Click “page.Sign up” to agree to Cointime’s <a class="underline" href="#term-of-service">Terms of Service</a> and acknowledge that Cointime’s a class="underline" href="#privacy-policy">Privacy Policy</a> applies to you.
Once a targeted banking or cryptocurrency app is opened, a fake overlay launches over the top and mutes the sound while the hackers take control of the device.
Coinbase’s legal chief hailed the incoming SEC chair’s vow to prioritize crypto clarity, end debanking, and foster innovation as a long-awaited shift benefiting U.S. markets.
SEC commissioner laid out a bold seven-point plan urging Congress to slash red tape, empower existing agencies, and protect peer-to-peer crypto from regulatory overreach.
Cyvers Alerts officials stated that suspicious transactions related to Suji Yan, the founder of the decentralized social protocol Mask Network, were monitored. A suspicious address received nearly $4 million in digital assets, the stolen assets were immediately exchanged for ETH, and transferred to six different addresses.
According to on-chain analyst Yu Jin's monitoring, in the past 24 hours, the Bybit hacker continued to wash away 71,000 ETH (170 million US dollars). From the afternoon of the 22nd until now, 4 and a half days, 499,000 ETH stolen has been washed away 206,000 ETH. An average of 45,000 ETH per day. Now there are still 292,000 ETH (685 million US dollars) left in the hacker's address.
Beijing Business Daily reported that at a press conference held by the Ministry of Public Security on January 10, it was announced that as of the end of 2024, more than 53,000 Chinese criminal suspects involved in telecommunications fraud in Myanmar's northern region have been arrested, and the "Four Major Families" criminal groups in Myanmar's northern region have been successfully destroyed. The Ministry of Public Security pointed out that although the crackdown has achieved significant results, the crime situation is still severe. Fraudulent groups are constantly upgrading their criminal tools using new technologies such as blockchain, virtual currency, and AI intelligence. These groups are well-organized and engage in illegal activities such as cross-border cooperation in app development, traffic diversion and promotion, and money laundering. Fraudsters tailor their scripts to target victims of different ages, professions, and educational backgrounds, and the victims are widespread. Although the telecommunications fraud park near the Chinese border in Myanmar's northern region has been cleared, there are still many fraudulent dens operating overseas under the guise of "technology parks" and "development zones".
Hong Kong police recently busted a virtual currency fraud group that used deepfake technology to lure others into investing through social media platforms, involving about 34 million yuan. Hong Kong police's commercial crime department arrested 31 people between the ages of 20 and 34 last week in two office buildings in Kowloon Bay, some of whom claimed to be students or unemployed, involved in the same fraud group, and seized their pre-set "scripts".
according to SlowMist's monitoring, the official X account of Solv Protocol has been hacked and false information has been released. Please stay vigilant and beware of risks.
All Comments