky. I’ve been telling folks to avoid using any kind of P2P platforms, it’s an open invitation to trouble.

I know so many people in India got notice from various govt authorities just because they unknowingly sent INR or received INR from someone who wasn’t the right person to deal with. And in P2P, as innocent customer you have no clue about it.

Not even touching the topic of TDS non-compliance bit here! So stay safe guys!

WARNING: Binance P2P can be extremely risky! I sold $560 USDT to a fraudulent seller and now my bank account has been frozen due to suspected money cheating. Cyber crime is involved, demanding the money be returned to the victim or for me to connect with them.

The scammer was apparently giving out the cheating money he obtained from his call center scam to other Binance P2P users in exchange for USDT. This is a stark reminder to always be vigilant and cautious when conducting P2P transactions.

Please be careful when conducting P2P transactions and only trade with reputable users. Let's work together to keep the Binance community safe and free from scams. #cybercrime  #BinanceP2P  #ScamRiskWarning

@Binance Risk Sniper
GreedyBear: $1M Crypto Heist via Firefox Extensions PANews reports that Russian hacker group GreedyBear stole over $1M in crypto in just five weeks by exploiting 150 weaponized Firefox extensions, nearly 500 malicious executables, and phishing sites. Their main tactic: fake versions of wallets like MetaMask, Exodus, Rabby Wallet, and TronLink, using Extension Hollowing to bypass security, later updating with malicious code. Victims were tricked with fake reviews and downloads from piracy sites, leading to stolen wallet credentials. #CryptoSecurity #GreedyBear #MetaMask #CyberCrime #BlockchainSafety
GreedyBear: $1M Crypto Heist via Firefox Extensions
PANews reports that Russian hacker group GreedyBear stole over $1M in crypto in just five weeks by exploiting 150 weaponized Firefox extensions, nearly 500 malicious executables, and phishing sites.
Their main tactic: fake versions of wallets like MetaMask, Exodus, Rabby Wallet, and TronLink, using Extension Hollowing to bypass security, later updating with malicious code.
Victims were tricked with fake reviews and downloads from piracy sites, leading to stolen wallet credentials.
#CryptoSecurity #GreedyBear #MetaMask #CyberCrime #BlockchainSafety
Статия
ФБР звинуватило росіянина в відмиванні $70 млн через криптобіржу E-Note.18 грудня 2025 року Міністерство юстиції США оголосило про захоплення інфраструктури криптовалютної біржі E-Note, яку використовували для відмивання коштів кіберзлочинців. ФБР встановило, що з 2017 року через цю платформу та пов'язану мережу "грошових мулів" пройшло понад $70 млн незаконних доходів від атак ransomware та захоплення акаунтів. Кошти надходили від атак на американську сферу охорони здоров'я та критичну інфраструктуру. Паралельно висунуто обвинувачення 39-річному громадянину Росії Михайлу Петровичу Чудновцю у змові з метою відмивання грошей. Він нібито контролював E-Note і надавав послуги з переказу кримінальних коштів через кордони, конвертуючи криптовалюту у фіат. Максимальне покарання — 20 років ув'язнення. Операцію проведено спільно з поліцією Мічигану, Німеччини та Фінляндії. Це черговий удар по тіньовій криптоекономіці, пов'язаній з транснаціональними хакерами. Підписуйтесь на @Lystopad #MiningUpdates для свіжих новин про майнінг та крипту! #CryptoNews #MoneyLaundering #FBI #Cryptocurrency #Ransomware #Bitcoin #cybercrime #Blockchain

ФБР звинуватило росіянина в відмиванні $70 млн через криптобіржу E-Note.

18 грудня 2025 року Міністерство юстиції США оголосило про захоплення інфраструктури криптовалютної біржі E-Note, яку використовували для відмивання коштів кіберзлочинців. ФБР встановило, що з 2017 року через цю платформу та пов'язану мережу "грошових мулів" пройшло понад $70 млн незаконних доходів від атак ransomware та захоплення акаунтів. Кошти надходили від атак на американську сферу охорони здоров'я та критичну інфраструктуру.

Паралельно висунуто обвинувачення 39-річному громадянину Росії Михайлу Петровичу Чудновцю у змові з метою відмивання грошей. Він нібито контролював E-Note і надавав послуги з переказу кримінальних коштів через кордони, конвертуючи криптовалюту у фіат. Максимальне покарання — 20 років ув'язнення.

Операцію проведено спільно з поліцією Мічигану, Німеччини та Фінляндії. Це черговий удар по тіньовій криптоекономіці, пов'язаній з транснаціональними хакерами.

Підписуйтесь на @Mining Updates #MiningUpdates для свіжих новин про майнінг та крипту!

