<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>cybercrime Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/cybercrime/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/cybercrime/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Sun, 03 Aug 2025 10:39:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>cybercrime Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/cybercrime/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>$3.5B Bitcoin Heist from 2020 Retroactively Uncovered!</title>
		<link>https://coinengineer.net/blog/3-5b-bitcoin-heist-from-2020-retroactively-uncovered/</link>
					<comments>https://coinengineer.net/blog/3-5b-bitcoin-heist-from-2020-retroactively-uncovered/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 03 Aug 2025 12:00:34 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Arkham]]></category>
		<category><![CDATA[Arkham Intelligence]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[bitcoin heist]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[btc]]></category>
		<category><![CDATA[cryptocurrency theft]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[LuBian]]></category>
		<category><![CDATA[Mining Pools]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=47274</guid>

					<description><![CDATA[<p>A massive heist that remained unreported for years has finally come to light, marking the largest cryptocurrency hack in history. According to Arkham Intelligence, Chinese mining pool LuBian was hacked in 2020, with 127,426 Bitcoin valued at approximately $3.5 billion stolen, making it the biggest crypto hack of all time. LuBian Mining Pool Hacked in</p>
<p>The post <a href="https://coinengineer.net/blog/3-5b-bitcoin-heist-from-2020-retroactively-uncovered/">$3.5B Bitcoin Heist from 2020 Retroactively Uncovered!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="2716" data-end="3041">A massive heist that remained unreported for years has finally come to light, marking the largest cryptocurrency hack in history. According to <strong>Arkham Intelligence</strong>, Chinese mining pool <strong>LuBian</strong> was hacked in 2020, with 127,426 <strong>Bitcoin</strong> valued at approximately $3.5 billion stolen, making it the biggest crypto hack of all time.</p>
<h2 data-start="3043" data-end="3089">LuBian Mining Pool Hacked in December 2020</h2>
<p data-start="3091" data-end="3468">Arkham Intelligence uncovered the hack on Saturday, revealing that the LuBian mining pool, which was the sixth-largest <strong>BTC</strong> mining pool at the time, was attacked on December 28, 2020. About 90% of its <strong>Bitcoin</strong> was stolen by hackers before the pool managed to transfer its remaining 11,886 BTC to recovery wallets. Neither <strong>LuBian</strong> nor the hackers reported the attack at the time.</p>
<p data-start="3091" data-end="3468"><em>You Might Be Interested In: <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://coinengineer.net/blog/sonic-svm-research-can-new-stablecoins-shake-up-the-old-order/">Sonic SVM Research: Can New Stablecoins Shake Up the Old Order?</a></span></em></p>
<p data-start="3470" data-end="3737">The hackers embedded OP_RETURN messages in 1,516 transactions to store wallet addresses. <strong>Arkham</strong> also noted that LuBian used a private key generation algorithm that was susceptible to brute-force attacks, which may have been the vulnerability exploited by the hackers.</p>
<p data-start="3470" data-end="3737"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-164220" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/08/devasa-bitcoin-soygunu.jpeg" alt="Bitcoin, arkham intelligence" width="632" height="466" /></p>
<h2 data-start="3739" data-end="3784">The Aftermath and Crypto Security Warning</h2>
<p data-start="3786" data-end="4195">At the time of the hack, the stolen Bitcoin was worth $3.5 billion, but now, at current prices, it’s valued at around $14.5 billion. <strong>Arkham</strong> highlights this incident as a critical reminder for crypto users to implement robust private key management and security practices. The breach also serves as a warning for all cryptocurrency investors about the risks of weak algorithms and poor cybersecurity practices.</p>
<h2 data-start="4197" data-end="4240">A Turning Point in Crypto Theft History</h2>
<p data-start="4242" data-end="4658">The <strong>LuBian</strong> hack surpasses the $1.5 billion <strong>ByBit</strong> hack from earlier this year, which was previously considered the largest crypto theft in history. This event, along with several other notable hacks, highlights the ever-present threats in the crypto space. In April, an elderly individual lost $330 million in Bitcoin via a social engineering attack, which was later laundered through 300 different wallet addresses.</p>
