Cryptocurrency ‘mixers’ see record transactions from sanctioned actors

Mixers aren’t solely used by criminals, but they are extremely popular with them.

The post Cryptocurrency ‘mixers’ see record transactions from sanctioned actors appeared first on CyberScoop.

Continue reading Cryptocurrency ‘mixers’ see record transactions from sanctioned actors

FBI takes down dark web marketplace for U.S. citizen personal data

The crime operation may have been connected to Joker’s Stash.

The post FBI takes down dark web marketplace for U.S. citizen personal data appeared first on CyberScoop.

Continue reading FBI takes down dark web marketplace for U.S. citizen personal data

Cryptocurrency regulators are scrambling to catch up with hackers, who are swiping billions

But who’s in charge has become a game of hot potato.

The post Cryptocurrency regulators are scrambling to catch up with hackers, who are swiping billions appeared first on CyberScoop.

Continue reading Cryptocurrency regulators are scrambling to catch up with hackers, who are swiping billions

In a first, Treasury Department sanctions major cryptocurrency mining firm

“By operating vast server farms that sell virtual currency mining capacity internationally, these companies help Russia monetize its natural resources,” the Treasury Department said in a statement.

The post In a first, Treasury Department sanctions major cryptocurrency mining firm appeared first on CyberScoop.

Continue reading In a first, Treasury Department sanctions major cryptocurrency mining firm

Treasury updates Lazarus Group sanctions with digital currency address linked to Ronin Bridge hack

The address received $600 million in Ethereum and other digital currency during the March attack, crypto-tracking company Chainalysis said.

The post Treasury updates Lazarus Group sanctions with digital currency address linked to Ronin Bridge hack appeared first on CyberScoop.

Continue reading Treasury updates Lazarus Group sanctions with digital currency address linked to Ronin Bridge hack

A practical reason why crypto might not work for large-scale sanctions evasion

According to crypto-tracking company Chainalysis, the markets probably couldn’t handle it without prices tanking.

The post A practical reason why crypto might not work for large-scale sanctions evasion appeared first on CyberScoop.

Continue reading A practical reason why crypto might not work for large-scale sanctions evasion

Conti Ransomware Group Diaries, Part IV: Cryptocrime

Three stories here last week pored over several years’ worth of internal chat records stolen from the Conti ransomware group, the most profitable ransomware gang in operation today. The candid messages revealed how Conti evaded law enforcement and intelligence agencies, what it was like on a typical day at the Conti office, and how Conti secured the digital weaponry used in their attacks. This final post on the Conti conversations explores different schemes that Conti pursued to invest in and steal cryptocurrencies. Continue reading Conti Ransomware Group Diaries, Part IV: Cryptocrime

Conti Ransomware Group Diaries, Part IV: Cryptocrime

Three stories here last week pored over several years’ worth of internal chat records stolen from the Conti ransomware group, the most profitable ransomware gang in operation today. The candid messages revealed how Conti evaded law enforcement and intelligence agencies, what it was like on a typical day at the Conti office, and how Conti secured the digital weaponry used in their attacks. This final post on the Conti conversations explores different schemes that Conti pursued to invest in and steal cryptocurrencies. Continue reading Conti Ransomware Group Diaries, Part IV: Cryptocrime

Conti Ransomware Group Diaries, Part III: Weaponry

Part I of this series examined newly-leaked internal chats from the Conti ransomware group, and how the crime gang dealt with its own internal breaches. Part II explored what it’s like to be an employee of Conti’s sprawling organization. Today’s Part III looks at how Conti abused a panoply of popular commercial security services to undermine the security of their targets, as well as how the team’s leaders strategized for the upper hand in ransom negotiations with victims. Continue reading Conti Ransomware Group Diaries, Part III: Weaponry