#CryptoNews #MoneyLaundering #FBI #Cryptocurrency #Ransomware #Bitcoin #cybercrime #Blockchain
Статия
عاجل | اختراق داخلي في Coinbase واعتقال موظف سابقأكدت Coinbase أن موظف دعم سابق متورّط في حادثة تسريب بيانات حساسة ضمن أنظمة المنصة، وذلك بعد تحقيقات أظهرت أن المهاجمين قاموا برشوة موظفين خارجيين في فريق الدعم للوصول إلى بيانات العملاء، ثم طلبوا فدية بقيمة 20 مليون دولار مقابل حذف البيانات المسروقة. 👮‍♂️ في 26 ديسمبر 2025، تم اعتقال الموظف المتورّط في مدينة هيديراباد بالهند من قبل شرطة هيديراباد بالتعاون مع Coinbase، في خطوة تُعدّ أول اعتقال واضح في هذه القضية. 🔒 تفاصيل الحادثة الواقعية: • في 11 مايو 2025، تلقّت Coinbase بريدًا إلكترونيًا من جهة تهديد مجهولة تُفيد بأن لديها معلومات حساسة عن بعض حسابات العملاء وبيانات داخلية، وأنها تطالب بفدية مالية مقابل عدم نشر البيانات. • التحقيقات أظهرت أن المهاجمين استغلّوا موظفين خارجيين في خدمات الدعم لنسخ بيانات العملاء الحساسة، وليس عن طريق اختراق فني مباشر لنظام المنصة أو البلوكشين. • البيانات التي تم الوصول إليها تضمنت أسماء العملاء وعناوينهم وأرقام الهواتف والبريد الإلكتروني، بالإضافة إلى أرقام ملحوظة جزئيًا لبعض الهوية البنكية وصور هويات حكومية — دون أن يتم الوصول إلى كلمات المرور أو المفاتيح الخاصة بالمحافظ. • Coinbase رفضت دفع الفدية وأبدت تعاونها مع سلطات إنفاذ القانون لتعقب المسؤولين. ⚠️ الرسالة الأهم للمستخدمين: التهديدات لا تأتي دائمًا من الخارج — قد يكون العامل الداخلي هو الأصل في الخرق الأمني، لذا يُنصح المستخدمون بما يلي: ✔ تفعيل المصادقة متعددة العوامل (2FA) ✔ تحديث بيانات الحماية الأمنية باستمرار ✔ عدم مشاركة معلومات حساباتك الحساسة مع أي جهة 📊 هذا الحادث يذكّرنا بأن الأمان الرقمي لا يقتصر على كلمات المرور فقط، بل يشمل أيضًا مراقبة الوصول الداخلي والتحقق من سلوك الموظفين. #BlockchainNews #crypto #bitcoin #CryptoNews #cybercrime

عاجل | اختراق داخلي في Coinbase واعتقال موظف سابق

أكدت Coinbase أن موظف دعم سابق متورّط في حادثة تسريب بيانات حساسة ضمن أنظمة المنصة، وذلك بعد تحقيقات أظهرت أن المهاجمين قاموا برشوة موظفين خارجيين في فريق الدعم للوصول إلى بيانات العملاء، ثم طلبوا فدية بقيمة 20 مليون دولار مقابل حذف البيانات المسروقة.

👮‍♂️ في 26 ديسمبر 2025، تم اعتقال الموظف المتورّط في مدينة هيديراباد بالهند من قبل شرطة هيديراباد بالتعاون مع Coinbase، في خطوة تُعدّ أول اعتقال واضح في هذه القضية.

🔒 تفاصيل الحادثة الواقعية:

• في 11 مايو 2025، تلقّت Coinbase بريدًا إلكترونيًا من جهة تهديد مجهولة تُفيد بأن لديها معلومات حساسة عن بعض حسابات العملاء وبيانات داخلية، وأنها تطالب بفدية مالية مقابل عدم نشر البيانات.

• التحقيقات أظهرت أن المهاجمين استغلّوا موظفين خارجيين في خدمات الدعم لنسخ بيانات العملاء الحساسة، وليس عن طريق اختراق فني مباشر لنظام المنصة أو البلوكشين.

• البيانات التي تم الوصول إليها تضمنت أسماء العملاء وعناوينهم وأرقام الهواتف والبريد الإلكتروني، بالإضافة إلى أرقام ملحوظة جزئيًا لبعض الهوية البنكية وصور هويات حكومية — دون أن يتم الوصول إلى كلمات المرور أو المفاتيح الخاصة بالمحافظ.

• Coinbase رفضت دفع الفدية وأبدت تعاونها مع سلطات إنفاذ القانون لتعقب المسؤولين.

