antoineblau3824, Author at The News Max https://www.thenewsmax.co/author/antoineblau3824/ My WordPress Blog Sun, 07 Jan 2024 00:04:25 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.2 https://www.thenewsmax.co/wp-content/uploads/2022/11/cropped-NMAX-32x32.png antoineblau3824, Author at The News Max https://www.thenewsmax.co/author/antoineblau3824/ 32 32 Inside busted illegal $220million darknet data centre https://www.thenewsmax.co/inside-busted-illegal-220million-darknet-data-centre-9/ Sun, 07 Jan 2024 00:04:25 +0000 https://www.thenewsmax.co/?p=27103 Footage has emerged of the inside of a five-storey abandoned underground NATO bunker built with 31inch thick concrete walls in Germany allegedly converted by criminal gangs into a high tech data centre to host darknet market websites.  An Australian man was arrested on Monday accused of running a $220million illegal darkweb marketplace – called the biggest [...]

The post Inside busted illegal $220million darknet data centre appeared first on The News Max.

]]>
Background with Tomatoes and Cucumbers

Footage has emerged of the inside of a five-storey abandoned underground NATO bunker built with 31inch thick concrete walls in Germany allegedly converted by criminal gangs into a high tech data centre to host darknet market websites. 

An Australian man was arrested on Monday accused of running a $220million illegal darkweb marketplace – called the biggest in the world and ‘ for criminals’ – after ha was tracked following the bunker’s discovery. 

The joint investigation by Australian Federal Police, Scotland Yard, the , Europol, and German authorities, among others, arrested the man, 34, as he allegedly tried flee across the Danish border into . 

The man, known only as Julian K, is the alleged operator of DarkMarket and has been detained by German investigators.

The 5,000sq m former NATO bunker located in south-western Germany (pictured) was built with 31inch thick concrete walls and was converted into a data facility called CyberBunker to host darknet websites after being bought in 2012

The 5,000sq m former NATO bunker located in south-western Germany (pictured) was built with 31inch thick concrete walls and was converted into a data facility called CyberBunker to host darknet market websites after being bought in 2012 

A night-vision aerial view of the aboveground portion of the bunker containing a gatehouse, office, helipad and entrance building (pictured) which descends another four levels below the surface

A night-vision aerial view of the aboveground portion of the bunker containing a gatehouse, office, darkmarket list helipad and entrance building (pictured) which descends another four levels below the surface 

A screenshot of the illegal website allegedly run by the arrested Australian man and temporarily hosted on CyberBunker which displays drugs for sale (pictured)

A screenshot of the illegal website allegedly run by the arrested Australian man and temporarily hosted on CyberBunker which displays drugs for sale (pictured) 

German police officers walk through the gate at the perimeter of the former Cold War bunker (pictured) converted into an illegal data centre after it was raided in 2019

German police officers walk through the gate at the perimeter of the former Cold War bunker (pictured) converted into an illegal data centre after it was raided in 2019 

darkmarket 2024 was shut down on Monday and its new servers, located in Ukraine and Moldova after relocating from the bunker, were taken off the internet, prosecutors in the city of Koblenz said.

‘Until its closure, DarkMarket was probably the largest marketplace worldwide on the darknet market, with almost 500,000 users and more than 2400 sellers,’ prosecutors said. 

More than 320,000 transactions were conducted via the website including the sale of drugs, counterfeit money, stolen or falsified credit cards, anonymous SIM cards and malware.

The transactions were reportedly worth a total of 4,650 bitcoin and 12,800 monero – two cryptocurrencies – for an equivalent sum of more than $221million. 

The servers will be forensically examined by authorities to uncover information about the website’s operations and criminal network. 

The solid concrete bunker (pictured) was built to withstand a nuclear blast is located in the south-western German town of Traben-Trarbach

The solid concrete bunker (pictured) was built to withstand a nuclear blast is located in the south-western German town of Traben-Trarbach 

One of the entrances tot he bunker (pictured)

Another of the entrances to the bunker (pictured

Two of the entrances to the disused bunker (pictured) which was raided by police in 2019 after being bought by a private foundation based in Denmark in 2012 

The accused man has already fronted a German court and been denied bail – to be transferred to a German prison in the next few days. 

