Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    AI Agents Now Write Code in Parallel: OpenAI Introduces Codex, a Cloud-Based Coding Agent Inside ChatGPT

    May 16, 2025

    Linux Boot Process? Best Geeks Know It!

    May 16, 2025

    Microsoft’s Surface lineup reportedly losing another of its most interesting designs

    May 16, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»US charges 12 more suspects linked to $230 million crypto theft
    Cyber Security

    US charges 12 more suspects linked to $230 million crypto theft

    MichaBy MichaMay 16, 2025No Comments4 Mins Read
    US charges 12 more suspects linked to 0 million crypto theft


    Recent Charges in Major Cryptocurrency Theft Case

    The cyber landscape continues to evolve with radical implications for security, especially in cryptocurrency. This article delves into the recent RICO conspiracy charges against multiple suspects linked to a staggering $230 million cryptocurrency theft. With increasing cyber threats and sophisticated methods of laundering stolen assets, the stakes in the world of cyber security have never been higher.

    Overview of the Cryptocurrency Theft

    Twelve more suspects have been charged in a RICO conspiracy for their alleged involvement in stealing and laundering over $230 million in cryptocurrency through various illegal means, including crypto exchanges and mixing services.

    Key Suspects Arrested

    Two individuals tied to this scheme, Malone Lam (20) and Jeandiel Serrano (21), were arrested in September 2024. Known by their online aliases, these suspects allegedly accessed victims’ cryptocurrency accounts unlawfully, transferring assets to wallets they controlled.

    The Attack Mechanism

    According to legal documents, Lam, Serrano, and their accomplices executed an August 18 attack, stealing over 4,100 Bitcoin from a victim in Washington, D.C. Investigators revealed a complex scheme involving social engineering tactics. They impersonated customer support representatives from Google and Gemini to deceive victims.

    By posing as Gemini support staff, they convinced victims to reset their two-factor authentication (2FA) settings and share their screens via AnyDesk. This allowed them unwarranted access to private keys essential for stealing cryptocurrency funds.

    The Complexity of Cyber Laundering

    Funds Distribution and Laundering Techniques

    Research led by crypto fraud investigator ZachXBT uncovered that more than $243 million stolen was quickly distributed across multiple accounts and wallets, utilizing various cryptocurrencies such as Bitcoin, Litecoin, Ether, and Monero. They used sophisticated laundering tactics to obscure the origins of the stolen funds.

    The suspects employed crypto mixers, pass-through wallets, and virtual private networks (VPNs) to maintain anonymity. However, their attempts at evasion were flawed as some links back to the original thefts were established.

    Financial Misdeeds and Lavish Lifestyles

    Spending Spree Funded by Stolen Crypto

    The investigation revealed that the laundered cryptocurrency was not just used for everyday expenses but financed a lavish lifestyle that included luxury cars, high-end watches, and exotic travels. According to prosecutors in the U.S. Department of Justice:

    • Nightclub expenses reached up to $500,000 per evening.
    • Exquisite handbags valued in tens of thousands were given away at exclusive parties.
    • Luxury watches ranged between $100,000 to $500,000.
    • Expensive rental properties in hotspots like Los Angeles, Miami, and the Hamptons were also funded by these stolen assets.

    Additionally, members of this cybercriminal enterprise held various roles, including hackers, organizers, and money launderers. Their diverse skill sets played a vital role in orchestrating this complex scheme.

    The Ongoing Fight Against Cyber Crime

    The rise of cyber crime, particularly in the realm of cryptocurrencies, calls for increased vigilance and improved cybersecurity measures. Individuals and organizations must employ robust security practices, including, but not limited to:

    • Implementing advanced multi-factor authentication (MFA) to enhance account security.
    • Regularly updating software and security protocols to combat emerging threats.
    • Educating employees and stakeholders regarding social engineering tactics used by cybercriminals.

    FAQ

    Question 1: What are the primary tactics used by cybercriminals in cryptocurrency theft?

    Cybercriminals often use social engineering tactics, like impersonating customer support, to gain unauthorized access to accounts. They commonly exploit weaknesses in two-factor authentication and remote desktop applications.

    Question 2: How can individuals safeguard their cryptocurrency holdings?

    Individuals can improve security by using strong, unique passwords, enabling multi-factor authentication, and using hardware wallets for storing significant holdings instead of software-based wallets.

    Question 3: What is the role of cryptocurrency mixers in laundering activities?

    Cryptocurrency mixers obscure the source of funds by blending them with others, complicating tracking efforts by law enforcement. While they can enhance privacy, they are often utilized in illegal activities, including money laundering.

    As cyber threats continue to proliferate, it is crucial for all digital asset holders to stay informed and proactive in protecting their assets from future cyber attacks.



    Read the original article

    0 Like this
    charges Crypto linked million suspects Theft
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleWrike Review: Productivity, Workflows, and Alternatives
    Next Article AMD Ryzen AI Max+ “Strix Halo” Delivers Best Performance On Linux Over Windows 11 – Even With Gaming

    Related Posts

    Cyber Security

    Where To Look For The Next Cybersecurity Unicorn

    May 16, 2025
    Cyber Security

    Top 10 Best Practices for Effective Data Protection

    May 16, 2025
    Cyber Security

    Windows 10 KB5058379 update triggers BitLocker recovery on some devices

    May 16, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.