<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>FBI Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/fbi/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/fbi/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Sun, 27 Jul 2025 22:22:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>FBI Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/fbi/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>White House Bomb Alerts Sounded by Suspicious Package!</title>
		<link>https://coinengineer.net/blog/white-house-bomb-alerts-sounded-by-suspicious-package/</link>
					<comments>https://coinengineer.net/blog/white-house-bomb-alerts-sounded-by-suspicious-package/#respond</comments>
		
		<dc:creator><![CDATA[Ahmet Bedirhan Arvas]]></dc:creator>
		<pubDate>Sun, 27 Jul 2025 22:21:34 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[bomb squad]]></category>
		<category><![CDATA[emergency response]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[incident scene]]></category>
		<category><![CDATA[safety measure]]></category>
		<category><![CDATA[Secret Service]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[suspicious package]]></category>
		<category><![CDATA[Washington DC]]></category>
		<category><![CDATA[White House]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=46889</guid>

					<description><![CDATA[<p>A suspicious package detected today around the White House in Washington DC, the capital of the United States, during the early afternoon hours has put security forces on high alert. Bomb disposal experts dispatched to the scene established a special security perimeter to examine the package. In a statement from the U.S. Secret Service, it</p>
<p>The post <a href="https://coinengineer.net/blog/white-house-bomb-alerts-sounded-by-suspicious-package/">White House Bomb Alerts Sounded by Suspicious Package!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="169" data-end="479">A suspicious package detected today around the White House in Washington DC, the capital of the United States, during the early afternoon hours has put security forces on high alert. Bomb disposal experts dispatched to the scene established a special security perimeter to examine the package.</p>
<p data-start="481" data-end="777">In a statement from the U.S. Secret Service, it was reported that security protocols around the White House were activated and that entry and exit to the area were temporarily suspended. The suspicious package was found on a grassy area near the White House and bomb technicians were immediately alerted.</p>
<hr />
<p data-start="481" data-end="777">This article may also catch your attention: <em><strong><a href="https://coinmuhendisi.com/blog/uniswap-v4-tvl-1-milyar-dolar-bunni-eulerswap-hacim/">Uniswap Leads with $1 Billion TVL Alongside Unichain and ETH!</a></strong></em></p>
<hr />
<ul>
<li data-start="779" data-end="811"><strong data-start="783" data-end="811">Traffic halted on surrounding roads</strong></li>
</ul>
<p data-start="813" data-end="1067">Following the incident, Pennsylvania Avenue and nearby streets were closed to both pedestrian and vehicle traffic. Police teams directed citizens away from the security zone and implemented precautions at nearby public buildings as a potential risk measure.</p>
<ul>
<li data-start="1069" data-end="1109"><strong data-start="1073" data-end="1109">Contents of the package remain unknown</strong></li>
</ul>
<p data-start="1111" data-end="1392">Authorities have not yet made a statement about the contents of the package. The bomb disposal unit on site is examining the package safely to determine the level of threat. While initial findings have not been shared with the public, no explosions or injuries have been reported.</p>
<p data-start="1111" data-end="1392">In recent years, security units in the U.S. have frequently been put on alert due to suspicious packages sent to various government institutions. In 2018, explosive-laden parcels sent to political figures nationwide led to increased security measures. In early 2025, another package found near the Capitol was determined to be harmless after thorough investigation.</p>
<h2 data-start="1825" data-end="1868">Secret Service and FBI Working Jointly</h2>
<p data-start="1870" data-end="2140">The investigation is being conducted jointly by the Secret Service, FBI, and the Washington DC Police Department. Security officials are reviewing surveillance footage and witness statements to determine whether the incident has any ties to terrorism. Authorities emphasized the importance of being cautious about unverified information and claims circulating on social media. It was stated that such incidents around the White House trigger maximum security procedures and that the situation is under control.</p>
<hr />
<p data-start="1870" data-end="2140"><span style="color: #0000ff;"><a class="anchor-url" style="color: #0000ff;" href="https://coinmuhendisi.com/blog/" target="_blank" rel="noopener noreferrer">Coinmuhendisi.com</a></span> For access to all content and in-depth news, don’t forget to follow us on <a href="https://news.google.com/publications/CAAqBwgKMLzpzwsw64TnAw?hl=tr&amp;gl=TR&amp;ceid=TR%3Atr"><span style="color: #0000ff;">Google News</span></a>!</p>
<p>The post <a href="https://coinengineer.net/blog/white-house-bomb-alerts-sounded-by-suspicious-package/">White House Bomb Alerts Sounded by Suspicious Package!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/white-house-bomb-alerts-sounded-by-suspicious-package/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/07/banks_ce-1-1.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/07/banks_ce-1-1.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>FBI Drops Investigation Into Kraken Founder Jesse Powell</title>
		<link>https://coinengineer.net/blog/fbi-drops-investigation-into-kraken-founder-jesse-powell/</link>
					<comments>https://coinengineer.net/blog/fbi-drops-investigation-into-kraken-founder-jesse-powell/#respond</comments>
		
		<dc:creator><![CDATA[Emre Yumlu]]></dc:creator>
		<pubDate>Tue, 22 Jul 2025 15:10:40 +0000</pubDate>
				<category><![CDATA[Exchange News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Brandon Fox]]></category>
		<category><![CDATA[declination letter]]></category>