He has reportedly refused to speak to investigators or court officials. 

German prosecutors said the man was trying to flee Denmark into Germany when arrested and was travelling through Europe either on holiday or conducting business for the illegal website. 

They said the investigation around DarkMarket originated after the discovery of the data processing centre run by criminals in the 5,000sqm former unused bunker in south-west Germany. 

The discovery of the illegal data centre in the bunker led to the arrest of multiple people accused of being part of a criminal network and being an accessory to hundreds of thousands of illegal transactions. Some went on trial in October (pictured)

The discovery of the illegal data centre in the bunker led to the arrest of multiple people accused of being part of a criminal network and being an accessory to hundreds of thousands of illegal transactions.

Some went on trial in October (pictured) 

The data facility hosted illegal websites, which included DarkMarket temporarily, and was shut down in 2019. 

The building, constructed by the West-German military, in the mid-1970s descended five-storeys below the surface and was built with 31inch thick concrete walls to withstand a nuclear blast. 

A meteorological division of the military used the facility after the Cold War until 2012 to forecast weather patterns where German soldiers were deployed. 

The building was sold to a foundation based in Denmark in 2012 after officials could find no other buyers for the vacant facility. 

A number of people were arrested after the discovery of the data centre – accused of being part of a criminal network and dark web marketplaces being accessories to hundreds of thousands of illegal transactions involving prohibited material such as drugs and hacking tools. 

Some already went on trial in October. 

The darkweb was originally developed for the United States military but has been overrun by criminals because they can conceal their identity on the platform. 

Server rows constructed in the bunker which is made of solid concrete and climate controlled (pictured). The data centre was dismantled after the raid and multiple people linked to the centre were put on trial

Server rows constructed in the bunker which is made of solid concrete and climate controlled (pictured).

The data centre was dismantled after the raid and multiple people linked to the centre were put on trial 

The post Inside busted illegal $220million darknet data centre appeared first on The News Max.

]]>
One-third of the people reading this are thieves https://www.thenewsmax.co/one-third-of-the-people-reading-this-are-thieves-3/ Sat, 06 Jan 2024 23:04:15 +0000 https://www.thenewsmax.co/?p=27058 id=”article-body” class=”row” section=”article-body” data-component=”trackCWV”> At least, darkmarket that’s what a . Why? Because 36.4% of the 1.66 million computers survey had LimeWire, a popular peer-to-peer (P2P) program installed. Guilty by association? I have LimeWire installed on my Mac. This doesn’t make me a thief. In fact, I’ve bought a wide range of music through iTunes [...]

The post One-third of the people reading this are thieves appeared first on The News Max.

]]>
id=”article-body” class=”row” section=”article-body” data-component=”trackCWV”>

At least, darkmarket that’s what a . Why? Because 36.4% of the 1.66 million computers survey had LimeWire, a popular peer-to-peer (P2P) program installed. Guilty by association?

I have LimeWire installed on my Mac. This doesn’t make me a thief. In fact, I’ve bought a wide range of music through iTunes over the past year. I think I’ve downloaded one or two songs and a few goal compilations using LimeWire in the past year when I couldn’t find them on iTunes. The songs in question – by Led Zeppelin – I ended up buying (again, as I’d already bought them once or twice on CD and cassette tape) when they became available on iTunes.

So, 99.999% of the music I’ve listened to in the past year was happily bought through legitimate means. .001% was not. At least, not originally. Am I a thief? I suppose so. But not by any devious plan. I imagine that I’m not alone in how I consume music.

But maybe as a 30-something geezer, darknet market lists I’m atypical. Maybe everyone does want to steal music, as the music industry seems to believe. If this is the case, , dark web darknet market urls charging more per song does not sound like a winning resolution to the problem:

Clearly, the so-called “darknet market” remains far and away the world’s leading provider of online media content, drowning legit download services in a flood of “free.” This data also should give the major labels pause in their ongoing attempts to convince Apple that $0.99 per song is way too cheap.

The music industry . It resisted the digital urge for so long that it helped to push people to steal rather than purchase music. I think it’s in an intermediate quandary, but one that will fade as more and more people get used to the idea for buying digital music, whether through iTunes (or other online markets), ringtones, dark web market list or other means.

