市值: $3.3108T -0.840%
成交额(24h): $101.8321B 28.100%
  • 市值: $3.3108T -0.840%
  • 成交额(24h): $101.8321B 28.100%
  • 恐惧与贪婪指数:
  • 市值: $3.3108T -0.840%
加密货币
话题
百科
资讯
加密话题
视频
热门新闻
加密货币
话题
百科
资讯
加密话题
视频
bitcoin
bitcoin

$107167.915651 USD

-1.23%

ethereum
ethereum

$2484.735224 USD

-0.65%

tether
tether

$1.000551 USD

0.03%

xrp
xrp

$2.227485 USD

1.25%

bnb
bnb

$657.234657 USD

0.38%

solana
solana

$153.359085 USD

0.76%

usd-coin
usd-coin

$1.000234 USD

0.03%

tron
tron

$0.279694 USD

1.12%

dogecoin
dogecoin

$0.164283 USD

-2.04%

cardano
cardano

$0.566559 USD

-0.46%

hyperliquid
hyperliquid

$39.355826 USD

-3.77%

bitcoin-cash
bitcoin-cash

$520.939018 USD

3.97%

sui
sui

$2.773602 USD

-2.77%

chainlink
chainlink

$13.247285 USD

-2.04%

unus-sed-leo
unus-sed-leo

$9.098882 USD

-0.71%

加密货币新闻

司法部破裂:暴露了朝鲜的加密盗窃环

2025/07/01 19:55

司法部正在加大努力,以打击正在窃取加密货币为政权资助的朝鲜网络犯罪分子。这是最新的。

司法部破裂:暴露了朝鲜的加密盗窃环

Hold onto your hats, folks! The DOJ is on the case, cracking down on North Korea's sneaky crypto heists. These cyber crooks are using every trick in the book to steal digital dough, and Uncle Sam isn't having it.

抓住你的帽子,伙计们!司法部正在案件中,打击了朝鲜的偷偷摸摸的加密抢劫。这些网络骗子正在使用书中的所有技巧来窃取数字面团,而Sam叔叔没有。

The Scheme: Fake IDs and Stolen Crypto

该方案:假ID和被盗的加密货币

So, here's the deal: North Korean nationals are posing as remote IT workers, infiltrating blockchain companies, and draining crypto wallets faster than you can say 'Bitcoin.' They're using fake identities and stolen personal info to land these gigs, all to fund the North Korean regime.

因此,这就是交易:朝鲜国民作为远程IT工人,渗透区块链公司的摆姿势,并耗尽加密钱包的速度比您说的“比特币”更快。他们使用虚假身份并偷走了个人信息来召集这些演出,所有这些都为朝鲜政权提供资金。

Take the case of Kim Kwang Jin, Kang Tae Bok, Jong Pong Ju, and Chang Nam Il. These guys allegedly stole nearly $1 million in crypto from American and international blockchain companies. They got jobs at an Atlanta-based blockchain startup and a Serbian virtual token company, then used their access to siphon off the funds. Jong swiped $175,000 in February 2022, and Kim followed up with another $740,000 a month later.

以金·金·金(Kim Kwang Jin),Kang Tae Bok,Jong Pong Ju和Chang Nam Il为例。据称,这些家伙从美国和国际区块链公司那里偷走了将近100万美元的加密货币。他们在亚特兰大的一家区块链创业公司和一家塞尔维亚虚拟代币公司找到了工作,然后利用他们从资金中获得Siphon的访问权限。钟在2022年2月刷了175,000美元,而金在一个月后又又赚了74万美元。

Laundering the Loot

洗牌

But wait, it gets better. The stolen funds were laundered through crypto mixers and sent through exchange accounts opened with fake Malaysian IDs. These guys are practically writing the playbook for cybercrime.

但是等等,它会变得更好。被盗的资金通过加密混音器洗钱,并通过带有假马来西亚ID的交换帐户发送。这些家伙实际上是在编写网络犯罪的剧本。

Microsoft Steps In

Microsoft步骤

It's not just the DOJ fighting back. Microsoft has suspended 3,000 consumer-grade Outlook and Hotmail accounts linked to suspected North Korean IT worker schemes. They're even alerting customers to these incidents, tracking the activity under names like Jasper Sleet and Moonstone Sleet.

