<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>scam Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/scam/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/scam/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Tue, 17 Feb 2026 06:45:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>scam Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/scam/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>New Scam Method in Crypto! Attention Users!</title>
		<link>https://coinengineer.net/blog/new-scam-method-in-crypto-attention-users/</link>
					<comments>https://coinengineer.net/blog/new-scam-method-in-crypto-attention-users/#respond</comments>
		
		<dc:creator><![CDATA[Emre Yumlu]]></dc:creator>
		<pubDate>Tue, 17 Feb 2026 12:00:31 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[Ledger]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[Trezor]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=63767</guid>

					<description><![CDATA[<p>A new wave of scam is targeting hardware wallet owners through an unexpected channel: physical mail. As of February 2026, reports indicate that users of Ledger and Trezor have received counterfeit letters posing as official support communications. The goal is simple but dangerous: trick recipients into revealing their 24-word recovery seed phrases. Unlike typical phishing</p>
<p>The post <a href="https://coinengineer.net/blog/new-scam-method-in-crypto-attention-users/">New Scam Method in Crypto! Attention Users!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="58" data-end="479">A new wave of scam is targeting hardware wallet owners through an unexpected channel: physical mail. As of February 2026, reports indicate that users of <strong data-start="212" data-end="253"><span class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"><span class="whitespace-normal">Ledger</span></span></strong> and <strong data-start="258" data-end="299"><span class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"><span class="whitespace-normal">Trezor</span></span></strong> have received counterfeit letters posing as official support communications. The goal is simple but dangerous: trick recipients into revealing their 24-word recovery seed phrases.</p>
<p data-start="481" data-end="721">Unlike typical phishing emails, this campaign leverages the perceived legitimacy of printed correspondence. The letters feature realistic branding, formal layouts, and urgent language designed to pressure users into taking immediate action.</p>
<h2 data-start="728" data-end="754">How the Scheme Operates</h2>
<p data-start="756" data-end="1110">The scammer letters typically claim that a “mandatory authentication check” or “transaction verification” is required to maintain wallet access. Some warn recipients that failure to comply by a specific deadline could result in loss of access to their funds. Others instruct users to scan a QR code for what is described as a critical security update.</p>
<p data-start="1112" data-end="1413">Scanning the code directs victims to websites that closely imitate official domains. These fake portals prompt users to enter their recovery phrases under the guise of verification. Once the seed phrase is submitted, attackers gain full control of the wallet and can transfer all stored crypto assets.</p>
<p data-start="1415" data-end="1593">To build credibility, the letters often include reminders never to share recovery phrases online—an ironic tactic that lowers suspicion before directing users to malicious sites.</p>
<p data-start="1415" data-end="1593"><img fetchpriority="high" decoding="async" class="size-full wp-image-196474 aligncenter" src="https://coinmuhendisi.com/blog/wp-content/uploads/2026/02/trezor-snail-mail.png" alt="" width="1200" height="958" /></p>
<h2 data-start="1600" data-end="1643">Why Hardware Wallet Users Are Vulnerable</h2>
<p data-start="1645" data-end="2128">Previous security incidents have made hardware wallet customers attractive targets. In 2020, a data breach exposed the personal information of more than 270,000 Ledger customers, including email addresses and physical mailing details. In 2021, scammers distributed tampered devices and fake executive letters urging users to migrate funds. A 2023 supply-chain compromise affecting Ledger’s Connect Kit software also resulted in significant losses tied to Ethereum-based applications.</p>
<p data-start="2130" data-end="2245">These past exposures provide attackers with verified contact data, enabling more convincing and targeted campaigns.</p>
<h2 data-start="2252" data-end="2276">How to Stay Protected</h2>
<p data-start="2278" data-end="2557">Legitimate wallet providers never request recovery phrases under any circumstances. If an unexpected letter arrives, users should independently visit the company’s official website by manually typing the address into their browser rather than scanning QR codes or clicking links.</p>
<p data-start="2559" data-end="2780">Seed phrases must remain strictly offline and should never be entered on any website. Additional safeguards such as two-factor authentication, multi-signature setups, and regular wallet monitoring can further reduce risk.</p>
<p data-start="2782" data-end="3015" data-is-last-node="" data-is-only-node="">This campaign highlights an evolving threat landscape where offline communication channels are weaponized. Hardware wallet owners must treat every unsolicited request with skepticism and rely on verified sources before taking action.</p>
<p data-start="2782" data-end="3015" data-is-last-node="" data-is-only-node=""><em>Also, you can freely share your thoughts and comments about the topic in the comment section. Additionally, please follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow">Telegram, </a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow">YouTube </a>and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener">Twitter</a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/new-scam-method-in-crypto-attention-users/">New Scam Method in Crypto! Attention Users!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/new-scam-method-in-crypto-attention-users/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Global Security Overhaul by the &#8216;Bitcoin Family&#8217; Amid Rising Crypto Crimes</title>
		<link>https://coinengineer.net/blog/global-security-overhaul-by-the-bitcoin-family-amid-rising-crypto-crimes/</link>
					<comments>https://coinengineer.net/blog/global-security-overhaul-by-the-bitcoin-family-amid-rising-crypto-crimes/#respond</comments>
		
		<dc:creator><![CDATA[Emre Yumlu]]></dc:creator>
		<pubDate>Sun, 08 Jun 2025 14:00:31 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Bitcoin Family]]></category>
		<category><![CDATA[Didi Taihuttu]]></category>
		<category><![CDATA[multisig]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=43940</guid>