The music industry can take solace in the discovery that certain demographics are more likely to buy music than others: , for one, but also older users. , but once they graduate…more disposable income and more propensity to pay for value.

In sum, the music industry can use Simon and Garfunkel to subsidize Britney Spears. Take heart: thieves eventually grow up to become corporate drones with cash to burn and the inclination to do so in legitimate ways.

.

The post One-third of the people reading this are thieves appeared first on The News Max.

]]>
Wife freed while husband jailed pending trial for Bitcoin laundering https://www.thenewsmax.co/wife-freed-while-husband-jailed-pending-trial-for-bitcoin-laundering-5/ Sat, 06 Jan 2024 22:04:40 +0000 https://www.thenewsmax.co/?p=26981 An alleged fraudster dubbed The Crocodile of Wall Street over claims she laundered $4.5 billion in has been freed on bail  – but her husband has been ordered to stay in jail.   Heather Morgan was freed by a judge Monday, pending trial by a federal court. But her husband Ilya Lichtenstein remains behind bars due [...]

The post Wife freed while husband jailed pending trial for Bitcoin laundering appeared first on The News Max.

]]>
An alleged fraudster dubbed The Crocodile of Wall Street over claims she laundered $4.5 billion in has been freed on bail  – but her husband has been ordered to stay in jail.  

Heather Morgan was freed by a judge Monday, pending trial by a federal court.

But her husband Ilya Lichtenstein remains behind bars due to prosecutors’ fears that he could seek immunity in , where he is also a citizen.

Judge Beryl Howell said on Monday that 31-year-old Morgan, referred as ‘Razzlekahn’ due to her rapping background, was no longer held in custody after the government deemed that she wasn’t as involved in the planning of the alleged crimes as her 34-year-ld husband, Ilya Lichtenstein, who was largely in control of the funds. 

The judge also considered Morgan’s health issues as a factor, after she had recently had surgery to remove a lump in her breast.

With follow-up appointments expected, she will be closely monitored with an ankle bracelet GPS monitor while she is under house arrest. 

Morgan has also been given restrictions on computer use, and a ban on carrying out cryptocurrency transactions. 

The defense told the court that both defendants would guarantee to appear for all remaining court dates, and darkmarket 2024 pointed out that both of their families, who were in court, were willing to bet their homes on it.

However, Howell finally ruled that there would be a significant ‘flight risk’ for Lichtenstein and agreed with federal prosecutors who insisted that just a portion of the millions in cryptocurrency that the couple stole could buy a new house or ‘buy each of their parents a private island.’ 

The judge also shared her concerns that Lichtenstein, who is a dual citizen of the United States and Russia, could seek refuge in a eastern European country, where he could possibly be granted immunity.

In this courtroom sketch, attorney Sam Enzer, center, sits between Heather Morgan, left, and her husband, Ilya 'Dutch' Lichtenstein, in federal court on February 8, 2022, in New York. The couple are accused of conspiring to launder billions of dollars in cryptocurrency stolen from the 2016 hack of a virtual currency exchange

In this courtroom sketch, attorney Sam Enzer, center, sits between Heather Morgan, left, and her husband, Ilya ‘Dutch’ Lichtenstein, in federal court on February 8, 2022, in New York.

The couple are accused of conspiring to launder billions of dollars in cryptocurrency stolen from the 2016 hack of a virtual currency exchange

This illustration photo shows Heather Morgan, also known as 'Razzlekhan,' on a phone in front of the Bitcoin logo displayed on a screen. Along with Lichtenstein, Morgan has been arrested for the couple's Bitcoin laundering scheme but has been freed after paying bail

This illustration photo shows Heather Morgan, also known as ‘Razzlekhan,’ on a phone in front of the Bitcoin logo displayed on a screen. Along with Lichtenstein, Morgan has been arrested for the couple’s Bitcoin laundering scheme but has been freed after paying bail

Federal prosecutors also revealed that Lichtenstein had a file on his computer titled ‘passport ideas,’ which included several darknet market vendors that sell passports, bank cards and other forms of identification. 

