Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

[contact-form-7 id="dd1f6aa" title="Newsletter"]
What's Hot

Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses

August 15, 2025

A new way to test how well AI systems classify text | MIT News

August 15, 2025

Pebble’s smartwatch is back: Pebble Time 2 specs revealed

August 15, 2025
Facebook X (Twitter) Instagram
Facebook Mastodon Bluesky Reddit
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
Home»Cyber Security»US charges 12 more suspects linked to $230 million crypto theft
Cyber Security

US charges 12 more suspects linked to $230 million crypto theft

MichaBy MichaMay 16, 2025No Comments4 Mins Read
US charges 12 more suspects linked to 0 million crypto theft


Recent Charges in Major Cryptocurrency Theft Case

The cyber landscape continues to evolve with radical implications for security, especially in cryptocurrency. This article delves into the recent RICO conspiracy charges against multiple suspects linked to a staggering $230 million cryptocurrency theft. With increasing cyber threats and sophisticated methods of laundering stolen assets, the stakes in the world of cyber security have never been higher.

Overview of the Cryptocurrency Theft

Twelve more suspects have been charged in a RICO conspiracy for their alleged involvement in stealing and laundering over $230 million in cryptocurrency through various illegal means, including crypto exchanges and mixing services.

Key Suspects Arrested

Two individuals tied to this scheme, Malone Lam (20) and Jeandiel Serrano (21), were arrested in September 2024. Known by their online aliases, these suspects allegedly accessed victims’ cryptocurrency accounts unlawfully, transferring assets to wallets they controlled.

The Attack Mechanism

According to legal documents, Lam, Serrano, and their accomplices executed an August 18 attack, stealing over 4,100 Bitcoin from a victim in Washington, D.C. Investigators revealed a complex scheme involving social engineering tactics. They impersonated customer support representatives from Google and Gemini to deceive victims.

By posing as Gemini support staff, they convinced victims to reset their two-factor authentication (2FA) settings and share their screens via AnyDesk. This allowed them unwarranted access to private keys essential for stealing cryptocurrency funds.

The Complexity of Cyber Laundering

Funds Distribution and Laundering Techniques

Research led by crypto fraud investigator ZachXBT uncovered that more than $243 million stolen was quickly distributed across multiple accounts and wallets, utilizing various cryptocurrencies such as Bitcoin, Litecoin, Ether, and Monero. They used sophisticated laundering tactics to obscure the origins of the stolen funds.

The suspects employed crypto mixers, pass-through wallets, and virtual private networks (VPNs) to maintain anonymity. However, their attempts at evasion were flawed as some links back to the original thefts were established.

Financial Misdeeds and Lavish Lifestyles

Spending Spree Funded by Stolen Crypto

The investigation revealed that the laundered cryptocurrency was not just used for everyday expenses but financed a lavish lifestyle that included luxury cars, high-end watches, and exotic travels. According to prosecutors in the U.S. Department of Justice:

  • Nightclub expenses reached up to $500,000 per evening.
  • Exquisite handbags valued in tens of thousands were given away at exclusive parties.
  • Luxury watches ranged between $100,000 to $500,000.
  • Expensive rental properties in hotspots like Los Angeles, Miami, and the Hamptons were also funded by these stolen assets.

Additionally, members of this cybercriminal enterprise held various roles, including hackers, organizers, and money launderers. Their diverse skill sets played a vital role in orchestrating this complex scheme.

The Ongoing Fight Against Cyber Crime

The rise of cyber crime, particularly in the realm of cryptocurrencies, calls for increased vigilance and improved cybersecurity measures. Individuals and organizations must employ robust security practices, including, but not limited to:

  • Implementing advanced multi-factor authentication (MFA) to enhance account security.
  • Regularly updating software and security protocols to combat emerging threats.
  • Educating employees and stakeholders regarding social engineering tactics used by cybercriminals.

FAQ

Question 1: What are the primary tactics used by cybercriminals in cryptocurrency theft?

Cybercriminals often use social engineering tactics, like impersonating customer support, to gain unauthorized access to accounts. They commonly exploit weaknesses in two-factor authentication and remote desktop applications.

Question 2: How can individuals safeguard their cryptocurrency holdings?

Individuals can improve security by using strong, unique passwords, enabling multi-factor authentication, and using hardware wallets for storing significant holdings instead of software-based wallets.

Question 3: What is the role of cryptocurrency mixers in laundering activities?

Cryptocurrency mixers obscure the source of funds by blending them with others, complicating tracking efforts by law enforcement. While they can enhance privacy, they are often utilized in illegal activities, including money laundering.

As cyber threats continue to proliferate, it is crucial for all digital asset holders to stay informed and proactive in protecting their assets from future cyber attacks.



Read the original article

0 Like this
charges Crypto linked million suspects Theft
Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
Previous ArticleWrike Review: Productivity, Workflows, and Alternatives
Next Article AMD Ryzen AI Max+ “Strix Halo” Delivers Best Performance On Linux Over Windows 11 – Even With Gaming

Related Posts

Cyber Security

Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses

August 15, 2025
Cyber Security

Over $300 million in cybercrime crypto seized in anti-fraud effort

August 15, 2025
Cyber Security

Teenage Hacker Stole $243M In Bitcoin. How It Happened.

August 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Andy’s Tech

April 19, 20259 Views
Stay In Touch
  • Facebook
  • Mastodon
  • Bluesky
  • Reddit

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

About Us

Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

Most Popular

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Subscribe to Updates

Facebook Mastodon Bluesky Reddit
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 ioupdate. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.