					<description><![CDATA[<p>As interest in cryptocurrencies continues to soar, the risks surrounding them are becoming more tangible—both online and offline. Physical threats against digital asset holders are growing, forcing some to rethink how they protect their wealth. One such case is the well-known Bitcoin Family, led by Didi Taihuttu, who has taken radical new steps to secure</p>
<p>The post <a href="https://coinengineer.net/blog/global-security-overhaul-by-the-bitcoin-family-amid-rising-crypto-crimes/">Global Security Overhaul by the &#8216;Bitcoin Family&#8217; Amid Rising Crypto Crimes</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="80" data-end="458">As interest in <a href="https://coinengineer.net/blog/binance-crypto-report-defi-btc-and-etfs-take-the-spotlight/"><strong data-start="95" data-end="115">cryptocurrencies</strong> </a>continues to soar, the risks surrounding them are becoming more tangible—both online and offline. Physical threats against digital asset holders are growing, forcing some to rethink how they protect their wealth. One such case is the well-known <strong><em data-start="361" data-end="377">Bitcoin Family</em>, led by Didi Taihuttu,</strong> who has taken radical new steps to secure their holdings.</p>
<h3 data-start="460" data-end="518">Private Keys Across Continents: A New Layer of Defense</h3>
<p data-start="520" data-end="880">Known for selling all their possessions to invest in Bitcoin back in 2017, the Taihuttu family no longer trusts a single location or device for storing their crypto. Today, their private keys are <strong data-start="716" data-end="759">split and hidden across four continents</strong>. These segments are protected by a mix of <strong data-start="802" data-end="828"><a href="https://coinengineer.net/blog/rethinking-currency-from-clay-records-to-blockchain/">blockchain</a>-based tools</strong> and manually engraved, fire-resistant metal plates.</p>
<p data-start="882" data-end="1139">According to Taihuttu, the system is not only physically secure but also cryptographically enhanced. Some words in their seed phrase have been intentionally altered in a personal encryption layer, making them virtually unusable without contextual knowledge.</p>
<h3 data-start="1141" data-end="1196">Minimal Wallet Exposure, Zero Live Location Sharing</h3>
<p data-start="1198" data-end="1391">The new security protocol also minimizes what&#8217;s accessible during emergencies. “Even if someone tries to force me, they’d only get a small portion from my phone or wallet,” Taihuttu emphasizes.</p>
<p data-start="1393" data-end="1583">In addition, the family no longer shares their <strong data-start="1440" data-end="1462">real-time location</strong> on social media, a practice they abandoned after facing targeted threats from followers tracking their movements online.</p>
<h3 data-start="1585" data-end="1624">Cold Storage and Multisig Protocols</h3>
<p data-start="1626" data-end="1895">Around <strong data-start="1633" data-end="1671">65% of the family’s <a href="https://coinengineer.net/blog/new-developments-for-indias-digital-rupee-by-the-central-bank/">digital</a> assets</strong> are now stored in cold wallets, completely offline and out of reach. The remainder is kept in hot wallets for day-to-day spending and trading, safeguarded through <strong data-start="1835" data-end="1863">multisignature protocols</strong> to prevent unauthorized access.</p>
<h3 data-start="1897" data-end="1942">Surge in Crypto-Related Attacks Worldwide</h3>
<p data-start="1944" data-end="2190">Late 2024 and early 2025 saw a sharp rise in violent attacks against crypto holders, especially as asset values climbed. From <strong data-start="2070" data-end="2085">kidnappings</strong> to <strong data-start="2089" data-end="2108">armed invasions</strong>, incidents have been reported in France, Pakistan, Australia, Canada, and beyond.</p>
<p data-start="2192" data-end="2487">In one case, a UK investor was abducted and tortured by a criminal group. Another attack in Chicago involved a family being kidnapped over a $15 million ransom in crypto. A popular online streamer known as &#8220;Amouranth&#8221; was targeted during a home invasion by assailants demanding crypto transfers.</p>
<p data-start="2489" data-end="2720">In May, a harrowing scene unfolded in Paris when three masked individuals attempted to abduct the daughter and grandson of a French exchange CEO. The situation was defused only after bystanders intervened during a violent struggle.</p>
<h3 data-start="2722" data-end="2758">A New Era of Crypto Self-Defense</h3>
<p data-start="2760" data-end="3149" data-is-last-node="" data-is-only-node="">Protecting crypto assets now extends far beyond technical know-how. As Taihuttu’s approach illustrates, <strong data-start="2864" data-end="2883">physical safety</strong>, smart social media behavior, and <strong data-start="2918" data-end="2943">geographic redundancy</strong> are becoming part of the modern digital security playbook. Their philosophy sends a clear message: <strong data-start="3043" data-end="3063">decentralization</strong> should apply not only to the blockchain, but to personal security strategies as well.</p>
<hr />
<p data-start="2760" data-end="3149" data-is-last-node="" data-is-only-node=""><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/global-security-overhaul-by-the-bitcoin-family-amid-rising-crypto-crimes/">Global Security Overhaul by the &#8216;Bitcoin Family&#8217; Amid Rising Crypto Crimes</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/global-security-overhaul-by-the-bitcoin-family-amid-rising-crypto-crimes/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>BidenCash Takedown: US Seizes 145 Domains and Crypto Assets</title>
		<link>https://coinengineer.net/blog/bidencash-takedown-us-seizes-145-domains-and-crypto-assets/</link>
					<comments>https://coinengineer.net/blog/bidencash-takedown-us-seizes-145-domains-and-crypto-assets/#respond</comments>
		
		<dc:creator><![CDATA[Emre Yumlu]]></dc:creator>
		<pubDate>Thu, 05 Jun 2025 15:00:54 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bidencash]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[dark web]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[U.S]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=43834</guid>