The New York couple was arrested earlier in February after they conspired to launder cryptocurrency that was stolen during the 2016 hack of Bitfinex, a virtual currency exchange platform, dark market link web darknet market links and currently estimated at $4.5 billion. 

Both are accused of using several techniques to launder Bitcoin, including using fake identifies to create accounts; coding computer programs to execute fast, automated transactions; depositing stolen funds in several accounts across one crypto exchange to cover their previous transactions; converting Bitcoin to other forms of cryptocurrency; and creating U.S.-based business accounts to wire their funds and make them seem legitimate. 

Over five years, a hacker allegedly laundered 119,754 bitcoin through 2,000 transactions on Bitfinex’s website before transferring the crypto funds into Lichtenstein’s digital wallet. 

The couple could face up to 25 years years behind bars if found guilty. 

Lichtenstein (back) has not been granted bail after prosecutors alerted the judge of his Russian citizenship, where he could seek immunity, if he were no longer held into custody

Lichtenstein (back) has not been granted bail after prosecutors alerted the judge of his Russian citizenship, where he could seek immunity, darknet markets onion if he were no longer held into custody

Morgan has been labelled as an 'integral player' in the cryptocurrency laundering scheme but prosecutors identified Lichtenstein as the 'brain' behind the scheme's operations

Morgan has been labelled as an ‘integral player’ in the cryptocurrency laundering scheme but prosecutors identified Lichtenstein as the ‘brain’ behind the scheme’s operations

Bitfinex is a cryptocurrency exchange registered in the British Virgin Islands.

In August 2016, hackers were able to breach its security firewall before stealing about 120,000 bitcoin from its customers.

The amount that was stolen was worth roughly $70 million at the time, when the price of bitcoin was around $600.

At the time, Bitfinex announced to its customers that they would lose 36 percent of their funds to compensate for the losses from the incident.

It also created special digital tokens that were able to keep track of customers’ losses. 

Some of the tokens could exchanged for shares of iFinex, the company that operates Bitfinex, while other tokens could be redeemed if the stolen bitcoins were recovered in the future.

The US Department of Justice announced that it would create a special judicial process for dark market onion victims of the hack to reclaim their losses.

The hackers have never been identified. 

Morgan and Lichtenstein were arrested by federal prosecutors of laundering the bitcoin stolen from Bitfinex, but they are not being accused for actually stealing the bitcoin in the hack.

Authorities were able to recover $3.6B after seizing couple’s private keys to digital wallets after their arrest earlier this month. 

The post Wife freed while husband jailed pending trial for Bitcoin laundering appeared first on The News Max.

]]>
A timeline of the biggest ransomware attacks https://www.thenewsmax.co/a-timeline-of-the-biggest-ransomware-attacks-8/ Sat, 06 Jan 2024 20:05:39 +0000 https://www.thenewsmax.co/?p=26858 id=”article-body” class=”row” section=”article-body” data-component=”trackCWV”> The history of technology is riddled with unintended consequences. As William Gibson wrote in Burning Chrome, “…the street finds its own uses for things.” Though Bitcoin may not have been originally conceived as a medium for ransom payments, it’s quickly become a central tool for online criminals. Ransomware, darkmarket Link a [...]

The post A timeline of the biggest ransomware attacks appeared first on The News Max.

]]>
id=”article-body” class=”row” section=”article-body” data-component=”trackCWV”>

The history of technology is riddled with unintended consequences. As William Gibson wrote in Burning Chrome, “…the street finds its own uses for things.” Though Bitcoin may not have been originally conceived as a medium for ransom payments, it’s quickly become a central tool for online criminals.

Ransomware, darkmarket Link a category of “,” blocks access to a computer or network until a ransom is paid. Despite the evolving efforts of governments to  and , the attacks keep coming. 

Cryptocurrency ransomware payments totaled roughly $350 million in 2020,  — an annual increase of over 300% from 2019. And because US companies are legally required to report cyberattacks only if customers’  is compromised, that estimate may be far too conservative.

Read more: 

Below, we tally up the damage of some of the highest-profile episodes.

Kaseya (2021)

On July 2, 2021, Kaseya announced its systems had been . Kaseya provides IT solutions for other companies — an ideal target which, in a domino effect, ended up impacting approximately in multiple countries. REvil, a cybercriminal outfit, claimed responsibility for the attack and demanded ransoms ranging from a few thousand dollars to multiple millions, . 