		<category><![CDATA[department of justice]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Jesse Powell]]></category>
		<category><![CDATA[kraken]]></category>
		<category><![CDATA[lawsuit]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=46593</guid>

					<description><![CDATA[<p>Jesse Powell, the well-known founder of crypto exchange Kraken, has been cleared by the U.S. Department of Justice after a lengthy investigation that began two years ago. The probe, which involved an FBI raid on Powell’s residence, was not tied to his involvement in the crypto industry but stemmed from a dispute related to an</p>
<p>The post <a href="https://coinengineer.net/blog/fbi-drops-investigation-into-kraken-founder-jesse-powell/">FBI Drops Investigation Into Kraken Founder Jesse Powell</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="209" data-end="706"><strong>Jesse Powell</strong>, the well-known <strong data-start="238" data-end="275">founder of crypto exchange <a href="https://coinengineer.net/blog/turning-point-at-kraken-a-new-era-begins-in-tokenization/">Kraken</a></strong>, has been cleared by the U.S. Department of Justice after a lengthy investigation that began two years ago. The probe, which involved an FBI raid on Powell’s residence, was not tied to his involvement in the crypto industry but stemmed from a dispute related to an arts non-profit he had established years earlier. The government has now officially dropped the case and returned the electronic devices that were previously seized.</p>
<h3 data-start="708" data-end="757">A Legal Battle Unrelated to Crypto Operations</h3>
<p data-start="759" data-end="1140">The 2022 FBI raid initially caused a stir, especially after <strong data-start="819" data-end="857">media outlets reported allegations</strong> of hacking and cyberstalking. However, as more details came to light, it became clear that the matter was not related to Kraken or any misconduct within the <strong data-start="1015" data-end="1032">crypto market</strong>, but instead involved internal conflicts within a non-profit organization called Verge Center for the Arts.</p>
<p data-start="1142" data-end="1443">Powell, who founded Verge in 2008 to support the Sacramento arts scene, became entangled in a management dispute with board members. The conflict centered around access to communication tools like Google Workspace and Slack, not malicious cyber activity. Powell has consistently denied any wrongdoing.</p>
<h3 data-start="1445" data-end="1500">Devices Returned, Evidence Supports Powell’s Claims</h3>
<p data-start="1502" data-end="1805">In recent court filings, Powell revealed that the <strong data-start="1552" data-end="1603">Justice Department has closed the investigation</strong> and returned dozens of devices, including laptops and smartphones. According to Powell, the data on these devices backs his version of the story and further discredits the accusations made against him.</p>
<p data-start="1807" data-end="2084">Describing the ordeal as “personally and professionally devastating,” Powell expressed relief that the case had come to an end. “It’s still shocking that the raid was based on unfounded claims from Verge. I knew I had done nothing wrong, and the evidence proves it,” he stated.</p>
<h3 data-start="2086" data-end="2138">Civil Lawsuit Against Non-Profit Board Continues</h3>
<p data-start="2140" data-end="2502">Despite the closure of the criminal investigation, Powell is moving forward with a <strong data-start="2223" data-end="2251">civil defamation lawsuit</strong> against members of the Verge board. He claims that two individuals failed to hand over crucial documents during the legal discovery phase. One of them, Phil Cunningham, also serves as legal counsel for Verge but has declined to comment on the matter.</p>
<h3 data-start="2504" data-end="2559">Reputational Impact on Kraken and the Crypto Sector</h3>
<p data-start="2561" data-end="2899">Brandon Fox, Powell’s attorney, confirmed receipt of an official <strong data-start="2626" data-end="2650">“declination letter”</strong> from the Department of Justice, formally stating that the case is closed. This document plays a vital role in protecting Powell’s reputation and ensuring that <strong data-start="2810" data-end="2820">Kraken</strong>, a platform aiming to go public, remains compliant with financial regulations.</p>
<p data-start="2901" data-end="3101">However, lingering concerns remain about how details of the federal investigation were leaked to journalists. The Justice Department has not provided clarity on how this information reached the press.</p>
<hr />
<p data-start="2901" data-end="3101"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers"><strong>Twitter</strong></a> channels for the latest news and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/fbi-drops-investigation-into-kraken-founder-jesse-powell/">FBI Drops Investigation Into Kraken Founder Jesse Powell</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/fbi-drops-investigation-into-kraken-founder-jesse-powell/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/10/kraken.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/10/kraken.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>North Korean Hackers Target Crypto Devs!</title>
		<link>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/</link>
					<comments>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Fri, 25 Apr 2025 09:00:24 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[AI deception]]></category>
		<category><![CDATA[Angeloper]]></category>
		<category><![CDATA[BlockNovas]]></category>
		<category><![CDATA[crypto developers]]></category>
		<category><![CDATA[crypto scam]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[crypto wallet]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[fake companies]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[hacker threat]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[metamask]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[SoftGlide]]></category>
		<category><![CDATA[Web3 threats]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40808</guid>