					<description><![CDATA[<p>The United States continues its crackdown on illicit marketplaces operating on the dark web. In a recent move, authorities dismantled &#8220;BidenCash&#8221; — a notorious platform accused of trafficking in stolen credit card data and personal information. As part of a court-authorized operation announced on June 5 by the Eastern District of Virginia, US officials seized</p>
<p>The post <a href="https://coinengineer.net/blog/bidencash-takedown-us-seizes-145-domains-and-crypto-assets/">BidenCash Takedown: US Seizes 145 Domains and Crypto Assets</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="260" data-end="508"><a href="https://coinengineer.net/blog/pakistan-shares-bitcoin-reserve-plan-with-trumps-crypto-team-at-white-house/"><strong>The United States</strong> </a>continues its crackdown on illicit marketplaces operating on the <strong data-start="343" data-end="355">dark web</strong>. In a recent move, authorities dismantled &#8220;BidenCash&#8221; — a notorious platform accused of trafficking in stolen credit card data and personal information.</p>
<p data-start="510" data-end="840">As part of a court-authorized operation announced on June 5 by the Eastern District of Virginia, US officials seized <strong data-start="627" data-end="642">145 domains</strong> and confiscated <strong data-start="659" data-end="676">crypto assets</strong> tied to the platform. The targeted infrastructure and financial networks were shut down, and all seized domains now redirect to law enforcement-controlled servers.</p>
<h2 data-start="847" data-end="898">A Marketplace That Sold Millions of Stolen Cards</h2>
<p data-start="900" data-end="1127">Launched in March 2022, BidenCash rapidly grew to over 117,000 users. Over its lifespan, the marketplace reportedly facilitated the trade of <strong data-start="1041" data-end="1092">more than 15 million stolen credit card numbers</strong> and other forms of sensitive data.</p>
<p data-start="1129" data-end="1369">According to US authorities, BidenCash generated approximately <strong data-start="1192" data-end="1207">$17 million</strong> in revenue through these illegal transactions. The site also offered login credentials granting unauthorized access to systems — a major draw for cybercriminals.</p>
<p data-start="1371" data-end="1573">In a bold marketing move, the platform leaked <strong data-start="1417" data-end="1452">3.3 million credit card records</strong> for free between October 2022 and February 2023, aiming to boost visibility and attract new users in underground forums.</p>
<h2 data-start="1580" data-end="1629">Crypto Seized Alongside Digital Infrastructure</h2>
<p data-start="1631" data-end="1834">Beyond the web domains, US officials also confirmed the seizure of <strong data-start="1698" data-end="1723">cryptocurrency assets</strong> linked to BidenCash’s unlawful activity. However, the exact amount of crypto recovered has not been disclosed.</p>
<p data-start="1836" data-end="2120">The international investigation was spearheaded by the US Secret Service’s Frankfurt field office, the Cyber Investigative Section, and the FBI’s Albuquerque division. This effort is part of a larger initiative to disrupt <strong data-start="2058" data-end="2094">crypto-powered criminal networks</strong> operating across borders.</p>
<h2 data-start="2127" data-end="2177">A Pattern of Global Action Against Cybercrime</h2>
<p data-start="2179" data-end="2502">The BidenCash takedown follows a series of similar operations. In May, the multinational initiative “Operation RapTor” dismantled several darknet drug marketplaces. That coordinated effort resulted in 270 arrests across 10 countries and the seizure of assets worth $200 million, including large volumes of digital currency.</p>
<p data-start="2504" data-end="2850">Earlier in March 2024, US authorities sanctioned the operator behind &#8220;Nemesis&#8221; — a defunct dark web site that facilitated the sale of <strong data-start="2638" data-end="2647">drugs</strong>, <strong data-start="2649" data-end="2661">fake IDs</strong>, and hacking tools. Officials also blacklisted multiple <strong data-start="2718" data-end="2750">Bitcoin and Monero addresses</strong> linked to Nemesis, which had received hundreds of thousands of dollars over its period of activity.</p>
<h2 data-start="2857" data-end="2903">The Dark Web’s Crypto Economy Keeps Growing</h2>
<p data-start="2905" data-end="3180">According to blockchain analytics firms, <strong data-start="2946" data-end="2965">darknet markets</strong> brought in over <strong data-start="2982" data-end="2998">$1.7 billion</strong> in revenue in 2024, slightly up from the previous year. Russian-speaking platforms continue to dominate the space, in part due to minimal regulatory pressure from local authorities.</p>
<hr />
<p data-start="2905" data-end="3180"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/bidencash-takedown-us-seizes-145-domains-and-crypto-assets/">BidenCash Takedown: US Seizes 145 Domains and Crypto Assets</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/bidencash-takedown-us-seizes-145-domains-and-crypto-assets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Details of Stemy Coin Case, Which Was Resolved in SEC’s Favor, Are Being Revealed!</title>
		<link>https://coinengineer.net/blog/sec-scores-won-in-crypto-scam-case-after-defendant-fails-to-respond/</link>
					<comments>https://coinengineer.net/blog/sec-scores-won-in-crypto-scam-case-after-defendant-fails-to-respond/#respond</comments>
		
		<dc:creator><![CDATA[Emre Yumlu]]></dc:creator>
		<pubDate>Thu, 05 Jun 2025 13:30:25 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[case]]></category>
		<category><![CDATA[no response]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[sec]]></category>
		<category><![CDATA[stemy coin]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=43838</guid>

					<description><![CDATA[<p>The U.S. Securities and Exchange Commission (SEC) has secured a $1.1 million legal victory in a crypto fraud case after the defendant, Keith Crews, failed to appear or respond to the court. As a result, the judge issued a default judgment in favor of the regulator. The ruling, delivered on June 3 by federal judge</p>
<p>The post <a href="https://coinengineer.net/blog/sec-scores-won-in-crypto-scam-case-after-defendant-fails-to-respond/">Details of Stemy Coin Case, Which Was Resolved in SEC’s Favor, Are Being Revealed!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="264" data-end="537"><a href="https://coinengineer.net/blog/binance-stablecoin-dominance-sec-liquidity/"><strong>The U.S. Securities and Exchange Commission (SEC)</strong> </a>has secured a <strong data-start="328" data-end="358">$1.1 million legal victory</strong> in a crypto fraud case after the defendant, Keith Crews, failed to appear or respond to the court. As a result, the judge issued a <strong data-start="490" data-end="510">default judgment</strong> in favor of the regulator.</p>
<p data-start="539" data-end="792">The ruling, delivered on June 3 by federal judge Tiffany Johnson in Georgia, holds Crews accountable for more than half a million dollars in <strong data-start="680" data-end="698">unlawful gains</strong>. In addition, he must pay around $51,000 in <strong data-start="743" data-end="755">interest</strong> and a <strong data-start="762" data-end="779">civil penalty</strong> of $530,000.</p>
<p data-start="794" data-end="918">The judgment also includes a <strong data-start="823" data-end="840">permanent ban</strong> prohibiting Crews from engaging in future violations of U.S. securities laws.</p>
<h2 data-start="925" data-end="973">Exploiting Communities Through False Promises</h2>
<p data-start="975" data-end="1185">According to the SEC, Crews orchestrated a deceptive scheme using two companies — Four Square Biz and Stem Biotech — between <strong data-start="1100" data-end="1129">October 2019 and May 2021</strong>, raising approximately <strong data-start="1153" data-end="1184">$800,000 from 200 investors</strong>.</p>
<p data-start="1187" data-end="1425">He pitched “Stemy Coin,” a supposed <strong data-start="1223" data-end="1239">crypto asset</strong> that he claimed was backed by <strong data-start="1270" data-end="1294">stem cell innovation</strong> and <strong data-start="1299" data-end="1318">tangible assets</strong> such as gold. In reality, none of the promised infrastructure, technologies, or products actually existed.</p>
<p data-start="1427" data-end="1605">The campaign notably targeted <strong data-start="1457" data-end="1486">African-American networks</strong> and <strong data-start="1491" data-end="1518">faith-based communities</strong>, suggesting a deliberate strategy to exploit trusted relationships for financial gain.</p>
<h2 data-start="1612" data-end="1647">No Labs, No Partners, No Science</h2>
<p data-start="1649" data-end="1961">Despite presenting himself as connected to medical professionals and research institutions, the SEC revealed that <strong data-start="1763" data-end="1782">no partnerships</strong> or operations ever materialized. Crews allegedly fabricated stories about advanced biotech solutions and medical treatments to convince people of the legitimacy of his offerings.</p>
<p data-start="1963" data-end="2096">The companies had <strong data-start="1981" data-end="2003">no real facilities</strong>, research programs, or technical capabilities — only marketing claims that misled investors.</p>
<p data-start="2098" data-end="2270">The SEC accused him of violating multiple securities laws, including anti-fraud and registration provisions. The court found these claims to be valid and ruled accordingly.</p>
<h2 data-start="2277" data-end="2325">A Rare Win for Regulators in the Crypto Arena</h2>
<p data-start="2327" data-end="2622">While recent enforcement actions in the <strong data-start="2367" data-end="2384">crypto sector</strong> have slowed, this outcome marks a <strong data-start="2419" data-end="2438">notable success</strong> for the SEC. In an environment where regulatory clarity and enforcement have faced political and legal headwinds, this case stands out as a rare instance of decisive legal resolution.</p>
<hr />
<p data-start="2327" data-end="2622"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/sec-scores-won-in-crypto-scam-case-after-defendant-fails-to-respond/">Details of Stemy Coin Case, Which Was Resolved in SEC’s Favor, Are Being Revealed!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/sec-scores-won-in-crypto-scam-case-after-defendant-fails-to-respond/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-52.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-52.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Crypto Heist Attempt in South Korea: Russian National Arrested</title>
		<link>https://coinengineer.net/blog/crypto-heist-attempt-in-south-korea-russian-national-arrested/</link>
					<comments>https://coinengineer.net/blog/crypto-heist-attempt-in-south-korea-russian-national-arrested/#respond</comments>
		