⚠️ الرسالة الأهم للمستخدمين:

التهديدات لا تأتي دائمًا من الخارج — قد يكون العامل الداخلي هو الأصل في الخرق الأمني، لذا يُنصح المستخدمون بما يلي:

✔ تفعيل المصادقة متعددة العوامل (2FA)

✔ تحديث بيانات الحماية الأمنية باستمرار

✔ عدم مشاركة معلومات حساباتك الحساسة مع أي جهة

📊 هذا الحادث يذكّرنا بأن الأمان الرقمي لا يقتصر على كلمات المرور فقط، بل يشمل أيضًا مراقبة الوصول الداخلي والتحقق من سلوك الموظفين.
#BlockchainNews #crypto #bitcoin #CryptoNews #cybercrime
·
--
Бичи
Edison Babu, an engineer from Kerala, was secretly running Ketamelon one of India's biggest darknet drug networks. Disguised as an online business, it shipped over 600 drug parcels across India and used privacy-focused crypto for payments. Thanks to the joint effort of India's NCB and DSCI, with crucial support from Binance in tracking transactions, freezing assets, and identifying wallets, the operation has now been taken down. #Crypto #Darknet #NCB #Binance #India #Blockchain #CyberCrime
Edison Babu, an engineer from Kerala, was secretly running Ketamelon one of India's biggest darknet drug networks. Disguised as an online business, it shipped over 600 drug parcels across India and used privacy-focused crypto for payments.

Thanks to the joint effort of India's NCB and DSCI, with crucial support from Binance in tracking transactions, freezing assets, and identifying wallets, the operation has now been taken down.

#Crypto #Darknet #NCB #Binance #India
#Blockchain #CyberCrime
🇹🇭✨ Thailand’s PM Leads APEC Push for Digital Security & Cybercrime Crackdown 🌏💻 Thailand’s Prime Minister Anutin Charnvirakul took center stage at the APEC Leaders’ Meeting in South Korea, calling for stronger regional unity to fight cross-border cybercrime 🕵️‍♂️⚔️ and promote inclusive digital growth. He highlighted how scams, online frauds, and human trafficking are spreading across borders 🚫🌐 — urging APEC nations to share intelligence, harmonize laws, and educate the public 📢🤝. Anutin also proposed a 3-part digital roadmap: 1️⃣ Boost regional cooperation & fair growth 🌱 2️⃣ Lead in artificial intelligence (AI) 🤖🚀 3️⃣ Ensure no nation is left behind in digital transformation 💡🌍 Thailand is already teaming up with partners like the U.S. and South Korea through platforms such as the Anti-Online Scam Operation Center (AOC) to strengthen online defenses 🛡️🇺🇸🇰🇷. {spot}(BNBUSDT) #FOMCMeeting #MarketPullback #WriteToEarnUpgrade #cybercrime #CryptoScamAlert
🇹🇭✨ Thailand’s PM Leads APEC Push for Digital Security & Cybercrime Crackdown 🌏💻

Thailand’s Prime Minister Anutin Charnvirakul took center stage at the APEC Leaders’ Meeting in South Korea, calling for stronger regional unity to fight cross-border cybercrime 🕵️‍♂️⚔️ and promote inclusive digital growth.

He highlighted how scams, online frauds, and human trafficking are spreading across borders 🚫🌐 — urging APEC nations to share intelligence, harmonize laws, and educate the public 📢🤝.

Anutin also proposed a 3-part digital roadmap:
1️⃣ Boost regional cooperation & fair growth 🌱
2️⃣ Lead in artificial intelligence (AI) 🤖🚀
3️⃣ Ensure no nation is left behind in digital transformation 💡🌍

Thailand is already teaming up with partners like the U.S. and South Korea through platforms such as the Anti-Online Scam Operation Center (AOC) to strengthen online defenses 🛡️🇺🇸🇰🇷.

#FOMCMeeting #MarketPullback #WriteToEarnUpgrade #cybercrime #CryptoScamAlert
Статия
Ransomware Payouts Drop 35% as Victims Resist DemandsRansomware Attacks Surge, but Payouts Decline Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands. According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified. Declining Payouts Despite Increasing Attacks 🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023. 🔹 The first half of the year saw a 2.3% increase in successful extortion attempts. 🔹 The Dark Angels Group alone collected $75 million. 🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations. Law Enforcement Crackdowns Disrupt Cybercrime Operations 🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks. 🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering. According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat. Ransomware Victims Increasingly Refuse to Pay 🔹 Less than 50% of ransomware attacks resulted in payouts. 🔹 Those who did comply paid up to $250,000 in ransom on average. 🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks. Cybercriminals Adapt to Heightened Security Measures 🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying. 🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code. 🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration. Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake. While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨 #CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Ransomware Payouts Drop 35% as Victims Resist Demands

Ransomware Attacks Surge, but Payouts Decline
Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands.
According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified.
Declining Payouts Despite Increasing Attacks
🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023.
🔹 The first half of the year saw a 2.3% increase in successful extortion attempts.
🔹 The Dark Angels Group alone collected $75 million.
🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations.
Law Enforcement Crackdowns Disrupt Cybercrime Operations
🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks.
🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering.
According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat.