<p data-start="4242" data-end="4658"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <span style="color: #0000ff;"><a href="https://t.me/coinengineernews">Telegram</a><span style="color: #000000;">,</span> <a style="color: #0000ff;" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow">YouTube</a></span><span style="color: #000000;">,</span> and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><span style="color: #0000ff;">Twitter</span></a> channels for the latest<span style="color: #0000ff;"> <a style="color: #0000ff;" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a></span> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/3-5b-bitcoin-heist-from-2020-retroactively-uncovered/">$3.5B Bitcoin Heist from 2020 Retroactively Uncovered!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/3-5b-bitcoin-heist-from-2020-retroactively-uncovered/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/07/taslak-ce-93.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/07/taslak-ce-93.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Cyber Strike on LockBit Gang: 60K Bitcoin Addresses Exposed </title>
		<link>https://coinengineer.net/blog/cyber-strike-on-lockbit-gang-60k-bitcoin-addresses-exposed/</link>
					<comments>https://coinengineer.net/blog/cyber-strike-on-lockbit-gang-60k-bitcoin-addresses-exposed/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Thu, 08 May 2025 15:00:04 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[dark web]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[LockBit]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[siber güvenlik]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=41955</guid>

					<description><![CDATA[<p>The LockBit ransomware gang, one of the most dangerous groups in the cybercrime world, was shaken today by an attack on its own system. Approximately 60,000 Bitcoin addresses were leaked. This incident presents a significant opportunity for cybersecurity experts and law enforcement. The hack of the gang’s dark web panel exposed its vulnerabilities. Additionally, it</p>
<p>The post <a href="https://coinengineer.net/blog/cyber-strike-on-lockbit-gang-60k-bitcoin-addresses-exposed/">Cyber Strike on LockBit Gang: 60K Bitcoin Addresses Exposed </a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-c><strong>The LockBit</strong> ransomware gang, one of the most dangerous groups in the cybercrime world, was shaken today by an attack on its own system. Approximately <strong>60,000 Bitcoin addresses</strong> were leaked. This incident presents a significant opportunity for cybersecurity experts and law enforcement. The hack of the gang’s dark web panel exposed its vulnerabilities. Additionally, it is suggested that the leak may be linked to the <strong>Everest gang</strong>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p>
<h2><b><span data-c>Major Blow to LockBit</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></h2>
<p><span data-c><strong>LockBit</strong> targets companies and individuals with ransomware. This time, the gang itself was hacked. Its dark web panel was exposed, and <strong>59,975 Bitcoin</strong> addresses along with victim negotiations were leaked. Furthermore, this data provides clues for tracking the gang’s money flow.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p>
<p><span data-c>Among the victims targeted by the group are <strong>Boeing, Royal Mail UK, ICBC, and Capital Health</strong>. The gang allows affiliates to use LockBit’s tools to carry out attacks and share the ransom with the developers. According to <strong>Chainalysis reports, Russia-linked gangs</strong> (e.g., Evil Corp) earned over <strong>$400 million</strong> in cryptocurrency from ransomware in 2021. <strong>Crypto firms</strong>, particularly decentralized finance (DeFi) platforms or small exchanges, are vulnerable to such attacks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p>
<p><img decoding="async" class="alignnone wp-image-41956 size-large" src="https://coinengineer.net/blog/wp-content/uploads/2025/05/Ekran-goruntusu-2025-05-08-152513-1024x494.png" alt="" width="1024" height="494" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/05/Ekran-goruntusu-2025-05-08-152513-1024x494.png 1024w, https://coinengineer.net/blog/wp-content/uploads/2025/05/Ekran-goruntusu-2025-05-08-152513-300x145.png 300w, https://coinengineer.net/blog/wp-content/uploads/2025/05/Ekran-goruntusu-2025-05-08-152513-768x371.png 768w, https://coinengineer.net/blog/wp-content/uploads/2025/05/Ekran-goruntusu-2025-05-08-152513-1536x741.png 1536w, https://coinengineer.net/blog/wp-content/uploads/2025/05/Ekran-goruntusu-2025-05-08-152513.png 1550w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p><span data-c>The panel displays the message: &#8220;<strong>Don’t commit crimes, crime is bad, R from Prague xoxo</strong>,&#8221; along with a link to download the &#8220;paneldb_dump.zip&#8221; file.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p>