					<description><![CDATA[<p>A subgroup of Lazarus, the North Korean state-linked hacker collective, has been exposed for setting up three fake crypto consulting firms to infect developers with malware. According to Silent Push, these shell companies—BlockNovas, Angeloper Agency, and SoftGlide—are part of a campaign to lure developers through fraudulent job interviews. You Might Be Interested In: Elon Musk</p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/">North Korean Hackers Target Crypto Devs!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2705" data-end="3075">A <strong data-start="2707" data-end="2730">subgroup of Lazarus</strong>, the North Korean state-linked hacker collective, has been exposed for setting up three fake crypto consulting firms to <strong data-start="2851" data-end="2885">infect developers with malware</strong>. According to <strong data-start="2900" data-end="2915">Silent Push</strong>, these shell companies—<strong data-start="2939" data-end="2953">BlockNovas</strong>, <strong data-start="2955" data-end="2975">Angeloper Agency</strong>, and <strong data-start="2981" data-end="2994">SoftGlide</strong>—are part of a campaign to lure developers through <strong data-start="3045" data-end="3074">fraudulent job interviews</strong>.</p>
<hr />
<p data-start="3077" data-end="3333"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3077" data-end="3333">Two of these companies are even <strong data-start="3109" data-end="3143">legally registered in the U.S.</strong>, adding a layer of legitimacy. During the interview, applicants receive a fake error message while trying to record a video, leading them to copy-paste a fix that actually installs malware.</p>
<h2 data-start="3335" data-end="3390">Malware Targets Wallet Keys and Clipboard Data</h2>
<p class="" data-start="3391" data-end="3692">The campaign utilizes three malware strains: <strong data-start="3436" data-end="3450">BeaverTail</strong>, <strong data-start="3452" data-end="3471">InvisibleFerret</strong>, and <strong data-start="3477" data-end="3493">Otter Cookie</strong>. While <strong data-start="3501" data-end="3515">BeaverTail</strong> is designed for initial compromise and further payload delivery, <strong data-start="3581" data-end="3597">Otter Cookie</strong> and <strong data-start="3602" data-end="3621">InvisibleFerret</strong> focus on extracting <strong data-start="3642" data-end="3664">crypto wallet keys</strong> and <strong data-start="3669" data-end="3691">clipboard contents</strong>.</p>
<p class="" data-start="3694" data-end="4003">Silent Push also discovered that hackers are using <strong data-start="3745" data-end="3768">AI-generated images</strong> and <strong data-start="3773" data-end="3795">stolen real photos</strong> to create fake employee profiles for the companies, boosting credibility. Analyst <strong data-start="3878" data-end="3894">Zach Edwards</strong> noted that some images were subtly altered using AI tools to resemble the original person but appear unique.</p>
<p class="" data-start="4005" data-end="4273">The campaign has been active <strong data-start="4034" data-end="4048">since 2024</strong>, and <strong data-start="4054" data-end="4081">at least two developers</strong> were directly affected—one of whom had their <strong data-start="4127" data-end="4158">MetaMask wallet compromised</strong>. The <strong data-start="4164" data-end="4171">FBI</strong> has since shut down <strong data-start="4192" data-end="4206">BlockNovas</strong>, but <strong data-start="4212" data-end="4225">SoftGlide</strong> and other parts of the operation remain online.</p>
<p data-start="4005" data-end="4273"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-154152 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/kuzey-kore.jpg" alt="Kuzey Kore" width="899" height="387" /></p>
<hr />
<p data-start="4005" data-end="4273"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/">North Korean Hackers Target Crypto Devs!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Bybit Hackers Resume Laundering!</title>
		<link>https://coinengineer.net/blog/bybit-hackers-resume-laundering/</link>
					<comments>https://coinengineer.net/blog/bybit-hackers-resume-laundering/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 02 Mar 2025 14:00:04 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[ByBit]]></category>
		<category><![CDATA[cross-chain bridges]]></category>
		<category><![CDATA[Crypto Analysis]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Decentralized Exchange]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[LazarusGroup]]></category>
		<category><![CDATA[thorchain]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=37637</guid>

					<description><![CDATA[<p>The Bybit hackers accelerated their laundering activities on March 1, moving another 62,200 Ether despite efforts from U.S. authorities to block their transactions. North Korea-Linked Lazarus Group in Action! According to a pseudonymous crypto analyst, the Lazarus Group, linked to North Korea, has successfully laundered the majority of the funds stolen from Bybit on February</p>
<p>The post <a href="https://coinengineer.net/blog/bybit-hackers-resume-laundering/">Bybit Hackers Resume Laundering!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="1581" data-end="1763">The <strong data-start="1585" data-end="1602">Bybit hackers</strong> accelerated their laundering activities on <strong data-start="1646" data-end="1657">March 1</strong>, moving <strong data-start="1666" data-end="1690">another 62,200 Ether</strong> despite efforts from <strong data-start="1712" data-end="1732">U.S. authorities</strong> to block their transactions.</p>
<h2 data-start="1765" data-end="1818">North Korea-Linked Lazarus Group in Action!</h2>
<p data-start="1820" data-end="2108">According to a pseudonymous crypto analyst, the <strong data-start="1868" data-end="1885">Lazarus Group</strong>, linked to <strong data-start="1897" data-end="1912">North Korea</strong>, has successfully laundered the majority of the <strong data-start="1961" data-end="2003">funds stolen from Bybit on February 21</strong>. Only <strong data-start="2010" data-end="2025">156,500 ETH</strong> remains to be moved, which is expected to happen <strong data-start="2075" data-end="2105">within the next three days</strong>.</p>
<hr />