Ransomware Victims Increasingly Refuse to Pay
🔹 Less than 50% of ransomware attacks resulted in payouts.
🔹 Those who did comply paid up to $250,000 in ransom on average.
🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks.
Cybercriminals Adapt to Heightened Security Measures
🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying.
🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code.
🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration.
Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake.
While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨

#CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Статия
Hong Kong Fraud Group Using Deepfakes Exposed – Pretended to Be Wealthy Single WomenSeized Notebooks Revealed Sophisticated Scams Hong Kong police uncovered a sophisticated fraud scheme that used artificial intelligence to deceive victims. The investigation led to the seizure of over HK$34 million (approximately USD 3.37 million). Notebooks confiscated by law enforcement revealed the criminals' methods, including the use of deepfake technology to appear more convincing. How the Fraudsters Lured Their Victims The fraudsters pretended to be wealthy single women, crafting stories about interests such as learning Japanese, playing golf, or tasting luxury wines worth over HK$100,000 (USD 12,850) per bottle. These methods were documented in the notebooks seized during the operation. The investigation resulted in the arrest of 31 individuals connected to a criminal syndicate. This group used artificial intelligence to create realistic images of attractive women, which were then used to lure victims into romantic and investment scams. The Problem of Deepfake Scams Byron Boston, a former police officer and CEO of Crypto Track, warned that the combination of deepfake technology and social engineering presents significant challenges for investigators and law enforcement. AI-generated images make criminals more convincing and enable them to execute more complex scams. Boston highlighted an incident from November 2022, where a fake video impersonating FTX founder Sam Bankman-Fried was used in a phishing attack targeting FTX users. This incident demonstrates how deepfake technologies can be exploited to steal cryptocurrency assets from victims. Scams Targeting Young People Confiscated materials revealed that the fraudsters specifically targeted young people seeking quick earnings. Victims were often convinced they were communicating with ideal women from Taiwan, Singapore, and Malaysia. Challenges in Combating These Crimes Boston emphasized that effective collaboration and swift action are key to fighting these sophisticated scams. However, he noted that many local law enforcement agencies, particularly in the U.S., lack the necessary tools and expertise to track stolen cryptocurrency or cooperate with international exchanges. Criminals leveraging technologies like deepfake and social engineering remain a significant challenge for security forces worldwide. #Deepfake , #CryptoFraud , #CryptoScams , #cybercrime , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Hong Kong Fraud Group Using Deepfakes Exposed – Pretended to Be Wealthy Single Women

Seized Notebooks Revealed Sophisticated Scams
Hong Kong police uncovered a sophisticated fraud scheme that used artificial intelligence to deceive victims. The investigation led to the seizure of over HK$34 million (approximately USD 3.37 million). Notebooks confiscated by law enforcement revealed the criminals' methods, including the use of deepfake technology to appear more convincing.
How the Fraudsters Lured Their Victims
The fraudsters pretended to be wealthy single women, crafting stories about interests such as learning Japanese, playing golf, or tasting luxury wines worth over HK$100,000 (USD 12,850) per bottle. These methods were documented in the notebooks seized during the operation.
The investigation resulted in the arrest of 31 individuals connected to a criminal syndicate. This group used artificial intelligence to create realistic images of attractive women, which were then used to lure victims into romantic and investment scams.
The Problem of Deepfake Scams
Byron Boston, a former police officer and CEO of Crypto Track, warned that the combination of deepfake technology and social engineering presents significant challenges for investigators and law enforcement. AI-generated images make criminals more convincing and enable them to execute more complex scams.
Boston highlighted an incident from November 2022, where a fake video impersonating FTX founder Sam Bankman-Fried was used in a phishing attack targeting FTX users. This incident demonstrates how deepfake technologies can be exploited to steal cryptocurrency assets from victims.
Scams Targeting Young People
Confiscated materials revealed that the fraudsters specifically targeted young people seeking quick earnings. Victims were often convinced they were communicating with ideal women from Taiwan, Singapore, and Malaysia.
Challenges in Combating These Crimes
Boston emphasized that effective collaboration and swift action are key to fighting these sophisticated scams. However, he noted that many local law enforcement agencies, particularly in the U.S., lack the necessary tools and expertise to track stolen cryptocurrency or cooperate with international exchanges.
Criminals leveraging technologies like deepfake and social engineering remain a significant challenge for security forces worldwide.