		<dc:creator><![CDATA[Emre Yumlu]]></dc:creator>
		<pubDate>Tue, 27 May 2025 17:30:33 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[crypto robbery]]></category>
		<category><![CDATA[Interpol]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[south korea]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=43270</guid>

					<description><![CDATA[<p>A Russian national was taken into custody in Busan, South Korea, in connection with a failed crypto robbery attempt in Seoul. One of three suspects who allegedly tried to steal approximately $730,000 in cash was arrested several days after the incident. Lured with a Fake Crypto Deal According to local media reports, the incident occurred</p>
<p>The post <a href="https://coinengineer.net/blog/crypto-heist-attempt-in-south-korea-russian-national-arrested/">Crypto Heist Attempt in South Korea: Russian National Arrested</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="68" data-end="333">A <strong data-start="70" data-end="90"><a href="https://coinengineer.net/blog/is-trump-changing-his-stance-on-russia-new-sanctions-on-the-table/">Russian</a> national</strong> was taken into custody in Busan, South Korea, in connection with a failed <a href="https://coinengineer.net/blog/ledger-co-founder-balland-released/"><strong data-start="165" data-end="183">crypto robbery</strong></a> attempt in Seoul. One of three suspects who allegedly tried to steal approximately $730,000 in cash was arrested several days after the incident.</p>
<h2 data-start="335" data-end="368">Lured with a Fake Crypto Deal</h2>
<p data-start="370" data-end="804">According to local media reports, the incident occurred on May 21 at a hotel in Seoul’s Gangseo District. The suspects invited 10 Korean investors to the hotel under the pretense of a <strong data-start="554" data-end="584">cryptocurrency transaction</strong>. Two were taken to a room while the others waited in the lobby. Inside, two suspects—wearing bulletproof vests, and armed with a fake handgun and a telescopic baton—attacked the victims and tied their hands.</p>
<h2 data-start="806" data-end="854">Global Manhunt Launched for Escaped Suspects</h2>
<p data-start="856" data-end="1173">One of the victims managed to escape and alerted the authorities, forcing the suspects to flee the scene without taking any money. Police found one injured person in the lobby and discovered a variety of tools in the suspects’ room, including a <strong data-start="1101" data-end="1118">money counter</strong>, fake weapons, and equipment prepared for the robbery.</p>
<p data-start="1175" data-end="1527">Although a request was made the next day to block the suspects from leaving the country, two had already fled. South Korean police announced that a <strong data-start="1323" data-end="1340">global search</strong> was underway with <strong data-start="1359" data-end="1383"><a href="https://coinengineer.net/blog/interpol-red-notice-requested-for-libra-creator/">Interpol</a> cooperation</strong> to locate the fugitives. Meanwhile, the arrested suspect is being questioned, and prosecutors are preparing to request a detention warrant.</p>
<h2 data-start="1529" data-end="1573">Rise in Violence Across the Crypto World</h2>
<p data-start="1575" data-end="1796">This incident highlights the increasing number of violence-related crimes linked to the crypto world. Individuals conducting high-value transactions have recently become targets of kidnappings and ransom attempts.</p>
<p data-start="1798" data-end="2061">On May 13, the family of Pierre Noizat, CEO of the French crypto exchange Paymium, was the target of a similar <strong data-start="1909" data-end="1931">kidnapping attempt</strong>. Likewise, an investor in Manhattan has been accused of kidnapping and torturing an Italian man to gain access to digital assets.</p>
<p data-start="2063" data-end="2328" data-is-last-node="" data-is-only-node="">As such cases become more frequent, crypto investors and executives are turning to private security services. On May 18, security firm Infinite Risks International reported a rise in protection service requests from prominent figures in the crypto industry.</p>
<hr />
<p data-start="2063" data-end="2328" data-is-last-node="" data-is-only-node=""><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/crypto-heist-attempt-in-south-korea-russian-national-arrested/">Crypto Heist Attempt in South Korea: Russian National Arrested</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/crypto-heist-attempt-in-south-korea-russian-national-arrested/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/kore_ce-1.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/kore_ce-1.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>North Korean Hacker Tried to Infiltrate Kraken Exchange!</title>
		<link>https://coinengineer.net/blog/north-korean-hacker-tried-to-infiltrate-kraken/</link>
					<comments>https://coinengineer.net/blog/north-korean-hacker-tried-to-infiltrate-kraken/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 02 May 2025 17:30:27 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[kraken]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=41385</guid>