<p data-start="2110" data-end="2458"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="2110" data-end="2458">The <strong data-start="2114" data-end="2121">FBI</strong> has flagged <strong data-start="2134" data-end="2159">51 Ethereum addresses</strong>, while <strong data-start="2167" data-end="2179">Elliptic</strong> has identified <strong data-start="2195" data-end="2227">over 11,000 wallet addresses</strong> connected to the hackers. <strong data-start="2254" data-end="2269">Chainalysis</strong> reports that the attackers have converted portions of the stolen Ether into <strong data-start="2346" data-end="2392">Bitcoin (BTC), Dai (DAI), and other assets</strong> using <strong data-start="2399" data-end="2455">DEXs, cross-chain bridges, and instant swap services</strong>.</p>
<p data-start="2110" data-end="2458"><img decoding="async" class="aligncenter wp-image-149945 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/01955523-3874-73d3-8709-524c77bb80d1.jpeg" alt="" width="2234" height="462" /></p>
<h2 data-start="2460" data-end="2491">THORChain Under Fire!</h2>
<p data-start="2493" data-end="2820">Hackers have been utilizing <strong data-start="2521" data-end="2548">decentralized protocols</strong> to obscure their transactions. One of the most criticized platforms in this process has been <strong data-start="2642" data-end="2655">THORChain</strong>. Developer <strong data-start="2667" data-end="2678">“Pluto”</strong> announced they would no longer contribute to the protocol after a proposal to block North Korean hacker-linked transactions was overturned.</p>
<p data-start="2822" data-end="3010">The <strong data-start="2826" data-end="2840">Bybit hack</strong>, with a <strong data-start="2849" data-end="2865">$1.4 billion</strong> loss, is the <strong data-start="2879" data-end="2916">biggest exploit in crypto history</strong>, surpassing the <strong data-start="2933" data-end="2983">$650 million Ronin Bridge hack from March 2022</strong> by more than <strong data-start="2997" data-end="3007">double</strong>.</p>
<hr />
<p data-start="2822" data-end="3010"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/bybit-hackers-resume-laundering/">Bybit Hackers Resume Laundering!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/bybit-hackers-resume-laundering/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/bybit_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/bybit_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>THORChain Developer Quits After Failed Bid to Block North Korean Transactions</title>
		<link>https://coinengineer.net/blog/thorchain-developer-quits-after-failed-bid-to-block-north-korean-transactions/</link>
					<comments>https://coinengineer.net/blog/thorchain-developer-quits-after-failed-bid-to-block-north-korean-transactions/#respond</comments>
		
		<dc:creator><![CDATA[Emre Yumlu]]></dc:creator>
		<pubDate>Fri, 28 Feb 2025 12:00:03 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[North Korean Hacker]]></category>
		<category><![CDATA[thorchain]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=37538</guid>

					<description><![CDATA[<p>THORChain Developer Leaves, Validator Considers Departure Over $605 Million North Korean Hacker Transactions. THORChain Developer and Validator Exit Over Voting on North Korean Hacker Transactions A THORChain developer announced they are stepping away from the protocol after a vote to block transactions linked to North Korean hackers was reversed. The developer, known by the pseudonym</p>
<p>The post <a href="https://coinengineer.net/blog/thorchain-developer-quits-after-failed-bid-to-block-north-korean-transactions/">THORChain Developer Quits After Failed Bid to Block North Korean Transactions</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://coinengineer.net/blog/the-latest-on-bitcoin-and-cryptocurrencies-28-february/"><strong>THORChain</strong> </a>Developer Leaves, Validator Considers Departure Over $605 Million <strong>North Korean Hacker</strong> Transactions.</p>
<h2 data-start="0" data-end="90">THORChain Developer and Validator Exit Over Voting on North Korean Hacker Transactions</h2>
<p data-start="92" data-end="445">A <strong>THORChain</strong> developer announced they are stepping away from the protocol after a vote to block transactions linked to <strong>North Korean hackers</strong> was reversed. The developer, known by the pseudonym &#8220;<strong>Pluto</strong>,&#8221; stated on February 27 that they will no longer contribute to THORChain but will remain available to assist with the transition of their responsibilities.</p>
<p data-start="447" data-end="646">This decision came after <strong>THORChain validator &#8220;TCB&#8221; revealed</strong> that a vote to stop Ether trading to prevent transactions related to the Lazarus Group, a North Korean hacking group, was quickly reversed.</p>
<h2 data-start="648" data-end="715">Lazarus Group Moves $605 Million via THORChain, Boosting Volume</h2>
<p data-start="717" data-end="833">TCB announced on X that they would also consider exiting if a solution to stop North Korean flows is not found soon. The <strong>Lazarus Group</strong> has continued to use <strong>THORChain</strong> to move funds from a $1.5 billion hack of Bybit on February 21. <a href="https://coinmuhendisi.com/blog/gelir-idaresi-baskanligindan-kripto-para-yatirimcilarina-kira-geliri-aciklamasi/"><strong><img decoding="async" class="size-full wp-image-149740 aligncenter" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/02/bybit.png" alt="bybit" width="522" height="571" /></strong></a></p>
<p data-start="835" data-end="1088">On February 28, the group transferred $605 million worth of ETH through THORChain, contributing to a significant rise in transaction volume. On February 26, THORChain recorded its highest-ever daily transaction volume at $860 million.</p>
<h2 data-start="1185" data-end="1234">FBI Confirms North Korea&#8217;s Role in Bybit Hack</h2>
<p data-start="1236" data-end="1379">The FBI has confirmed North Korea’s involvement in the Bybit hack and has called on crypto validators and exchanges to block the Lazarus Group.</p>
<p data-start="1381" data-end="1536"><strong>THORChain founder John-Paul Thorbjornsen</strong> stated that the protocol does not launder money and that the rapid movement of funds makes censorship unrealistic.</p>