#Deepfake , #CryptoFraud , #CryptoScams , #cybercrime , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
·
--
Бичи
THE SECURITY IMPERATIVES OF THE NEW DIGITAL WEALTH CLASS High-net-worth individuals in the crypto sector have become primary targets for both sophisticated cybercrime syndicates and real-life kidnapping for ransom. $POL {future}(POLUSDT) This rising threat landscape necessitates a paradigm shift in how digital wealth is managed, moving beyond simple wallet security to physical protection protocols. $P {alpha}(560x810df4c7daf4ee06ae7c621d0680e73a505c9a06) Targeted threats highlight the vulnerability of highly visible wealth in the borderless and pseudo-anonymous world of decentralized finance. 🛡️. $BOND Sophisticated phishing and social engineering are frequently combined with real-world surveillance to compromise high-value non-custodial wallets. The unique "instant finality" of blockchain transactions makes the recovery of extorted funds nearly impossible, increasing the incentive for malicious actors. Security firms are now reporting a surge in demand for specialized private security services tailored specifically for the global crypto elite. 📉. Proactive privacy measures and the use of multi-signature vaults are now essential for mitigating both digital and physical extortion risks. A trend toward "stealth wealth" is growing as investors seek to decouple their digital identities from their physical locations and social presence. Strengthening personal security frameworks is becoming a critical component of professional-grade risk management for the next generation of asset holders. 🏛️. #CryptoSecurity #WealthProtection #CyberCrime #PersonalSafety
THE SECURITY IMPERATIVES OF THE NEW DIGITAL WEALTH CLASS
High-net-worth individuals in the crypto sector have become primary targets for both sophisticated cybercrime syndicates and real-life kidnapping for ransom.
$POL

This rising threat landscape necessitates a paradigm shift in how digital wealth is managed, moving beyond simple wallet security to physical protection protocols.
$P

Targeted threats highlight the vulnerability of highly visible wealth in the borderless and pseudo-anonymous world of decentralized finance. 🛡️.
$BOND
Sophisticated phishing and social engineering are frequently combined with real-world surveillance to compromise high-value non-custodial wallets.

The unique "instant finality" of blockchain transactions makes the recovery of extorted funds nearly impossible, increasing the incentive for malicious actors.

Security firms are now reporting a surge in demand for specialized private security services tailored specifically for the global crypto elite. 📉.

Proactive privacy measures and the use of multi-signature vaults are now essential for mitigating both digital and physical extortion risks.

A trend toward "stealth wealth" is growing as investors seek to decouple their digital identities from their physical locations and social presence.
Strengthening personal security frameworks is becoming a critical component of professional-grade risk management for the next generation of asset holders. 🏛️.
#CryptoSecurity #WealthProtection #CyberCrime #PersonalSafety
Статия
How 2 Secure ur Wallt Whn Othrs Need Access. R U Leavng the Door Opn? A Real-Life $3M Warning. $3,000,000 $USDT GONE: The Silent Killer of Crypto Security A chilling real-world incident proves that a simple act of digital carelessness is the new threat vector, not a blockchain exploit. A crypto investor recently saw their $3M $USDT holding completely wiped out after a seemingly innocent action by a family member opened a back door for sophisticated attackers. This isn't a story of betrayal—it’s a stark lesson in digital hygiene. The fortune vanished not because of a technical bug, but due to a confluence of common, everyday security flaws: an unsecure phone, an outdated password, and a compromised clipboard listener. 🔍 Core Analysis: The "Perfect Storm" Attack The tragedy highlights how hackers use a layered approach, exploiting weak links that users overlook: The Mnemonic/Seed Phrase: Storing the private recovery phrase digitally (in messaging apps, notes, or screenshots) immediately turns it from a secure key into a public vulnerability. Clipboard Hijacking: Malicious apps or browser extensions can silently monitor the device's clipboard. The moment the recovery phrase was copied and pasted, the key was intercepted instantly. Compromised Devices: An older, less-secure phone with weak passwords and untrusted third-party apps provided the perfect environment for the exploit to run undetected. 🛡️ Three Ironclad Rules for Digital Asset Survival Your security mindset is your ultimate profit strategy. Engrave these non-negotiable rules to protect your wealth: Rule The Action The Rationale 1. Absolute Physical Storage Never digitize your recovery phrase. Record it on a durable, non-digital medium (like metal) and secure it in an offline vault. Digital storage (cloud, photos, notes) turns your private key into a prime target for remote theft. 2. "Clean Room" Devices Use a dedicated, air-gapped device for accessing significant wallets. This device should have zero public apps, no browser extensions, and should never connect to public Wi-Fi. Isolating your wallet from your daily browsing and communication prevents clipboard monitoring and phishing. 3. Educate or Isolate Do not delegate access to your digital assets to family members who do not fully grasp crypto security protocols. If help is needed, use highly secure, real-time verification methods. A single misstep—like clicking a phishing link or exposing the phrase—can instantly empty a portfolio. ⏳ The 72-Hour Window: Remember, sophisticated cybercriminals often clear their digital footprints rapidly (sometimes within 72 hours). If your wallet is drained, the evidence trail disappears quickly. Proactive security is the only defense. 👉 Immediate Action: Stop reading and check your mnemonic storage now. Delete any digital copy and audit your browser extensions for anything suspicious. Your crypto wealth depends entirely on your paranoia. #CryptoSecurity #hotwallet #MnemonicPhrase #BinanceSquareFamily #cybercrime

How 2 Secure ur Wallt Whn Othrs Need Access. R U Leavng the Door Opn? A Real-Life $3M Warning.