					<description><![CDATA[<p>According to the company’s blog post, a North Korea-linked hacker recently attempted to infiltrate Kraken’s internal systems by applying for a job. However, Kraken’s security and recruitment teams detected the attempt early and turned the process into an intelligence operation. From Recruitment to Espionage Detection at Kraken The incident began with a seemingly routine application</p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hacker-tried-to-infiltrate-kraken/">North Korean Hacker Tried to Infiltrate Kraken Exchange!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="62" data-end="360">According to the company’s <a href="https://blog.kraken.com/news/how-we-identified-a-north-korean-hacker" target="_blank" rel="noopener">blog post</a>, a <strong data-start="102" data-end="131"><a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/" target="_blank" rel="noopener">North Korea</a>-linked hacker</strong> recently attempted to infiltrate <strong data-start="165" data-end="175">Kraken</strong>’s internal systems by applying for a job. However, Kraken’s <strong data-start="236" data-end="248">security</strong> and <strong data-start="253" data-end="274">recruitment teams</strong> detected the attempt early and turned the process into an <strong data-start="333" data-end="359">intelligence operation</strong>.</p>
<h3 class="" data-start="362" data-end="415">From Recruitment to Espionage Detection at Kraken</h3>
<p class="" data-start="417" data-end="832">The incident began with a seemingly routine application for an <strong data-start="480" data-end="504">engineering position</strong>. But the candidate’s behavior quickly raised red flags. In the <strong data-start="568" data-end="587">first interview</strong>, the applicant joined under a different name than the one listed on their <strong data-start="662" data-end="672">resume</strong>, then quickly changed it. Additionally, they occasionally used different voice tones, suggesting they were being <strong data-start="786" data-end="810">coached in real time</strong> during the interview.</p>
<p class="" data-start="834" data-end="1170">Kraken had already received <strong data-start="862" data-end="897">warnings from industry partners</strong> that <strong data-start="903" data-end="933">North Korean hacker groups</strong> were actively applying for jobs at crypto companies. When one of the email addresses used by the applicant <strong data-start="1041" data-end="1073">matched a suspicious address</strong> from these warnings, Kraken’s <strong data-start="1104" data-end="1116">Red Team</strong> (penetration testing unit) launched an investigation.</p>
<p></p>
<p class="" data-start="1172" data-end="1528">Using <strong data-start="1178" data-end="1214">Open-Source Intelligence (OSINT)</strong> methods, Kraken’s team researched the applicant. They found that the <strong data-start="1284" data-end="1301">email address</strong> had been leaked in a past <strong data-start="1328" data-end="1343">data breach</strong> and was linked to <strong data-start="1362" data-end="1390">multiple fake identities</strong>. Some of these identities had even been <strong data-start="1431" data-end="1455">hired by other firms</strong>, and one of them belonged to a <strong data-start="1487" data-end="1527">foreign agent listed under sanctions</strong>.</p>
<p class="" data-start="1530" data-end="1863">The candidate was also hiding their location using a <strong data-start="1583" data-end="1590">VPN</strong> and accessing <strong data-start="1605" data-end="1628">remote Mac desktops</strong>. The <strong data-start="1634" data-end="1652">GitHub profile</strong> listed on their resume was tied to a previously exposed email. The <strong data-start="1720" data-end="1747">identification document</strong> provided appeared to be fake and likely created using <strong data-start="1802" data-end="1824">information stolen</strong> during a <strong data-start="1834" data-end="1857">2019 identity theft</strong> case.</p>
<h3 class="" data-start="1865" data-end="1890">The Hacker’s Downfall</h3>
<p class="" data-start="1892" data-end="2263">Rather than cutting off contact, Kraken advanced the applicant through the <strong data-start="1967" data-end="1985">hiring process</strong> — not to hire them, but to study their <strong data-start="2025" data-end="2036">tactics</strong>. The candidate was subjected to several <strong data-start="2077" data-end="2106">cybersecurity assessments</strong> and <strong data-start="2111" data-end="2142">identity verification tasks</strong>. The final round? A “casual” interview with <strong data-start="2187" data-end="2239">Kraken Chief Security Officer (CSO) Nick Percoco</strong> and other team members.</p>
<p class="" data-start="2265" data-end="2716">During this meeting, the applicant faced <strong data-start="2306" data-end="2342">real-time verification questions</strong>: confirming their <strong data-start="2361" data-end="2373">location</strong>, showing a <strong data-start="2385" data-end="2409">government-issued ID</strong>, and even recommending some <strong data-start="2438" data-end="2459">local restaurants</strong> in the city they claimed to live in. The hacker became visibly <strong data-start="2523" data-end="2548">nervous and flustered</strong>, unable to answer the basic questions. It was now clear: this was not a legitimate job seeker, but a <strong data-start="2650" data-end="2678">state-sponsored attacker</strong> attempting to infiltrate the company.</p>
<p class="" data-start="2718" data-end="2769">Kraken CSO <strong data-start="2729" data-end="2745">Nick Percoco</strong> commented on the event:</p>
<blockquote data-start="2771" data-end="3040">
<p class="" data-start="2773" data-end="3040"><strong data-start="2774" data-end="2798">Don’t trust, verify.</strong> That’s a core principle of the crypto world and even more critical in the digital age. <strong data-start="2886" data-end="2913">State-sponsored attacks</strong> aren’t just an American issue — they’re a <strong data-start="2956" data-end="2973">global threat</strong>. Any person or business managing value is a <strong data-start="3018" data-end="3038">potential target</strong>.</p>
</blockquote>
<p class="" data-start="2904" data-end="3110"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates</em></p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hacker-tried-to-infiltrate-kraken/">North Korean Hacker Tried to Infiltrate Kraken Exchange!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/north-korean-hacker-tried-to-infiltrate-kraken/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/Coinmukendisi-14.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/Coinmukendisi-14.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>UN Warns: Crime Syndicates Launch Their Own Stablecoins</title>
		<link>https://coinengineer.net/blog/un-warns-crime-syndicates-launch-their-own-stablecoins/</link>
					<comments>https://coinengineer.net/blog/un-warns-crime-syndicates-launch-their-own-stablecoins/#respond</comments>
		
		<dc:creator><![CDATA[Emre Yumlu]]></dc:creator>
		<pubDate>Sat, 26 Apr 2025 17:00:36 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[Organized crime networks]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[stablecoin]]></category>
		<category><![CDATA[United Nations (UN)]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40908</guid>