<p data-start="1538" data-end="1724" data-is-last-node="" data-is-only-node=""><strong>TCB criticized THORChain,</strong> stating it is not truly decentralized and that creating a censorship-resistant structure is difficult due to the small number of actors involved in the network.</p>
<hr />
<p data-start="1538" data-end="1724" data-is-last-node="" data-is-only-node=""><em>Also, in the comment section, you can freely share your comments and opinions about the topic. Additionally, don’t forget to follow us on <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram</strong></a>, <a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a> and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/thorchain-developer-quits-after-failed-bid-to-block-north-korean-transactions/">THORChain Developer Quits After Failed Bid to Block North Korean Transactions</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/thorchain-developer-quits-after-failed-bid-to-block-north-korean-transactions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/thorchain_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/thorchain_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>FBI Calls for Blocking Transactions Linked to Bybit Hack</title>
		<link>https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/</link>
					<comments>https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Thu, 27 Feb 2025 16:00:02 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[blockchain analysis]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[financial crimes]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[TraderTraitor]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=37479</guid>

					<description><![CDATA[<p>The U.S. Federal Bureau of Investigation (FBI) has called on crypto exchanges, node operators, and private sector entities to block transactions from addresses linked to the Bybit hack. FBI and Bybit Hack Investigation The FBI has confirmed that North Korea was behind the $1.4 billion Bybit hack on October 21. In a public service announcement</p>
<p>The post <a href="https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/">FBI Calls for Blocking Transactions Linked to Bybit Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="64" data-end="259">The <strong data-start="68" data-end="114">U.S. Federal Bureau of Investigation (FBI)</strong> has called on <strong data-start="129" data-end="256">crypto exchanges, node operators, and private sector entities to block transactions from addresses linked to the Bybit hack</strong>.</p>
<h2 data-start="261" data-end="303">FBI and Bybit Hack Investigation</h2>
<p data-start="305" data-end="510">The FBI has confirmed that <strong data-start="332" data-end="400">North Korea was behind the $1.4 billion Bybit hack on October 21</strong>. In a <strong data-start="407" data-end="453">public service announcement on February 26</strong>, the agency referred to the attack as “TraderTraitor.”</p>
<hr />
<p data-start="512" data-end="753"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="512" data-end="753">According to the FBI, <strong data-start="534" data-end="624">TraderTraitor is also known as Lazarus Group, APT38, BlueNoroff, and Stardust Chollima</strong>. The agency stated that the group had <strong data-start="663" data-end="750">rapidly converted some of the stolen assets into Bitcoin and other cryptocurrencies</strong>.</p>
<p data-start="512" data-end="753"><img loading="lazy" decoding="async" class="aligncenter wp-image-149610 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/02/bybit.webp" alt="" width="1018" height="717" /></p>
<h2 data-start="755" data-end="804">Bybit Hack and Money Laundering Process</h2>
<p data-start="806" data-end="1040">The FBI revealed that <strong data-start="828" data-end="887">over 135,000 Ethereum (ETH) have already been laundered</strong>, with the attackers using <strong data-start="914" data-end="1011">decentralized exchanges, cross-chain bridges, and instant swap services with no KYC protocols</strong> to move the stolen assets.</p>
<p data-start="1042" data-end="1258">Additionally, <strong data-start="1056" data-end="1104">363,900 ETH (~$825 million) remain untouched</strong>. The FBI has shared <strong data-start="1125" data-end="1150">51 Ethereum addresses</strong> linked to the hackers and urged industry players to <strong data-start="1203" data-end="1255">block or avoid interactions with these addresses</strong>.</p>
<p data-start="1260" data-end="1496">Blockchain analytics firm <strong data-start="1286" data-end="1298">Elliptic</strong> has already flagged <strong data-start="1319" data-end="1381">11,084 crypto wallet addresses linked to the Bybit exploit</strong>. The FBI has called on anyone with relevant information to report it to the <strong data-start="1458" data-end="1493">Internet Crime Complaint Center</strong>.</p>
<hr />
<p data-start="1260" data-end="1496"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/">FBI Calls for Blocking Transactions Linked to Bybit Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/11/riot-platforms-1.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/11/riot-platforms-1.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Giant Operation from India: $190M Crypto Seized!</title>
		<link>https://coinengineer.net/blog/giant-operation-from-india-190m-crypto-seized/</link>
					<comments>https://coinengineer.net/blog/giant-operation-from-india-190m-crypto-seized/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 16 Feb 2025 10:30:01 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[BitConnect]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[crypto fraud]]></category>
		<category><![CDATA[Crypto Investigation]]></category>
		<category><![CDATA[crypto markets]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[ınvestment]]></category>
		<category><![CDATA[litecoin]]></category>
		<category><![CDATA[ponzi scheme]]></category>
		<category><![CDATA[Satish Kumbhani]]></category>
		<category><![CDATA[usdt]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=36680</guid>

					<description><![CDATA[<p>As part of an ongoing investigation, Indian authorities have seized $190 million worth of crypto linked to the BitConnect Ponzi scheme. The fraudulent system, which collapsed in 2018, defrauded over 4,000 investors worldwide, causing an estimated $2.4 billion in losses. India’s Enforcement Directorate (ED), the country’s financial crime investigation agency, confiscated ₹1,646 crore worth of</p>