$3,000,000 $USDT GONE: The Silent Killer of Crypto Security
A chilling real-world incident proves that a simple act of digital carelessness is the new threat vector, not a blockchain exploit. A crypto investor recently saw their $3M $USDT holding completely wiped out after a seemingly innocent action by a family member opened a back door for sophisticated attackers.
This isn't a story of betrayal—it’s a stark lesson in digital hygiene. The fortune vanished not because of a technical bug, but due to a confluence of common, everyday security flaws: an unsecure phone, an outdated password, and a compromised clipboard listener.
🔍 Core Analysis: The "Perfect Storm" Attack
The tragedy highlights how hackers use a layered approach, exploiting weak links that users overlook:
The Mnemonic/Seed Phrase: Storing the private recovery phrase digitally (in messaging apps, notes, or screenshots) immediately turns it from a secure key into a public vulnerability.
Clipboard Hijacking: Malicious apps or browser extensions can silently monitor the device's clipboard. The moment the recovery phrase was copied and pasted, the key was intercepted instantly.
Compromised Devices: An older, less-secure phone with weak passwords and untrusted third-party apps provided the perfect environment for the exploit to run undetected.
🛡️ Three Ironclad Rules for Digital Asset Survival
Your security mindset is your ultimate profit strategy. Engrave these non-negotiable rules to protect your wealth:
Rule The Action The Rationale
1. Absolute Physical Storage Never digitize your recovery phrase. Record it on a durable, non-digital medium (like metal) and secure it in an offline vault. Digital storage (cloud, photos, notes) turns your private key into a prime target for remote theft.
2. "Clean Room" Devices Use a dedicated, air-gapped device for accessing significant wallets. This device should have zero public apps, no browser extensions, and should never connect to public Wi-Fi. Isolating your wallet from your daily browsing and communication prevents clipboard monitoring and phishing.
3. Educate or Isolate Do not delegate access to your digital assets to family members who do not fully grasp crypto security protocols. If help is needed, use highly secure, real-time verification methods. A single misstep—like clicking a phishing link or exposing the phrase—can instantly empty a portfolio.
⏳ The 72-Hour Window:
Remember, sophisticated cybercriminals often clear their digital footprints rapidly (sometimes within 72 hours). If your wallet is drained, the evidence trail disappears quickly. Proactive security is the only defense.
👉 Immediate Action: Stop reading and check your mnemonic storage now. Delete any digital copy and audit your browser extensions for anything suspicious. Your crypto wealth depends entirely on your paranoia.
#CryptoSecurity #hotwallet #MnemonicPhrase #BinanceSquareFamily #cybercrime
⚠️ URGENT P2P SCAM WARNING | My Personal Experience I want to share a recent and shocking scam incident that I faced while using Binance P2P, hoping it helps others stay safe. I sold 749 USDT to a buyer who appeared trustworthy. He sent a bank payment that looked perfectly normal — I verified it and released the crypto. But what happened next was completely unexpected… Shortly after the release, the buyer filed a fraudulent complaint with the bank, claiming he never made the transfer. As a result, my bank account was blocked! ❌💳 This wasn’t just bad luck — it was a well-planned scam. The scammer builds your trust by making a legit-looking payment. Once you release the USDT, they file a fake fraud claim, and your bank steps in and freezes your funds. This is pure financial fraud and a serious cybercrime. 🔒 Please be careful! These scammers operate with confidence and experience — they know exactly how to manipulate the system. Let’s protect ourselves and our community. Always double-check. Report suspicious users. Share your stories. #P2PFraud #CryptoScam #USDTScam #BinanceP2PAlert #CryptoCommunity #ScamAwareness #CyberCrime #StaySafe #CryptoSafety
⚠️ URGENT P2P SCAM WARNING | My Personal Experience
I want to share a recent and shocking scam incident that I faced while using Binance P2P, hoping it helps others stay safe.
I sold 749 USDT to a buyer who appeared trustworthy. He sent a bank payment that looked perfectly normal — I verified it and released the crypto.
But what happened next was completely unexpected…
Shortly after the release, the buyer filed a fraudulent complaint with the bank, claiming he never made the transfer.
As a result, my bank account was blocked! ❌💳
This wasn’t just bad luck — it was a well-planned scam.
The scammer builds your trust by making a legit-looking payment. Once you release the USDT, they file a fake fraud claim, and your bank steps in and freezes your funds.
This is pure financial fraud and a serious cybercrime.
🔒 Please be careful!
These scammers operate with confidence and experience — they know exactly how to manipulate the system.
Let’s protect ourselves and our community.
Always double-check. Report suspicious users. Share your stories.
#P2PFraud #CryptoScam #USDTScam #BinanceP2PAlert #CryptoCommunity #ScamAwareness #CyberCrime #StaySafe #CryptoSafety
Статия
India Freezes Assets of Man Jailed in the U.S. for $20M Crypto ScamThe Indian government has cracked down on a global crypto fraud scheme—freezing nearly $5 million worth of assets belonging to a citizen currently imprisoned in the United States for running a large-scale phishing operation involving fake Coinbase websites. The man behind the scheme, 31-year-old Chirag Tomar, is now serving a five-year sentence in a U.S. federal prison. Fake Coinbase, Real Damage Tomar exploited users' trust in the popular exchange Coinbase by creating sophisticated fake websites that harvested login credentials. Victims were then redirected to fake customer support hotlines, where scammers used social engineering to obtain security codes or remote access to users' computers—ultimately draining their crypto wallets. Investigators revealed that Tomar stole over $72 million in digital assets through this scheme. He laundered the stolen funds via trading platforms and converted them into Indian rupees. According to India's Enforcement Directorate (ED), Tomar spent the money on luxury watches, sports cars like Lamborghinis and Porsches, and expensive travel. 18 Properties, Frozen Accounts & Ongoing Investigation India responded decisively to Tomar’s fraud. Authorities froze 18 properties in Delhi and bank accounts linked to his family and business partners. The seized assets are valued at $4.8 million. The case remains active, and further investigation is underway. “Escaping crypto fraud is no longer possible—criminals will be tracked, exposed, and jailed,” said Sudhakar Lakshmanaraja of the Digital South Trust. Officials believe this may be just the tip of the iceberg. Raids have already been conducted in Delhi and Mumbai, and further asset seizures or arrests may follow as authorities continue to trace money tied to the international scam network. #Cryptoscam , #PhishingAlert , #CryptoCrime , #cybercrime , #CryptoNews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