<p><span data-c>The leaked data includes <strong><a href="https://coinengineer.net/blog/fed-rates-steady-bitcoin-rises/">Bitcoin</a> wallet addresses</strong> and ransom negotiations. <strong>LockBit’s leader</strong>, “LockBitSupp,” claimed that the private keys are secure. However, experts are skeptical of this claim. On the other hand, the leaked information will make it easier for law enforcement to track the gang. The Bitcoin addresses put the gang’s revenue at risk.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p>
<h2><b><span data-c>Cybersecurity Warning</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></h2>
<p><span data-c>This incident revealed that <strong>cybercrime gangs</strong> are also vulnerable. Experts urge companies to protect themselves against <strong>ransomware</strong>. <strong>The leaked Bitcoin</strong> addresses could enhance <strong>cryptocurrency</strong> tracking. This situation underscores the importance of cybersecurity measures.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p>
<p><span data-c>The attack on <strong>LockBit</strong> is said to potentially reshape the cybercrime world. The leaked data puts the gang’s affiliates in a difficult position. Law enforcement and experts may be able to dismantle the gang by analyzing this information. <strong>Cybersecurity experts</strong> believe such incidents could foster greater collaboration.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p>
<p><span data-c>Lastly, it should be noted that more work is needed for security in the digital world.</span></p>
<p><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </strong></a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</strong></a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</strong></a> channels for the latest <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/cyber-strike-on-lockbit-gang-60k-bitcoin-addresses-exposed/">Cyber Strike on LockBit Gang: 60K Bitcoin Addresses Exposed </a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/cyber-strike-on-lockbit-gang-60k-bitcoin-addresses-exposed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-88.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-88.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Crypto Crime Goes Industrial!</title>
		<link>https://coinengineer.net/blog/crypto-crime-goes-industrial/</link>
					<comments>https://coinengineer.net/blog/crypto-crime-goes-industrial/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Tue, 22 Apr 2025 16:30:54 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[AI scams]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[crypto crime]]></category>
		<category><![CDATA[crypto fraud]]></category>
		<category><![CDATA[custom exchange]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[deepfake]]></category>
		<category><![CDATA[digital assets]]></category>
		<category><![CDATA[financial crime]]></category>
		<category><![CDATA[haowang]]></category>
		<category><![CDATA[huione guarantee]]></category>
		<category><![CDATA[illicit finance]]></category>
		<category><![CDATA[Money laundering]]></category>
		<category><![CDATA[Pig Butchering]]></category>
		<category><![CDATA[Southeast Asia]]></category>
		<category><![CDATA[stablecoin]]></category>
		<category><![CDATA[unodc]]></category>
		<category><![CDATA[visa crypto card]]></category>
		<category><![CDATA[xone chain]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40634</guid>

					<description><![CDATA[<p>Organized crime is evolving, and according to a new UNODC report, it’s going on-chain. Criminal syndicates across Southeast Asia are no longer just users of crypto infrastructure — they’re building their own. From custom stablecoins to dedicated exchanges and blockchains, billions of $ are being laundered in plain sight. Southeast Asia Becomes Crypto Crime Hotspot</p>
<p>The post <a href="https://coinengineer.net/blog/crypto-crime-goes-industrial/">Crypto Crime Goes Industrial!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="3367" data-end="3717">Organized crime is evolving, and according to a new <strong data-start="3419" data-end="3428">UNODC</strong> report, it’s going <strong data-start="3448" data-end="3460">on-chain</strong>. Criminal syndicates across <strong data-start="3489" data-end="3507">Southeast Asia</strong> are no longer just users of crypto infrastructure — they’re building their own. From <strong data-start="3593" data-end="3615">custom stablecoins</strong> to dedicated <strong data-start="3629" data-end="3642">exchanges</strong> and <strong data-start="3647" data-end="3662">blockchains</strong>, billions of <strong data-start="3676" data-end="3681">$</strong> are being laundered in plain sight.</p>
<h2 data-start="3719" data-end="3770">Southeast Asia Becomes Crypto Crime Hotspot</h2>