<p>The post <a href="https://coinengineer.net/blog/giant-operation-from-india-190m-crypto-seized/">Giant Operation from India: $190M Crypto Seized!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="372" data-end="664">As part of an ongoing investigation, Indian authorities have seized <strong data-start="440" data-end="456">$190 million</strong> worth of crypto linked to the <strong data-start="487" data-end="501">BitConnect</strong> Ponzi scheme. The fraudulent system, which collapsed in <strong data-start="558" data-end="566">2018</strong>, defrauded <strong data-start="578" data-end="612">over 4,000 investors worldwide</strong>, causing an estimated <strong data-start="635" data-end="651">$2.4 billion</strong> in losses.</p>
<p data-start="666" data-end="879">India’s <strong data-start="674" data-end="706">Enforcement Directorate (ED)</strong>, the country’s financial crime investigation agency, confiscated <strong data-start="772" data-end="788">₹1,646 crore</strong> worth of crypto assets related to <strong data-start="823" data-end="837">BitConnect</strong>. A <strong data-start="841" data-end="856">February 15</strong> local report stated:</p>
<p data-start="666" data-end="879"><em>&#8220;The ED unit in Ahmedabad has seized cryptocurrency worth ₹1,646 crore as part of its investigation into the BitConnect cryptocurrency fraud, in which numerous investors were allegedly duped under the guise of securities investment.&#8221;</em></p>
<h2 data-start="1124" data-end="1169">Authorities Seize Additional Assets</h2>
<p data-start="1171" data-end="1399">In addition to <strong data-start="1186" data-end="1206">cryptocurrencies</strong>, Indian officials also confiscated <strong data-start="1242" data-end="1256">₹13,50,500</strong> (approximately <strong data-start="1272" data-end="1283">$15,582</strong>), an <strong data-start="1289" data-end="1296">SUV</strong>, and several <strong data-start="1310" data-end="1332">electronic devices</strong> during raids conducted in <strong data-start="1359" data-end="1370">Gujarat</strong> on <strong data-start="1374" data-end="1396">February 11 and 15</strong>.</p>
<hr />
<p data-start="1401" data-end="1750"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="1401" data-end="1750">BitConnect, which launched in <strong data-start="1431" data-end="1439">2016</strong>, collapsed within just <strong data-start="1463" data-end="1476">two years</strong>, leaving thousands of investors with heavy losses. <strong data-start="1528" data-end="1566">BitConnect founder Satish Kumbhani</strong>, who was <strong data-start="1576" data-end="1638">charged by the U.S. Department of Justice in February 2022</strong>, is accused of building a <strong data-start="1665" data-end="1696">global network of promoters</strong>, offering <strong data-start="1707" data-end="1747">commissions to push the Ponzi scheme</strong>.</p>
<p data-start="1401" data-end="1750"><img loading="lazy" decoding="async" class="aligncenter wp-image-148405 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/02/hindistan.jpg" alt="india" width="2437" height="1625" /></p>
<h2 data-start="1752" data-end="1814">BitConnect Victims Took Matters Into Their Own Hands</h2>
<p data-start="1816" data-end="2162">Some BitConnect victims attempted to take action on their own. In <strong data-start="1882" data-end="1897">August 2024</strong>, Indian authorities revealed that investor <strong data-start="1941" data-end="1967">Shailesh Babulal Bhatt</strong>, who had lost money in <strong data-start="1991" data-end="2016">BitConnect Coin (BCC)</strong>, allegedly <strong data-start="2028" data-end="2066">kidnapped two BitConnect employees</strong> in an attempt to recover his funds. According to reports, Bhatt and his accomplices extorted:</p>
<ul data-start="2164" data-end="2263">
<li data-start="2164" data-end="2185"><strong data-start="2166" data-end="2183">2,091 Bitcoin</strong></li>
<li data-start="2186" data-end="2209"><strong data-start="2188" data-end="2207">11,000 Litecoin</strong></li>
<li data-start="2210" data-end="2263"><strong data-start="2212" data-end="2228">$1.7 million</strong> (approximately <strong data-start="2244" data-end="2260">₹145 million</strong>)</li>
</ul>
<p data-start="2265" data-end="2355">Authorities stated that Bhatt took these drastic measures to <strong data-start="2326" data-end="2352">recover his investment</strong>.</p>
<h2 data-start="2357" data-end="2398">FBI Cracks Down on Crypto Fraud</h2>
<p data-start="2400" data-end="2610">Global authorities continue to crack down on crypto-related fraud. The <strong data-start="2471" data-end="2501">FBI’s “Operation Level Up”</strong> reportedly <strong data-start="2513" data-end="2565">prevented $285 million in potential crypto fraud</strong> between <strong data-start="2574" data-end="2607">January 2024 and January 2025</strong>.</p>
<hr />
<p data-start="2400" data-end="2610"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/giant-operation-from-india-190m-crypto-seized/">Giant Operation from India: $190M Crypto Seized!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/giant-operation-from-india-190m-crypto-seized/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/india.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/india.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Las Vegas Man Accused of $24M Crypto Ponzi Scheme</title>
		<link>https://coinengineer.net/blog/las-vegas-man-accused-of-24m-crypto-ponzi-scheme/</link>
					<comments>https://coinengineer.net/blog/las-vegas-man-accused-of-24m-crypto-ponzi-scheme/#respond</comments>
		
		<dc:creator><![CDATA[Emre Yumlu]]></dc:creator>
		<pubDate>Sat, 15 Feb 2025 11:30:56 +0000</pubDate>
				<category><![CDATA[Genel]]></category>
		<category><![CDATA[Brent Kovar]]></category>
		<category><![CDATA[crypto fraud]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[ponzi]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=36656</guid>

					<description><![CDATA[<p>Brent Kovar is accused of luring investors into a Ponzi scheme through YouTube videos and PowerPoint presentations, promising annual returns of 15%-30%. U.S. regulators have charged Brent Kovar, a Las Vegas resident, with defrauding over 400 investors through an AI-powered cryptocurrency mining scheme. Kovar is alleged to have run a Ponzi scheme worth $24 million,</p>