India Freezes Assets of Man Jailed in the U.S. for $20M Crypto Scam

The Indian government has cracked down on a global crypto fraud scheme—freezing nearly $5 million worth of assets belonging to a citizen currently imprisoned in the United States for running a large-scale phishing operation involving fake Coinbase websites. The man behind the scheme, 31-year-old Chirag Tomar, is now serving a five-year sentence in a U.S. federal prison.

Fake Coinbase, Real Damage
Tomar exploited users' trust in the popular exchange Coinbase by creating sophisticated fake websites that harvested login credentials. Victims were then redirected to fake customer support hotlines, where scammers used social engineering to obtain security codes or remote access to users' computers—ultimately draining their crypto wallets.
Investigators revealed that Tomar stole over $72 million in digital assets through this scheme. He laundered the stolen funds via trading platforms and converted them into Indian rupees. According to India's Enforcement Directorate (ED), Tomar spent the money on luxury watches, sports cars like Lamborghinis and Porsches, and expensive travel.

18 Properties, Frozen Accounts & Ongoing Investigation
India responded decisively to Tomar’s fraud. Authorities froze 18 properties in Delhi and bank accounts linked to his family and business partners. The seized assets are valued at $4.8 million. The case remains active, and further investigation is underway.
“Escaping crypto fraud is no longer possible—criminals will be tracked, exposed, and jailed,” said Sudhakar Lakshmanaraja of the Digital South Trust.
Officials believe this may be just the tip of the iceberg. Raids have already been conducted in Delhi and Mumbai, and further asset seizures or arrests may follow as authorities continue to trace money tied to the international scam network.

#Cryptoscam , #PhishingAlert , #CryptoCrime , #cybercrime , #CryptoNews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨Crypto Losses to #hacks Exceed $313M in August 🚨 Cryptocurrency hackers stole $313.86 million in digital assets across more than 10 #cyberattacks in August, raising significant doubts about the broader acceptance of the asset class. The alarming figure highlights a growing trend of sophisticated #cybercrime targeting the crypto industry. This wave of thefts has prompted renewed calls for stricter regulation and better security measures within the sector. The recent hacks add pressure on #exchanges and custodians to bolster their defenses and protect user assets. 🌐Source: #Cointelegraph Follow me to keep yourself updated ❗❕❗
🚨Crypto Losses to #hacks Exceed $313M in August 🚨

Cryptocurrency hackers stole $313.86 million in digital assets across more than 10 #cyberattacks in August, raising significant doubts about the broader acceptance of the asset class.

The alarming figure highlights a growing trend of sophisticated #cybercrime targeting the crypto industry.

This wave of thefts has prompted renewed calls for stricter regulation and better security measures within the sector.

The recent hacks add pressure on #exchanges and custodians to bolster their defenses and protect user assets.