<p class="" data-start="3772" data-end="4069">One case highlighted is <strong data-start="3796" data-end="3816">Huione Guarantee</strong> (now rebranded as <em data-start="3835" data-end="3844">Haowang</em>), a Chinese-language platform operating out of <strong data-start="3892" data-end="3906">Phnom Penh</strong>, <strong data-start="3908" data-end="3920">Cambodia</strong>. Over the past four years, it has facilitated over <strong data-start="3972" data-end="3987">$24 billion</strong> in crypto linked to fraud and scam operations, growing to over <strong data-start="4051" data-end="4068">970,000 users</strong>.</p>
<hr />
<h4 data-start="1444" data-end="1471"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></h4>
<hr />
<p class="" data-start="4071" data-end="4329">The platform has launched its own <strong data-start="4105" data-end="4124">crypto exchange</strong>, <strong data-start="4126" data-end="4153">blockchain (Xone Chain)</strong>, <strong data-start="4155" data-end="4183">online gambling services</strong>, and even a <strong data-start="4196" data-end="4227">US dollar-backed stablecoin</strong> aimed at bypassing government oversight. In February 2025, the group unveiled a <strong data-start="4308" data-end="4328">Huione Visa card</strong>.</p>
<p data-start="4071" data-end="4329"><img decoding="async" class="aligncenter wp-image-153959 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/kripto-1.webp" alt="kripto" width="807" height="638" /></p>
<h2 data-start="4331" data-end="4397">Billions Of Dollars Laundered Through Custom Coins And Exchanges!</h2>
<p class="" data-start="4399" data-end="4685">The report warns that criminal groups in <strong data-start="4440" data-end="4451">Myanmar</strong>, <strong data-start="4453" data-end="4461">Laos</strong>, and <strong data-start="4467" data-end="4479">Cambodia</strong> are industrializing cybercrime with <strong data-start="4516" data-end="4522">AI</strong>, <strong data-start="4524" data-end="4538">blockchain</strong>, and <strong data-start="4544" data-end="4559">stablecoins</strong>, executing phishing, fake investments, and <strong data-start="4603" data-end="4620">romance scams</strong> — collectively known as <strong data-start="4645" data-end="4663">pig butchering</strong> — on a massive scale.</p>
<p class="" data-start="4687" data-end="4969">Recent crackdowns in <strong data-start="4708" data-end="4721">Hong Kong</strong>, <strong data-start="4723" data-end="4734">Nigeria</strong>, and other countries have led to hundreds of arrests. In October 2024, 27 people were arrested in Hong Kong for running a deepfake-powered crypto scam worth <strong data-start="4892" data-end="4907">$46 million</strong>. In December, <strong data-start="4922" data-end="4938">792 suspects</strong> were caught in Lagos, Nigeria.</p>
<p class="" data-start="4971" data-end="5221">The UN warns these groups are leveraging their own <strong data-start="5022" data-end="5037">stablecoins</strong> and <strong data-start="5042" data-end="5063">private exchanges</strong> to circumvent <strong data-start="5078" data-end="5085">AML</strong> laws and move funds freely across borders. The threat is growing beyond Asia — into <strong data-start="5170" data-end="5180">Africa</strong>, <strong data-start="5182" data-end="5199">South America</strong>, and the <strong data-start="5209" data-end="5220">Pacific</strong>.</p>
<p class="" data-start="5223" data-end="5319">Governments are urged to close loopholes and prepare for this expanding form of financial crime.</p>
<hr />
<p data-start="5223" data-end="5319"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/crypto-crime-goes-industrial/">Crypto Crime Goes Industrial!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/crypto-crime-goes-industrial/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>KiloEx Hacker Returns Entire $7.5M After Bounty Offer</title>
		<link>https://coinengineer.net/blog/kiloex-hacker-returns-entire-7-5m-after-bounty-offer/</link>
					<comments>https://coinengineer.net/blog/kiloex-hacker-returns-entire-7-5m-after-bounty-offer/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Fri, 18 Apr 2025 17:30:38 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[DEX]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[KiloEx]]></category>
		<category><![CDATA[oracle vulnerability]]></category>
		<category><![CDATA[PeckShield]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[white hat]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40457</guid>

					<description><![CDATA[<p>The attacker behind the $7.5 million KiloEx exploit has returned 100% of the stolen funds, just days after the decentralized exchange offered a $750,000 white hat bounty for the return of 90% of the stolen crypto. All Funds Returned Within 4 Days The exploit, reported on April 15, forced KiloEx to suspend platform operations. On</p>