					<description><![CDATA[<p>Organized crime networks in Southeast Asia are taking their fraudulent operations to the next level, with cryptocurrencies at the heart of their activities. According to a new report published by the United Nations (UN), despite intensified crackdowns, these criminal organizations have expanded from Myanmar to as far as Mexico. The data reveals that Southeast Asia</p>
<p>The post <a href="https://coinengineer.net/blog/un-warns-crime-syndicates-launch-their-own-stablecoins/">UN Warns: Crime Syndicates Launch Their Own Stablecoins</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="118" data-end="455"><a href="https://coinengineer.net/blog/jack-mallers-im-not-leaving-strike-both-ventures-serve-bitcoin/"><strong>Organized crime networks</strong></a> in Southeast Asia are taking their fraudulent operations to the next level, with <strong data-start="224" data-end="244">cryptocurrencies</strong> at the heart of their activities. According to a new report published by the <strong data-start="322" data-end="345">United Nations (UN)</strong>, despite intensified crackdowns, these criminal organizations have expanded from Myanmar to as far as Mexico.</p>
<p class="" data-start="457" data-end="790">The data reveals that Southeast Asia has emerged as one of the leading hubs for some of the world’s most <strong data-start="562" data-end="597">lucrative cybercrime operations</strong>. The report highlights that cyber fraud in the region has grown faster than other types of transnational crimes due to its easy scalability and the ability to reach millions of victims online.</p>
<p class="" data-start="792" data-end="1100">In 2023 alone, it is estimated that nearly <strong data-start="835" data-end="850">$37 billion</strong> was lost to cyber scams in East and Southeast Asia, much of it linked to cryptocurrency fraud. Benedikt Hofmann, the UN’s regional representative for Southeast Asia, described these networks as “<strong data-start="1046" data-end="1071">spreading like cancer</strong>” in his comments to Reuters.</p>
<h2 data-start="1102" data-end="1147">Stablecoins Designed by Criminal Networks</h2>
<p class="" data-start="1149" data-end="1508">The semi-anonymous and borderless nature of cryptocurrencies has enabled these criminal organizations to evade government enforcement. As authorities increase pressure on known scam hubs, syndicates are shifting operations to more remote areas or migrating entirely online. Technologies like <strong data-start="1441" data-end="1453">Starlink</strong> are even being used to bypass government surveillance.</p>
<p class="" data-start="1510" data-end="1804">The report by the <strong data-start="1528" data-end="1572">United Nations Office on Drugs and Crime</strong> emphasized that these networks are not only building scam centers but are also creating illicit payment services, unauthorized cryptocurrency exchanges, encrypted communication platforms, and even their own <strong data-start="1780" data-end="1803">stablecoin projects</strong>.</p>
<p class="" data-start="1806" data-end="2020">One major player mentioned is <strong data-start="1836" data-end="1856">Huione Guarantee</strong> — recently rebranded as <strong data-start="1881" data-end="1892">Haowang</strong>. Based in Cambodia, the platform has processed <strong data-start="1940" data-end="1971">tens of billions of dollars</strong> worth of cryptocurrency transactions since 2021.</p>
<p class="" data-start="2022" data-end="2259">Expanding their operations even further, the platform has launched its own crypto exchange, trading app, online gambling platform, blockchain network, and a <strong data-start="2179" data-end="2204">USD-backed stablecoin</strong> specifically designed to dodge government regulations.</p>
<h2 data-start="2261" data-end="2287">Crypto Scams Go Global</h2>
<p class="" data-start="2289" data-end="2529">The rise of platforms like Huione Guarantee illustrates how digital assets have become critical tools for global criminal activities. These platforms provide criminals with a full suite of infrastructure, technology, and financial services.</p>
<p class="" data-start="2531" data-end="2854">The UN report stresses that crypto scams are no longer a Southeast Asian issue. Criminal collaborations are expanding into <strong data-start="2654" data-end="2671">South America</strong>, <strong data-start="2673" data-end="2691">Eastern Europe</strong>, and <strong data-start="2697" data-end="2707">Africa</strong>, fueling a global network of fraud. In the United States alone, <strong data-start="2772" data-end="2796">crypto-related scams</strong> caused over <strong data-start="2809" data-end="2825">$5.6 billion</strong> in financial losses in 2023.</p>
<p class="" data-start="2856" data-end="3160">Weak governance, high levels of corruption, and limited law enforcement capacity have made parts of Southeast Asia attractive hubs for cybercrime. Massive scam compounds have been established in countries like <strong data-start="3066" data-end="3077">Myanmar</strong>, <strong data-start="3079" data-end="3091">Cambodia</strong>, and <strong data-start="3097" data-end="3105">Laos</strong>, often using <strong data-start="3119" data-end="3135">forced labor</strong> to run these operations.</p>
<p class="" data-start="3162" data-end="3351">The UN identifies victims from over <strong data-start="3198" data-end="3214">55 countries</strong>, predominantly from Asia and Africa, who have been trafficked and forced to scam others into sending money — usually via cryptocurrency.</p>
<p class="" data-start="3353" data-end="3566">Despite ongoing shutdown efforts, criminal syndicates are rapidly adapting. The UN report notes that several new virtual asset service platforms have emerged, particularly through encrypted apps like <strong data-start="3553" data-end="3565">Telegram</strong>.</p>
<p class="" data-start="3568" data-end="3798">Finally, the UN warns that unless stronger international cooperation is achieved, the unchecked growth of these criminal networks could have <strong data-start="3709" data-end="3733">global repercussions</strong>, originating from Southeast Asia but impacting the entire world.</p>
<hr />
<p class="" data-start="3568" data-end="3798"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/un-warns-crime-syndicates-launch-their-own-stablecoins/">UN Warns: Crime Syndicates Launch Their Own Stablecoins</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/un-warns-crime-syndicates-launch-their-own-stablecoins/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Crypto Fraud Losses Drop in March</title>
		<link>https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/</link>
					<comments>https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Tue, 01 Apr 2025 11:00:50 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[1inch]]></category>
		<category><![CDATA[Abracadabra.money]]></category>
		<category><![CDATA[binance]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[ByBit]]></category>
		<category><![CDATA[CertiK]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[Phishing Attack]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[smart contract exploit]]></category>
		<category><![CDATA[wallet breach]]></category>
		<category><![CDATA[Zoth]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=39414</guid>