It’s unclear how many individual businesses paid up, but REvil demanded from Kaseya. Kaseya declined to pay, opting to cooperate with the FBI and the US Cybersecurity and Infrastructure Agency. On July 21, 2021, Kaseya a universal decryptor key and distributed it to organizations impacted by the attack.

JBS (2021)

On May 31, 2021, JBS USA, one of the largest meat suppliers in the US,  a hack that caused it to temporarily halt operations at its five largest US-based plants. The ransomware attack also disrupted the company’s Australia and UK operations. JBS paid the hackers an in Bitcoin to prevent further disruption and limit the impact on grocery stores and restaurants. The the hack to REvil, a sophisticated criminal ring well-known in ransomware attacks. 

Colonial Pipeline (2021)

On May 7, 2021, darknet markets links America’s largest “refined products” pipeline after a hacking group called Darkside infiltrated it with ransomware. Colonial Pipeline covers over 5,500 miles and transports more than 100 million gallons of fuel daily. The impact of the attack was significant: In the days that followed, the average price of a gallon of gas in the US increased to more than $3 for  as drivers rushed to the pumps. 

The pipeline operator said it paid the hackers $4.4 million in cryptocurrency. On June 7, 2021, the DOJ announced it had  part of the ransom. US law enforcement officials were able to track the payment and darkmarket 2024 take back $2.3 million using a private key for a cryptocurrency wallet.

Brenntag (2021)

On April 28, 2021, German chemical distributor learned it was the target of a cyberattack by Darkside, which stole 150GB of data that it threatened to leak if ransom demands weren’t met. After negotiating with the criminals, Brenntag ended up negotiating the original ransom of $7.5 million down to , which it paid on May 11.

CNA Financial (2021)

On March 23, 2021, CNA Financial, the commercial insurer in the US, it had “sustained a sophisticated cybersecurity attack.” The attack was by a group called Phoenix, which used ransomware known as Phoenix Locker. CNA Financial eventually paid in May to get the data back. While CNA has been tight-lipped on the details of the negotiation and transaction, but says all of its systems have since been fully restored. 

CWT (2020)

On July 31, 2020, US business travel management firm CWT disclosed it had been impacted by a  that infected its systems — and that it had paid the ransom. Using ransomware called Ragnar Locker, the assailants claimed to have stolen sensitive corporate files and knocked 30,000 company computers offline. 

As a service provider to of S&P 500 companies, dark market onion web darknet market urls the data release could have been disastrous for CWT’s business. As such, the company paid the hackers about $4.5 million on July 28, a few days before Reuters the incident. 

University of California at San Francisco (2020)

On June 3, 2020, the University of California at San Francisco that the UCSF School of Medicine’s IT systems had been compromised by a hacking collective called Netwalker on June 1. The medical research institution had been working on a cure for COVID.

Apparently, Netwalker had researched UCFS, hoping to gain insights into its finances. Citing the billions of dollars UCFS reports in annual revenue, Netwalker demanded a $3 million ransom payment. After negotiations, Netwalker the bitcoin equivalent of $1,140,895 to resolve the cyberattack. According to the BBC, Netwalker was also identified as the culprit in at least two other 2020 ransomware attacks targeting universities. 

Travelex (2019)

On New Year’s Eve 2019, London-based foreign currency exchange Travelex was by a ransomware group called Sodinokibi (aka REvil). The attackers made off with 5GB of customer data, including dates of birth, credit card information, darknet markets onion and insurance details. Travelex took down its onion dark website in 30 countries in an attempt to contain the virus.

In the wake of the ransomware attack, Travelex struggled with customer services. Sodinokibi initially demanded a payment of $6 million (£4.6 million). After negotiations, Travelex paid the cybercriminals  (285 BTC at the time, roughly £1.6 million) to get its data back.

WannaCry (2017)

In May 2017, a ransomware called infected computers across the globe by exploiting a vulnerability in Windows PCs. The WannaCry vulnerability was revealed during a massive leak of NSA documents and hacking tools engineered by a group called Shadow Brokers in . 