<p>The post <a href="https://coinengineer.net/blog/kiloex-hacker-returns-entire-7-5m-after-bounty-offer/">KiloEx Hacker Returns Entire $7.5M After Bounty Offer</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2127" data-end="2352">The <strong data-start="2131" data-end="2182">attacker behind the $7.5 million KiloEx exploit</strong> has returned <strong data-start="2196" data-end="2224">100% of the stolen funds</strong>, just days after the decentralized exchange offered a <strong data-start="2279" data-end="2308">$750,000 white hat bounty</strong> for the return of 90% of the stolen crypto.</p>
<h2 data-start="2359" data-end="2399">All Funds Returned Within 4 Days</h2>
<p class="" data-start="2401" data-end="2653">The exploit, reported on <strong data-start="2426" data-end="2438">April 15</strong>, forced <strong data-start="2447" data-end="2457">KiloEx</strong> to suspend platform operations. On April 18, <strong data-start="2503" data-end="2522">PeckShieldAlert</strong> confirmed that approximately <strong data-start="2552" data-end="2568">$5.5 million</strong> in crypto had been returned. KiloEx later confirmed <strong data-start="2621" data-end="2638">full recovery</strong> of all assets.</p>
<h2 data-start="2660" data-end="2694">White Hat Agreement Honored</h2>
<p class="" data-start="2696" data-end="2863">KiloEx had offered the exploiter <strong data-start="2729" data-end="2756">10% of the stolen funds</strong> as a bounty if they returned the remaining 90%. The attacker complied, and as promised, the platform said:</p>
<hr />
<h4 data-start="1444" data-end="1471"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></h4>
<hr />
<p class="" data-start="2696" data-end="2863"><em><span style="font-size: 14.4px;">“All affected funds have been fully restored, and we will honor our agreement with a 10% white hat bounty.”</span></em></p>
<p class="" data-start="2976" data-end="3095">KiloEx also said it will <strong data-start="3001" data-end="3028">not pursue legal action</strong>, as the issue has been resolved transparently and without victims.</p>
<h2 data-start="3102" data-end="3139">Oracle Vulnerability Suspected</h2>
<p class="" data-start="3141" data-end="3329">According to <strong data-start="3154" data-end="3168">PeckShield</strong>, the root cause of the exploit may have been a <strong data-start="3216" data-end="3238">price oracle issue</strong> — a manipulated or inaccurate data feed used by smart contracts to determine asset prices.</p>
<hr />
<p data-start="3141" data-end="3329"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/kiloex-hacker-returns-entire-7-5m-after-bounty-offer/">KiloEx Hacker Returns Entire $7.5M After Bounty Offer</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/kiloex-hacker-returns-entire-7-5m-after-bounty-offer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2023/12/kiloex_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2023/12/kiloex_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>North Korea Confirms $42 Million Ethereum Theft from Upbit Exchange</title>
		<link>https://coinengineer.net/blog/north-korea-confirms-42-million-ethereum-theft-from-upbit-exchange/</link>
					<comments>https://coinengineer.net/blog/north-korea-confirms-42-million-ethereum-theft-from-upbit-exchange/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Thu, 21 Nov 2024 10:30:24 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[Economy News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[Exchange News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[Ethereum volatility]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[regulations]]></category>
		<category><![CDATA[upbit]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=32578</guid>

					<description><![CDATA[<p>The South Korean government has officially confirmed that North Korea stole $42 million worth of Ethereum from the Upbit exchange. The stolen amount is reportedly part of North Korea&#8217;s illegal cybercrime strategy to fund its activities. South Korean authorities announced that stricter cybersecurity and regulatory measures will be implemented in response to the breach. Impact</p>
<p>The post <a href="https://coinengineer.net/blog/north-korea-confirms-42-million-ethereum-theft-from-upbit-exchange/">North Korea Confirms $42 Million Ethereum Theft from Upbit Exchange</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The South Korean government has officially confirmed that <strong>North Korea</strong> stole <strong>$42 million</strong> worth of <strong>Ethereum</strong> from the <strong>Upbit</strong> exchange. The stolen amount is reportedly part of North Korea&#8217;s illegal <strong>cybercrime strategy</strong> to fund its activities. South Korean authorities announced that stricter <strong>cybersecurity</strong> and regulatory measures will be implemented in response to the breach.</p>
<h2>Impact on the Crypto Market</h2>
<ul>
<li><strong>Erosion of Trust in Centralized Exchanges:</strong> This incident could increase <strong>concerns</strong> about the security of centralized exchanges, leading users to shift towards <strong>decentralized finance (DeFi)</strong> platforms.</li>