					<description><![CDATA[<p>Losses from crypto scams, exploits, and hacks fell to $28.8 million in March, a significant drop from February’s $1.5 billion loss following the Bybit hack. According to blockchain security firm CertiK, the most significant loss was the $13 million smart contract exploit of the Abracadabra.money decentralized lending protocol on March 25. You Might Be Interested</p>
<p>The post <a href="https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/">Crypto Fraud Losses Drop in March</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="1646" data-end="1820">Losses from <strong data-start="1658" data-end="1695">crypto scams, exploits, and hacks</strong> fell to <strong data-start="1704" data-end="1721">$28.8 million</strong> in March, a significant drop from <strong data-start="1756" data-end="1788">February’s $1.5 billion loss</strong> following the <strong data-start="1803" data-end="1812">Bybit</strong> hack.</p>
<p class="" data-start="1822" data-end="2023">According to <strong data-start="1835" data-end="1870">blockchain security firm CertiK</strong>, the most significant loss was the <strong data-start="1906" data-end="1921">$13 million</strong> smart contract exploit of the <strong data-start="1952" data-end="1973">Abracadabra.money</strong> decentralized lending protocol on <strong data-start="2008" data-end="2020">March 25</strong>.</p>
<hr />
<p data-start="2025" data-end="2081"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<h2 data-start="2025" data-end="2081">Major Code Vulnerabilities and Wallet Breaches</h2>
<ul>
<li data-start="2084" data-end="2156"><strong data-start="2084" data-end="2108">Code vulnerabilities</strong> accounted for over <strong data-start="2128" data-end="2143">$14 million</strong> in losses.</li>
<li data-start="2159" data-end="2229"><strong data-start="2159" data-end="2181">Wallet compromises</strong> resulted in over <strong data-start="2199" data-end="2213">$8 million</strong> being stolen.</li>
<li data-start="2232" data-end="2331">The <strong data-start="2236" data-end="2244">Zoth</strong> protocol suffered a <strong data-start="2265" data-end="2281">$8.4 million</strong> loss after its deployer wallet was compromised.</li>
</ul>
<p><img decoding="async" class="aligncenter wp-image-152493 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/kripto.jpg" alt="crypto" width="1056" height="1632" /></p>
<h2 data-start="2333" data-end="2368">Some Funds Were Recovered!</h2>
<p class="" data-start="2369" data-end="2608">While over <strong data-start="2380" data-end="2395">$33 million</strong> was stolen in total, decentralized exchange aggregator <strong data-start="2451" data-end="2460">1inch</strong> successfully recovered <strong data-start="2484" data-end="2517">most of the $5 million stolen</strong> in a <strong data-start="2523" data-end="2534">March 5</strong> exploit after negotiating a <strong data-start="2563" data-end="2587">bug bounty agreement</strong> with the attacker.</p>
<p class="" data-start="2610" data-end="2739">However, blockchain investigator <strong data-start="2643" data-end="2654">ZachXBT</strong> claimed that an unidentified <strong data-start="2684" data-end="2696">Coinbase</strong> user lost <strong data-start="2707" data-end="2736">400 Bitcoin ($34 million)</strong>.</p>
<p class="" data-start="2741" data-end="2887">Additionally, the <strong data-start="2759" data-end="2788">Australian Federal Police</strong> warned <strong data-start="2796" data-end="2810">130 people</strong> on <strong data-start="2814" data-end="2826">March 21</strong> about a <strong data-start="2835" data-end="2884">crypto scam impersonating exchange sender IDs</strong>.</p>
<hr />
<p data-start="2741" data-end="2887"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/">Crypto Fraud Losses Drop in March</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/hack_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/hack_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>CZ Donates 150 BNB to LIBRA Coin Scam Victims</title>
		<link>https://coinengineer.net/blog/cz-donates-150-bnb-to-libra-coin-scam-victims/</link>
					<comments>https://coinengineer.net/blog/cz-donates-150-bnb-to-libra-coin-scam-victims/#respond</comments>
		
		<dc:creator><![CDATA[Emre Yumlu]]></dc:creator>
		<pubDate>Mon, 17 Feb 2025 13:00:02 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[150 BNB donate]]></category>
		<category><![CDATA[Binance founder Changpeng Zhao (CZ)]]></category>
		<category><![CDATA[Decentralized Finance (DeFi)]]></category>
		<category><![CDATA[EnHeng]]></category>
		<category><![CDATA[LIBRA Memecoin]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=36746</guid>