Though the exact number of WannaCry victims remains unknown,  around the world were infected. Victims included Spanish telecommunications company Telefónica and thousands of hospitals in the UK. Computer systems in 150 countries were affected by the attack, with a total estimated loss of around $4 billion globally.

The attackers initially demanded to unlock infected computer systems. The demand was later increased to $600 in bitcoin. However, some researchers claim that no one got their data back, even if they met the demands.

WannaCry attacks to this day. In February 2021, the DOJ  three North Korean computer programmers for darknet markets links their alleged role in the WannaCry outbreak.

Locky (2016)

Discovered in February 2016, Locky is notable due to the incredibly high number of infection attempts it’s made on computer networks. Attacks typically come in the form of an email with an invoice attached from someone claiming to be a company employee. On February 16, 2016 identified more than 50,000 Locky attacks in one day. 

Locky has , but the goal is largely the same: Lock computer files to entice owners to pay a ransom in cryptocurrency in exchange for a decryption tool, which would allow users to regain access to their locked files. The majority of Locky victims have been in the US, and , but Canada and France experienced significant infection rates as well. 

TeslaCrypt (2015)

 an earlier program called CryptoLocker, the earliest TeslaCrypt samples were circulated in November 2014 but the ransomware was not widely distributed until March of the following year.

TeslaCrypt initially targeted gamers. After infecting a computer, a pop-up would direct a user to pay a for a decryption key to unlock the infected system. report the requested ransoms ranged from $250 to $1000 in Bitcoin. In May 2016, the developers of TeslaCrypt a master decryption key for affected users to unlock their computers.

CryptoWall (2014)

Widespread reports of computer systems infected from the CryptoWall ransomware emerged in 2014. Infected computers were unable to access files — unless the owner paid for access to a decryption program. impacted systems across the globe. The attackers demanded payment in the form of prepaid cards or bitcoin. CryptoWall caused roughly $18 million in damages, . Multiple versions of CryptoWall were released, with each version making the ransomware more difficult to trace and combat.

CryptoLocker (2013)

The first time much of the world heard the term “ransomware” was during 2013’s outbreak. Discovered early in September 2013, CryptoLocker would cripple more than 250,000 computer systems during the following four months. Victims were instructed to send payments in cryptocurrency or money cards to regain access. The ransomware delivered at least  to its perpetrators. 

A in 2014 succeeded in taking down the Gameover ZeuS botnet, which was a primary distribution method for CryptoLocker. The DOJ indicted Russian hacker Evgeniy Mikhailovich Bogachev, as the botnet’s ringleader. Bogachev is still at large — and the FBI is currently  of up to $3 million for information leading to his arrest and/or conviction. 

AIDS Trojan/PC Cyborg (1989)

Widely considered the template for all subsequent attacks, the AIDS Trojan (aka PC Cyborg) is the  of a ransomware attack. In 1989, more than a decade before the creation of bitcoin, a biologist named Joseph Popp distributed 20,000 floppy disks at the World Health Organization AIDS conference in Stockholm. The floppy disks were labeled “AIDS Information – Introductory Diskettes” and contained a trojan virus that installed itself on MS-DOS systems.

Once the virus was on a computer, it counted the times the computer booted up. Once the computer booted up 90 times, hid all directories and encrypted filenames. An image on the screen from the ‘PC Cyborg Corporation’ directed users to mail $189 to a PO address in Panama. The decryption process was relatively simple, however, and security researchers released a free tool to help victims.

The post A timeline of the biggest ransomware attacks appeared first on The News Max.

]]>
Crocodile of Wall Street hilariously bad raps granted bail at $3m https://www.thenewsmax.co/crocodile-of-wall-street-hilariously-bad-raps-granted-bail-at-3m-3/ Sat, 06 Jan 2024 18:04:11 +0000 https://www.thenewsmax.co/?p=26800 It appears the self-proclaimed ‘Crocodile of Wall Street’, Heather Rhiannon Morgan, 31, who was granted $3million bail on Wednesday, led a second life a hipster New York rapper who performs under the street name Razzlekhan. In a series of cringey videos posted to YouTube, the wannabe performer can be seen walking around Wall Street while [...]