不仅是司法部战斗。微软已暂停了3,000个消费级展望和与可疑朝鲜IT工人计划相关的Hotmail帐户。他们甚至会警告顾客发生这些事件,以贾斯珀雨夹雪和月球雨夹雪之类的名字跟踪活动。

The DOJ's Response: DPRK RevGen

司法部的回答:dprk revgen

The DOJ isn't sitting idly by. They've launched the DPRK RevGen: Domestic Enabler Initiative, targeting North Korea’s illicit revenue streams. Federal agents have conducted raids across 16 states, seizing financial accounts, fraudulent websites, and computers used by North Korean operatives posing as US citizens. They were funneling millions to Pyongyang and even accessing sensitive military data. Yikes!

司法部并没有闲着。他们发起了DPRK Revgen:国内促进倡议,针对朝鲜的非法收入来源。联邦代理商在16个州进行了突袭,夺取了朝鲜特工使用的美国公民的财务账户,欺诈性网站和计算机。他们正在向平壤汇集数百万美元,甚至访问敏感的军事数据。是的!

AI to the Rescue (for the Bad Guys)

AI进行营救(对于坏人)

And get this: these fraudsters are using AI to polish fake resumes, manipulate images, and even experiment with voice-changing software. Talk about high-tech crime!

并得到这个:这些欺诈者正在使用AI来抛光伪造简历,操纵图像,甚至可以尝试改变语音的软件。谈论高科技犯罪!

The Big Picture

大局

This isn't just about a few bad apples. It's a systemic effort by North Korea to exploit the crypto industry for financial gain. These IT contractors sometimes act as front-line operators for state-sponsored hacking units like the Lazarus Group, which was behind the $600 million Ronin Bridge hack in 2022.

这不仅仅是一些坏苹果。这是朝鲜的系统性努力,以利用加密货币行业以获取经济利益。这些IT承包商有时充当国家赞助的黑客黑客部队等前线运营商,例如Lazarus Group,该部门落后于2022年6亿美元的Ronin Bridge Hack。

What Can You Do?

你能做什么?

Microsoft has published a lengthy list of tips for companies to investigate, monitor, and remediate these threats. The key is to be vigilant and implement robust verification processes.

微软已经发布了一份冗长的技巧清单,以调查,监视和补救这些威胁。关键是要保持警惕并实施强大的验证过程。

The Takeaway

外卖

The DOJ is sending a clear message: cybercrime won't be tolerated. As FBI special agent Paul Brown put it, "North Korean operatives used false identities to infiltrate companies and steal digital assets to fund their regime. The FBI is committed to exposing these threats.”

司法部正在发送明确的消息:网络犯罪将无法容忍。正如联邦调查局特工保罗·布朗(Paul Brown)所说:“朝鲜特工使用虚假身份渗透公司并窃取数字资产来资助其政权。联邦调查局致力于暴露这些威胁。”

So, stay sharp, folks! Keep an eye on your crypto wallets, and let's hope the DOJ continues to keep these cyber crooks on their toes. After all, nobody wants their digital treasures funding nefarious activities. Until next time, stay safe and keep your crypto locked down!

所以,保持敏锐,伙计们!请密切关注您的加密钱包,并希望司法部能继续将这些网络骗子保持在脚趾上。毕竟,没有人希望他们的数字宝藏为邪恶的活动提供资金。直到下一次,请保持安全并保持加密货币锁定!

免责声明:info@kdj.com

所提供的信息并非交易建议。根据本文提供的信息进行的任何投资,kdj.com不承担任何责任。加密货币具有高波动性,强烈建议您深入研究后,谨慎投资!

如您认为本网站上使用的内容侵犯了您的版权,请立即联系我们(info@kdj.com),我们将及时删除。

2025年07月02日 发表的其他文章