					<description><![CDATA[<p>Binance founder Changpeng Zhao (CZ) donates 150 BNB (approximately $100,000) in support of LIBRA memecoin scam victims. CZ Donates 150 BNB to LIBRA Scam Victims Binance founder Changpeng Zhao (CZ) announced he would donate 150 BNB, approximately $100,000, to support the victims of the LIBRA memecoin scam. The donation came after university student EnHeng pledged</p>
<p>The post <a href="https://coinengineer.net/blog/cz-donates-150-bnb-to-libra-coin-scam-victims/">CZ Donates 150 BNB to LIBRA Coin Scam Victims</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="0" data-end="82"><strong>Binance founder Changpeng Zhao (CZ)</strong> donates <strong>150 BNB (approximately $100,000)</strong> in support of <a href="https://coinengineer.net/blog/milei-approved-libra-token-was-actually-known-in-advance/"><strong>LIBRA memecoin</strong></a> scam victims.</p>
<h2 data-start="0" data-end="82">CZ Donates 150 BNB to LIBRA Scam Victims</h2>
<p data-start="0" data-end="82"><strong>Binance founder Changpeng Zhao (CZ)</strong> announced he would <strong>donate 150 BNB, approximately $100,000,</strong> to support the victims of the LIBRA memecoin scam. The donation came after university student <strong>EnHeng</strong> <strong>pledged $50,000</strong> and started a fundraising campaign.</p>
<p data-start="0" data-end="82"><img loading="lazy" decoding="async" class="size-full wp-image-148511 aligncenter" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/02/milei.jpg" alt="milei" width="1280" height="853" /></p>
<h2 data-start="333" data-end="364">EnHeng’s Initiative Inspires CZ</h2>
<p data-start="366" data-end="718"><strong>EnHeng</strong>, a university student heavily affected by the scam, shared their $50,000 contribution and created a <strong>Binance Smart Chain (BSC)</strong> address for additional donations on X. They acknowledged the emotional and financial toll these scams have on young investors, especially students, many of whom were left financially devastated by the unexpected losses.</p>
<p data-start="720" data-end="1074"><strong>CZ</strong>, known for his philanthropic efforts in the crypto community, retweeted<strong> EnHeng’s post and donated 150 BNB</strong>. In a subsequent tweet, CZ expressed that he was moved by the student’s generosity and simply wanted to follow their lead. This gesture significantly boosted the relief efforts and encouraged others in the crypto community to contribute as well.</p>
<h2 data-start="1076" data-end="1120">The LIBRA Memecoin Scam and Its Consequences</h2>
<p data-start="1122" data-end="1523"><strong>The LIBRA memecoin</strong> scandal erupted following the endorsement of Argentine President Javier Milei, which caused the cryptocurrency’s value to spike. However, the coin’s value plummeted shortly thereafter, leading to substantial investor losses. Reports suggest that more than 40,000 investors lost a total of $4.4 billion. The collapse was sudden, and most investors were unable to recover their funds.</p>
<h2 data-start="1525" data-end="1557">Legal and Political Consequences</h2>
<p data-start="1559" data-end="1989">Following the collapse of the coin, one of<strong> LIBRA’s</strong> main figures, <strong>Hayden Mark Davis, accused President Milei of “betrayal,”</strong> alleging that he allowed panic selling by withdrawing his support. Argentine lawyers later charged Milei with “fraud,” “criminal association,” and “failure to fulfill public duties” for his involvement in the incident. These accusations have prompted a tightening of cryptocurrency regulations in Argentina.</p>
<p data-start="1991" data-end="2333">The scandal has further ignited Argentina’s political turmoil, with opposition leaders calling for <strong>Milei’s impeachment.</strong> Critics claim that his endorsement of <strong>LIBRA</strong> was part of a pump-and-dump scheme designed to manipulate the market for personal gain. Protests have erupted in major cities, demanding accountability from government officials.</p>
<p data-start="2335" data-end="2610" data-is-last-node=""><strong>CZ</strong>’s actions represent a positive turn in the ongoing crisis, providing financial relief to some of the scam victims. The crypto community has responded positively, and discussions about enhancing investor protections within<strong> decentralized finance (DeFi)</strong> are gaining momentum.</p>
<hr />
<p data-start="2335" data-end="2610" data-is-last-node=""><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/cz-donates-150-bnb-to-libra-coin-scam-victims/">CZ Donates 150 BNB to LIBRA Coin Scam Victims</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/cz-donates-150-bnb-to-libra-coin-scam-victims/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/cz_ce-1.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/cz_ce-1.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Fake Account Created in the Name of Bermuda’s Premier!</title>
		<link>https://coinengineer.net/blog/fake-account-created-in-the-name-of-bermudas-premier/</link>
					<comments>https://coinengineer.net/blog/fake-account-created-in-the-name-of-bermudas-premier/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 16 Feb 2025 14:00:07 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[argentina]]></category>
		<category><![CDATA[Bermuda]]></category>
		<category><![CDATA[BermudaNationalCoin]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[CryptoMarket]]></category>
		<category><![CDATA[DavidBurt]]></category>
		<category><![CDATA[ElonMusk]]></category>
		<category><![CDATA[fakeaccount]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[ınvestment]]></category>
		<category><![CDATA[JavierMilei]]></category>
		<category><![CDATA[LibraToken]]></category>
		<category><![CDATA[memecoin]]></category>
		<category><![CDATA[rugpull]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[socialmedia]]></category>
		<category><![CDATA[token]]></category>
		<category><![CDATA[Xplatform]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=36692</guid>

					<description><![CDATA[<p>Fraud cases in the crypto world continue to rise. Most recently, a fake X account was created in the name of Bermuda’s Premier David Burt, promoting a token called Bermuda National Coin. Users must stay vigilant against such schemes. The fake account carries a gray verification badge, which is reserved for government officials, and has</p>
<p>The post <a href="https://coinengineer.net/blog/fake-account-created-in-the-name-of-bermudas-premier/">Fake Account Created in the Name of Bermuda’s Premier!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="139" data-end="382">Fraud cases in the crypto world continue to rise. Most recently, a fake X account was created in the name of <strong data-start="248" data-end="280">Bermuda’s Premier David Burt</strong>, promoting a token called <strong data-start="307" data-end="332">Bermuda National Coin</strong>. Users must stay vigilant against such schemes.</p>
<p data-start="438" data-end="680">The fake account carries a <strong data-start="465" data-end="492">gray verification badge</strong>, which is reserved for government officials, and has only 45 posts. On the other hand, <strong data-start="580" data-end="594">David Burt</strong>’s real account has a <strong data-start="616" data-end="634">blue checkmark</strong>, <strong data-start="636" data-end="651">6,245 posts</strong>, and <strong data-start="657" data-end="677">12,200 followers</strong>.</p>
<p data-start="438" data-end="680"><img loading="lazy" decoding="async" class="aligncenter" src="https://s3.cointelegraph.com/uploads/2025-02/01950b73-32bd-7c28-b7c9-a0539d78a285" alt="bermuda" width="1034" height="456" /></p>
<h2 data-start="682" data-end="721">Premier Burt Calls Out Elon Musk!</h2>
<p data-start="723" data-end="1076">On <strong data-start="726" data-end="741">February 14</strong>, <strong data-start="743" data-end="757">David Burt</strong> discovered the fraudulent account, warned his followers, and reported the situation to <strong data-start="845" data-end="858">Elon Musk</strong> and the X management. Burt expressed his frustration, stating, “People are getting scammed due to the lack of controls on this app. Please fix this.” However, despite the complaints, the fake account remains active.</p>
<hr />
<p data-start="1078" data-end="1144"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<h2 data-start="1078" data-end="1144"><img loading="lazy" decoding="async" class="aligncenter" src="https://s3.cointelegraph.com/uploads/2025-02/01950b74-c20b-7052-ae60-667411c49ece" alt="bermuda" width="1198" height="942" /></h2>
<h2 data-start="1078" data-end="1144">Political Figures Are Becoming Targets of Memecoin Scams</h2>
<p data-start="1146" data-end="1505">This incident closely resembles a recent case involving <strong data-start="1202" data-end="1238">Argentine President Javier Milei</strong>. Milei endorsed a token project called <strong data-start="1278" data-end="1298">Viva La Libertad</strong> in an X post. However, the token soon <strong data-start="1337" data-end="1362">lost 95% of its value</strong>, leading to <strong data-start="1375" data-end="1409">a $107 million scam allegation</strong>. Following the controversy, Milei deleted his post and denied any involvement in the project.</p>
<p data-start="1507" data-end="1672">As fraudulent token projects linked to political figures continue to emerge, crypto investors must exercise extreme caution to avoid falling victim to these scams.</p>
<hr />
<p data-start="1507" data-end="1672"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/fake-account-created-in-the-name-of-bermudas-premier/">Fake Account Created in the Name of Bermuda’s Premier!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/fake-account-created-in-the-name-of-bermudas-premier/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Job-Interview-Disguised-as-a-Crypto-Scam-Dont-Fall-Into-the-Trap.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Job-Interview-Disguised-as-a-Crypto-Scam-Dont-Fall-Into-the-Trap.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