🌐Source: #Cointelegraph

Follow me to keep yourself updated ❗❕❗
Статия
Six Men Kidnap Chicago Family, Forcing a $15 Million Crypto RansomArmed Kidnapping Leads to Crypto Ransom Demand A shocking kidnapping took place in Chicago, where six men forcibly abducted a three-member family and their nanny, demanding a $15 million cryptocurrency ransom. According to a February 12 report by the Chicago Tribune, citing an unsealed FBI affidavit, the kidnappers knocked on the family’s door under the pretense that they had accidentally damaged their garage door. Once inside, they forced their way in at gunpoint. The abductors then forced the family into a van, taking them first to a rented Airbnb about an hour away and later transferring them to another house. Five Days in Captivity and a Cryptocurrency Ransom The kidnappers demanded a ransom in Bitcoin, Ethereum, and other cryptocurrencies, threatening to kill the victims if their demands were not met. 📌 The victims were held captive for five days. 📌 One of the abductees managed to contact his father via the WeChat app, informing him about the kidnapping. 📌 On November 1, the family was released and sought help at a nearby dry cleaner before taking an Uber to a hospital. While it was reported that $15 million in cryptocurrency was transferred, U.S. authorities have only been able to recover $6 million so far. Six Suspects Indicted for the Kidnapping On December 13, six men were officially charged in connection with the abduction. The only suspect arrested so far is 34-year-old Zehuan Wei, who was detained on January 17 while attempting to re-enter the U.S. from Mexico. 🔹 Other suspects: Fan Zhang, Huajing Yan, Shengnan Jiang, Shiqiang Lian, and Ye Cao. 🔹 Some of them are believed to have fled to China after Wei’s arrest. Key Evidence Collected by U.S. Authorities Investigators gathered crucial evidence, including: ✅ Airbnb records where the victims were held. ✅ Analysis of cryptocurrency wallets to trace the ransom transactions. ✅ Search of a white Ford van used by the kidnappers. 🔹 DNA samples were taken from a white Chrysler Pacifica, rented by Wei on October 29. 🔹 Authorities matched surveillance footage with a photo of Ye Cao, captured by U.S. Customs and Border Protection. 🔹 Driver’s licenses of other suspects were analyzed for identity verification. 📌 At least two victims were able to identify some of the alleged kidnappers from photographs. The investigation is ongoing, with U.S. authorities working to track down the remaining suspects and recover the stolen cryptocurrency. #CryptoNewss , #CryptoSecurity , #cybercrime , #CryptoSecurity , #CryptoScamAlert Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Six Men Kidnap Chicago Family, Forcing a $15 Million Crypto Ransom

Armed Kidnapping Leads to Crypto Ransom Demand
A shocking kidnapping took place in Chicago, where six men forcibly abducted a three-member family and their nanny, demanding a $15 million cryptocurrency ransom.
According to a February 12 report by the Chicago Tribune, citing an unsealed FBI affidavit, the kidnappers knocked on the family’s door under the pretense that they had accidentally damaged their garage door. Once inside, they forced their way in at gunpoint.
The abductors then forced the family into a van, taking them first to a rented Airbnb about an hour away and later transferring them to another house.
Five Days in Captivity and a Cryptocurrency Ransom
The kidnappers demanded a ransom in Bitcoin, Ethereum, and other cryptocurrencies, threatening to kill the victims if their demands were not met.
📌 The victims were held captive for five days.
📌 One of the abductees managed to contact his father via the WeChat app, informing him about the kidnapping.
📌 On November 1, the family was released and sought help at a nearby dry cleaner before taking an Uber to a hospital.
While it was reported that $15 million in cryptocurrency was transferred, U.S. authorities have only been able to recover $6 million so far.
Six Suspects Indicted for the Kidnapping
On December 13, six men were officially charged in connection with the abduction.
The only suspect arrested so far is 34-year-old Zehuan Wei, who was detained on January 17 while attempting to re-enter the U.S. from Mexico.
🔹 Other suspects: Fan Zhang, Huajing Yan, Shengnan Jiang, Shiqiang Lian, and Ye Cao.
🔹 Some of them are believed to have fled to China after Wei’s arrest.

Key Evidence Collected by U.S. Authorities
Investigators gathered crucial evidence, including:
✅ Airbnb records where the victims were held.
✅ Analysis of cryptocurrency wallets to trace the ransom transactions.
✅ Search of a white Ford van used by the kidnappers.
🔹 DNA samples were taken from a white Chrysler Pacifica, rented by Wei on October 29.
🔹 Authorities matched surveillance footage with a photo of Ye Cao, captured by U.S. Customs and Border Protection.
🔹 Driver’s licenses of other suspects were analyzed for identity verification.
📌 At least two victims were able to identify some of the alleged kidnappers from photographs.
The investigation is ongoing, with U.S. authorities working to track down the remaining suspects and recover the stolen cryptocurrency.

#CryptoNewss , #CryptoSecurity , #cybercrime , #CryptoSecurity , #CryptoScamAlert

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Влезте, за да разгледате още съдържание
Присъединете се към глобалните крипто потребители в Binance Square
⚡️ Получавайте най-новата и полезна информация за криптовалутите.
💬 С доверието на най-голямата криптоборса в света.
👍 Открийте истински прозрения от проверени създатели.
Имейл/телефонен номер