<p>The post <a href="https://coinengineer.net/blog/las-vegas-man-accused-of-24m-crypto-ponzi-scheme/">Las Vegas Man Accused of $24M Crypto Ponzi Scheme</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="0" data-end="152"><strong>Brent Kovar</strong> is accused of luring investors into a <a href="https://coinengineer.net/blog/what-is-bluefin-blue-what-does-it-do/"><strong>Ponzi scheme</strong></a> through YouTube videos and PowerPoint presentations, promising annual returns of 15%-30%.</p>
<p data-start="154" data-end="432" data-is-last-node=""><strong>U.S. regulators have charged Brent Kovar</strong>, a Las Vegas resident, with defrauding over 400 investors through an AI-powered cryptocurrency mining scheme. Kovar is alleged to have run a Ponzi scheme worth $24 million, offering investors high returns and a 100% money-back guarantee.</p>
<h2 data-start="0" data-end="39">Lured Investors with False Promises</h2>
<p data-start="41" data-end="257">According to a statement from the <strong>U.S. District Attorney for the Nevada region,</strong> Kovar made misleading statements about his investment firm and convinced some investors that their investments were insured by the <strong>FDIC</strong>.</p>
<p data-start="259" data-end="587">From late 2017 to July 2021, Kovar allegedly promised investors fixed returns between 15% and 30% annually and assured them that their investments were fully secured. However, evidence suggests that Kovar used the funds to finance his lavish lifestyle, buy gifts for employees, and pay off earlier investors in the Ponzi scheme.</p>
<h2 data-start="589" data-end="644">Luxury Living Under the Guise of Crypto Investments</h2>
<p data-start="646" data-end="948">Prosecutors noted that Kovar used a <strong>website, YouTube videos, and PowerPoint presentations</strong> to persuade investors. Kovar faces charges of <strong>12 counts of wire fraud, 3 counts of mail fraud, and 3 counts of money laundering</strong>. If convicted, he could face up to 330 years in prison and fines up to $4.5 million.</p>
<h2 data-start="950" data-end="985">FBI&#8217;s Crackdown on Crypto Fraud</h2>
<p data-start="987" data-end="1217">In recent years, there has been a significant rise in <strong>crypto-linked Ponzi schemes</strong>. The FBI’s &#8220;Operation Level Up&#8221; is credited with preventing approximately $285 million in potential losses from the beginning of 2024 to early 2025.</p>
<p data-start="1219" data-end="1604">For example, in January 2025, <strong>Antonia Perez Hernandez, who promoted the Forcount crypto Ponzi scheme</strong>, pled guilty to fraud charges and was sentenced to over two years in prison. In October 2024, a former lawyer in California confessed to running a multi-million-dollar crypto Ponzi scheme and was sentenced to five years of supervised release along with a $14 million restitution fine.</p>
<p data-start="1606" data-end="1820" data-is-last-node="">The increase in <strong>crypto-related fraud</strong> cases has led regulators and law enforcement agencies to impose stricter oversight on the sector. Brent Kovar&#8217;s case is one of the latest significant interventions in this area.</p>
<hr />
<p data-start="1606" data-end="1820" data-is-last-node=""><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/las-vegas-man-accused-of-24m-crypto-ponzi-scheme/">Las Vegas Man Accused of $24M Crypto Ponzi Scheme</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/las-vegas-man-accused-of-24m-crypto-ponzi-scheme/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/ponzi_ce.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/ponzi_ce.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Chinese Engineer Accused of Stealing Google&#8217;s AI Trade Secrets!</title>
		<link>https://coinengineer.net/blog/chinese-engineer-accused-of-stealing-googles-ai-trade-secrets/</link>
					<comments>https://coinengineer.net/blog/chinese-engineer-accused-of-stealing-googles-ai-trade-secrets/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Wed, 05 Feb 2025 10:30:41 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI espionage]]></category>
		<category><![CDATA[china]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[google cloud]]></category>
		<category><![CDATA[Linwei Ding]]></category>
		<category><![CDATA[Tensor Processing Unit]]></category>
		<category><![CDATA[trade secret theft]]></category>
		<category><![CDATA[U.S]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=36082</guid>

					<description><![CDATA[<p>The U.S. Department of Justice has accused a former Google engineer of economic espionage, alleging that he stole the company’s AI trade secrets. According to the 14-count indictment, Linwei (Leon) Ding uploaded over 1,000 confidential Google files to his personal Google Cloud account between May 2022 and May 2023. These files allegedly contained critical information</p>
<p>The post <a href="https://coinengineer.net/blog/chinese-engineer-accused-of-stealing-googles-ai-trade-secrets/">Chinese Engineer Accused of Stealing Google&#8217;s AI Trade Secrets!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The <strong>U.S. Department of Justice</strong> has accused a former <strong>Google</strong> engineer of <strong>economic espionage</strong>, alleging that he stole the company’s <strong>AI trade secrets</strong>.</p>
<p>According to the <strong>14-count indictment</strong>, <strong>Linwei (Leon) Ding</strong> uploaded <strong>over 1,000 confidential Google files</strong> to his personal <strong>Google Cloud</strong> account between <strong>May 2022 and May 2023</strong>. These files allegedly contained critical information about <strong>Google’s hardware infrastructure</strong> and <strong>software platform</strong> that supports the company’s <strong>AI supercomputing systems</strong>.</p>
<h2>Secret Ties with Chinese Companies</h2>
<p>Ding, who worked as a <strong>software engineer at Google since 2019</strong>, allegedly developed <strong>covert affiliations with Chinese tech firms</strong> as early as <strong>2022</strong>.</p>