<li><strong>Increased Regulation:</strong> Governments may feel a growing need to impose <strong>stricter regulations</strong> on the <strong>cryptocurrency market</strong> to prevent similar breaches.</li>
<li><strong>Ethereum Volatility:</strong> The theft of a large amount of <strong>Ethereum</strong> may trigger short-term <strong>price fluctuations</strong> in the market.</li>
<li><strong>North Korea’s Cyberattacks:</strong> This highlights the need for more advanced <strong>security protocols</strong> in the crypto industry to protect against <strong>sophisticated cyberattacks</strong>.</li>
</ul>
<hr />
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/north-korea-confirms-42-million-ethereum-theft-from-upbit-exchange/">North Korea Confirms $42 Million Ethereum Theft from Upbit Exchange</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/north-korea-confirms-42-million-ethereum-theft-from-upbit-exchange/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/11/north-korea.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/11/north-korea.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>REvil Affiliate &#8220;Rabotnik&#8221; Sentenced to 13 Years for Cybercrime Spree</title>
		<link>https://coinengineer.net/blog/revil-affiliate-rabotnik-sentenced-to-13-years-for-cybercrime-spree/</link>
					<comments>https://coinengineer.net/blog/revil-affiliate-rabotnik-sentenced-to-13-years-for-cybercrime-spree/#respond</comments>
		
		<dc:creator><![CDATA[Tanju Akbıyık]]></dc:creator>
		<pubDate>Thu, 02 May 2024 11:00:42 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[Genel]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Rabotnik]]></category>
		<category><![CDATA[REvil]]></category>
		<guid isPermaLink="false">https://coinengineer.io/?p=19375</guid>

					<description><![CDATA[<p>Once sentenced by the judge, Yaroslav Vasinskyi, also known by a criminal pseudonym as Rabotnik, will serve 13 years and 7 months in jail over a series of cyber crimes he participated in. As an affiliate of notorious Evil ransomware gang, Rabotnik had a significant role in over 2,500 ransomware attacks, with ransom demands that</p>
<p>The post <a href="https://coinengineer.net/blog/revil-affiliate-rabotnik-sentenced-to-13-years-for-cybercrime-spree/">REvil Affiliate &#8220;Rabotnik&#8221; Sentenced to 13 Years for Cybercrime Spree</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Once sentenced by the judge, <strong>Yaroslav Vasinskyi</strong>, also known by a criminal pseudonym as <strong>Rabotnik</strong>, will serve <strong>13 years and 7 months</strong> in jail over a series of cyber crimes he participated in. As an affiliate of notorious Evil ransomware gang, Rabotnik had a significant role in over 2,500 ransomware attacks, with ransom demands that sometimes exceed <strong>$700 million.</strong></p>
<h3>Global Cooperation in Justice</h3>
<p>The Department of Justice in its announcement on Wednesday reported the facts about Rabotnik&#8217;s activities and the consequences of those actions. &#8220;Also charged against Rabotnik, 24, is a restitution liability of around <strong>$16 million</strong>,&#8221; stated the release emphasizing the financial consequence.</p>
<p>Rabotnik&#8217;s struggle for justice started with his extradition from Poland to the United States. In the face of an 11-count indictment, he ultimately pleaded guilty, admitting to participation in numerous cybercrimes against his knowledge, including fraud, computer damage and money laundering.</p>
<h3>International Efforts against Ransomware</h3>
<p>Through this sentencing, we have the privilege of witnessing a turning point in the relentless fight against ransomware groups which was started by U.S. President Joe Biden in November 2021. The determination of the administration was greatly strengthened after REvil launched their obscene demand for $70 million in <a href="https://coinengineer.net/blog/bitcoin-jesus-detained-in-spain-on-charges-of-tax-evasion/">bitcoin</a>, after they had compromised Kaseya, which is a software provider based in Miami.</p>
<p>The takedown of <strong>REvil in March 2022 by the Russian authorities,</strong> which showcased the significance of international cooperation in curbing these cyber threats, is a testimony to this fact. The attorney general, Merrick B. Garland, focused on the collective effort in this regard by pointing out that the Justice Department in collaboration with its international partners is using all tools at its disposal to track the cybercriminals down, seize their proceeds, and hold them accountable for the crimes they commit.</p>
<h3>Financial Repercussions</h3>
<p>Rabotnik&#8217;s sentence also involves substantial financial burden. Besides his prison sentence, he has been ordered to pay a restitution depicting the fact that the DOJ is determined to trace and recover ill-gotten assets. The Department’s previous actions, <strong>including the seizure of 38 BTC and $6 million worth of ransom funds</strong>, illustrate its proactive attitude towards disbanding cybercrime activities and minimizing their effects.</p>
<p>The post <a href="https://coinengineer.net/blog/revil-affiliate-rabotnik-sentenced-to-13-years-for-cybercrime-spree/">REvil Affiliate &#8220;Rabotnik&#8221; Sentenced to 13 Years for Cybercrime Spree</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/revil-affiliate-rabotnik-sentenced-to-13-years-for-cybercrime-spree/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/05/hacker.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/05/hacker.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Unverified Zero-Day Exploit in iMessage Raises Security Concerns for iPhone Users</title>
		<link>https://coinengineer.net/blog/unveiling-the-recent-ios-zero-day-exploit/</link>
					<comments>https://coinengineer.net/blog/unveiling-the-recent-ios-zero-day-exploit/#respond</comments>
		
		<dc:creator><![CDATA[Tanju Akbıyık]]></dc:creator>
		<pubDate>Tue, 16 Apr 2024 22:00:07 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[dark web]]></category>
		<category><![CDATA[digital security]]></category>
		<category><![CDATA[iMessage exploit]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[iOS zero-day exploit]]></category>
		<category><![CDATA[iPhone security]]></category>
		<category><![CDATA[trust wallet]]></category>
		<category><![CDATA[zero-day]]></category>
		<category><![CDATA[zero-day attack]]></category>
		<guid isPermaLink="false">https://coinengineer.io/blog/?p=18034</guid>

					<description><![CDATA[<p>The discovery of a zero-day exploit targeting Apple&#8217;s iOS platform has sent shockwaves through the cyber security realm, raising concerns about the safety and integrity of millions of iPhone users&#8217; devices. Trust Wallet&#8217;s Alarming Revelation Trust Wallet, a reputable crypto wallet provider, sounded the alarm bells after uncovering evidence of a zero-day exploit lurking within</p>
<p>The post <a href="https://coinengineer.net/blog/unveiling-the-recent-ios-zero-day-exploit/">Unverified Zero-Day Exploit in iMessage Raises Security Concerns for iPhone Users</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The discovery of a zero-day exploit targeting Apple&#8217;s iOS platform has sent shockwaves through the cyber security realm, raising concerns about the safety and integrity of millions of iPhone users&#8217; devices.</p>
<p><strong>Trust Wallet&#8217;s Alarming Revelation</strong></p>
<p><a href="https://coinengineer.net/blog/what-is-trust-wallet-what-makes-it-unique/">Trust Wallet</a>, a reputable crypto wallet provider, sounded the alarm bells after uncovering evidence of a zero-day exploit lurking within Apple&#8217;s iMessage application. CEO Eowyn Chen&#8217;s disclosure of a screenshot purportedly showcasing the exploit for sale on the dark web for a staggering $2 million sparked immediate concern among iOS users. The urgency of Trust Wallet&#8217;s warning, urging users to disable iMessage to mitigate the risk, underscores the severity of the threat posed by this exploit.</p>
<p><strong>Industry Response and Skepticism</strong></p>
<p>In the wake of Trust Wallet&#8217;s revelation, industry experts and commentators have responded with a mix of alarm and skepticism. While some have echoed Trust Wallet&#8217;s concerns and emphasized the gravity of the situation, others have raised doubts about the validity of the claimed threat. The criticism from the public emphasizes the lack of concrete evidence that goes beyond the screenshot and represents an overall sense of careful inspection in the cyber security space.</p>
<p><strong>Navigating the Perilous Landscape of Zero-Day Exploits</strong></p>
<p>The emergence of this zero-day exploit serves as a stark reminder of the ever-present threats looming in the digital realm. With cyber criminals constantly comes up with new tactics to exploit vulnerabilities in popular software and platforms, the need for strong cyber security measures has never been more pressing. As iOS users grapple with the implications of this recent exploit, vigilance, informed decision-making, and collaboration between industry stakeholders are essential in safeguarding against future attacks into the digital infrastructure we rely upon.</p>
<p>The post <a href="https://coinengineer.net/blog/unveiling-the-recent-ios-zero-day-exploit/">Unverified Zero-Day Exploit in iMessage Raises Security Concerns for iPhone Users</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/unveiling-the-recent-ios-zero-day-exploit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/04/apple.webp' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/04/apple.webp' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