<p>The <strong>DOJ</strong> claims Ding stole sensitive details about <strong>Google’s custom-designed SmartNIC, Tensor Processing Unit (TPU), and Graphics Processing Unit (GPU) chips</strong> and systems.</p>
<hr />
<p><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p>According to court documents, Ding began discussions with the <strong>chief technology officer of a Chinese technology company</strong> in <strong>June 2022</strong>. By <strong>May 2023</strong>, he had secretly founded his <strong>own AI and machine-learning company in China</strong>, where he served as <strong>CEO</strong>.</p>
<p><img loading="lazy" decoding="async" class="aligncenter" src="https://s3.cointelegraph.com/uploads/2025-02/0194d520-03c1-7a53-a2dd-d288924e1135" alt="google" width="650" height="903" /></p>
<h2>A Threat from Within Google!</h2>
<p>U.S. officials allege that Ding created <strong>PowerPoint presentations</strong> for employees of his Chinese company, referencing <strong>China’s national policies and talent programs</strong> with statements such as:</p>
<p><em>&#8220;This will help China achieve computing power infrastructure capabilities on par with the international level.&#8221;</em></p>
<p>The case is currently being investigated by the <strong>Federal Bureau of Investigation (FBI)</strong>. Ding was <strong>first indicted in March 2024</strong> on <strong>four counts of trade secret theft</strong>.</p>
<p>Now, facing <strong>seven counts of economic espionage</strong> and <strong>seven counts of trade secret theft</strong>, Ding could be sentenced to <strong>175 years in prison</strong> and fined up to <strong>$36.75 million</strong> if convicted. However, the final sentence will depend on the <strong>U.S. Sentencing Guidelines</strong> and other legal considerations.</p>
<hr />
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/chinese-engineer-accused-of-stealing-googles-ai-trade-secrets/">Chinese Engineer Accused of Stealing Google&#8217;s AI Trade Secrets!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/chinese-engineer-accused-of-stealing-googles-ai-trade-secrets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/google.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/google.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>New York Attorney General Files Lawsuit Over $2.2M Crypto Scam</title>
		<link>https://coinengineer.net/blog/new-york-attorney-general-files-lawsuit-over-2-2m-crypto-scam/</link>
					<comments>https://coinengineer.net/blog/new-york-attorney-general-files-lawsuit-over-2-2m-crypto-scam/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 12 Jan 2025 19:45:00 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[crypto scam]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Letitia James]]></category>
		<category><![CDATA[New York]]></category>
		<category><![CDATA[Remote Work]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=34774</guid>

					<description><![CDATA[<p>New York Attorney General Letitia James has filed a lawsuit to recover $2.2 million in cryptocurrency stolen from victims who were tricked with false promises of “remote work opportunities.” Attorney General James revealed that scammers lured New York residents with “well-paying, flexible jobs” through text messages, leading them into a crypto scam. Victims were encouraged</p>
<p>The post <a href="https://coinengineer.net/blog/new-york-attorney-general-files-lawsuit-over-2-2m-crypto-scam/">New York Attorney General Files Lawsuit Over $2.2M Crypto Scam</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>New York Attorney General <strong>Letitia James</strong> has filed a lawsuit to recover $2.2 million in cryptocurrency stolen from victims who were tricked with false promises of “remote work opportunities.”</p>
<p>Attorney General James revealed that scammers lured New York residents with <strong>“well-paying, flexible jobs”</strong> through text messages, leading them into a crypto scam. Victims were encouraged to open cryptocurrency accounts, deposit funds, and review products on fake websites.</p>
<p><img loading="lazy" decoding="async" class="aligncenter" src="https://s3.cointelegraph.com/uploads/2025-01/019458e4-588a-73a2-b13a-c3e8e8d51bfa" alt="new york" width="699" height="1176" /></p>
<h2>A Trap Set with False Promises</h2>
<p>Victims were told to maintain a crypto balance equivalent to or exceeding the value of the products they reviewed. Scammers claimed that the funds were only required to “legitimize” transactions and assured victims they were not actually purchasing the products. They also promised full reimbursement plus commissions. However, no payments were ever made.</p>
<hr />
<p><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-shared-that-memecoin-flew-up-500/">Elon Musk Shared, That Memecoin Flew: Up 500%!</a></em></strong></p>
<hr />
<p>In a statement, Attorney General James said:</p>
<p><em><strong>“Deceiving New Yorkers looking for remote work to support their families by tricking them into buying cryptocurrency and stealing it is cruel and unacceptable.”</strong></em></p>
<p>With assistance from the <strong>U.S. Secret Service</strong>, some of the stolen cryptocurrency has been frozen. The Attorney General’s office warned residents to remain vigilant against text messages from unknown senders claiming to offer jobs or opportunities.</p>
<h2>FBI’s Warning on Remote Work Scams</h2>
<p>This case highlights a warning issued by the <strong>FBI</strong> in June 2024 about a rise in remote work scams. According to the FBI, scammers contacted potential victims through unsolicited messages, offering simple tasks like “rating restaurants” or “optimizing services.”</p>
<p>Victims were then instructed to make cryptocurrency payments to unlock additional work opportunities, but these payments went straight into the scammers’ accounts.</p>
<hr />
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/new-york-attorney-general-files-lawsuit-over-2-2m-crypto-scam/">New York Attorney General Files Lawsuit Over $2.2M Crypto Scam</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/new-york-attorney-general-files-lawsuit-over-2-2m-crypto-scam/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/01/kripto-dava.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/01/kripto-dava.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