The post Crocodile of Wall Street hilariously bad raps granted bail at $3m appeared first on The News Max.

]]>
It appears the self-proclaimed ‘Crocodile of Wall Street’, Heather Rhiannon Morgan, 31, who was granted $3million bail on Wednesday, led a second life a hipster New York rapper who performs under the street name Razzlekhan.

In a series of cringey videos posted to YouTube, the wannabe performer can be seen walking around Wall Street while reciting lyrics such as: ‘I’m many things, a rapper, an economist, a journalist, a writer, a CEO, and a dirty, dirty, dirty dirty h*’. 

Morgan’s music videos, including the 2019 single Versace Bedouin, are all on her YouTube page together with various unboxing videos. The page has been made private since her arrest.

She and her husband Ilya ” Lichtenstein, 34, dark web markets who had bail set at $5million were both arrested for allegedly laundering $4.5billion in  stolen in the 2016 Bitfinex exchange hack. 

The pair were arrested on Tuesday in Manhattan on federal charges of conspiracy to commit money laundering and conspiracy to defraud the United States. 

But when Morgan wasn’t allegedly shifting around billions of dollars in the world of cryptocurrency, she was taking to the mic and shooting rap videos. 

One website which decided to wade through all of the footage suggested ‘Laundering billions in Bitcoin may not even be the worst crime of her life.’ 

‘When she’s not reverse-engineering black markets to think of better ways to combat fraud and cybercrime, she enjoys rapping and designing streetwear fashion,’ her  states. 

Photos of self proclaimed 'Crocodile of Wall Street' Heather Morgan who was arrested in New York over an alleged Bitcoin hack. Photos of Morgan were taken in June 2020

Photos of self proclaimed ‘Crocodile of Wall Street’ Heather Morgan who was arrested in New York over an alleged Bitcoin hack. Photos of Morgan were taken in June 2020

Heather Morgan, 31, who calls herself the 'Crocodile of Wall Street' (hence the croc picturedin her hand) also spends time creating low-budget rap videos and posing for quirky photoshoots

Heather Morgan, 31, who calls herself the ‘Crocodile of Wall Street’ (hence the croc picturedin her hand) also spends time creating low-budget rap videos and posing for quirky photoshoots 

Morgan was arrested on Tuesday in Manhattan, together with her husband, on federal charges of conspiracy to commit money laundering and conspiracy to defraud the United States

Morgan was arrested on Tuesday in Manhattan, together with her husband, on federal charges of conspiracy to commit money laundering and conspiracy to defraud the United States

<img id="i-7794947bc0904e6c" website height="1443" width="962 and the United States and the co-founder of an online marketing firm. Morgan, a rapper and former Forbes contributor, describes herself as 'an expert in persuasion, social engineering, and game theory'.

WARNING: EXPLICIT LYRICS 

Morgan, who raps under the name Razzlekhan, (seen in front of Federal Hall on Wall Street in a music video) declared herself the 'Crocodile of Wall Street' in one of her rap songs

Morgan, who raps under the name Razzlekhan, dark web market links (seen in front of Federal Hall on Wall Street in a music video) declared herself the ‘Crocodile of Wall Street’ in one of her rap songs

In this courtroom sketch, attorney Sam Enzer, center, sits between Heather Morgan, left, and her husband, Ilya 'Dutch' Lichtenstein, in federal court on Tuesday

In this courtroom sketch, attorney Sam Enzer, center, darknet market sits between Heather Morgan, left, dark web Link and her husband, Ilya ‘Dutch’ Lichtenstein, in federal court on Tuesday

The August 2016 Bitfinex hack itself was one of the largest crypto heists ever recorded – so massive that news of the theft knocked 20 percent off Bitcoin’s value at the time. 

Lichtenstein and Morgan are thus far not charged directly with perpetrating the hack, but rather with receiving and laundering the stolen funds. The case was filed in a federal court in Washington, D.C.

It was unclear who will be representing the couple in the criminal case and whether they had an attorney to speak on their behalf.

They were due to appear in federal court in Manhattan at 3pm on Tuesday. 

The couple is accused of conspiring to launder 119,754 bitcoin that was stolen, after a hacker attacked Bitfinex and initiated more than 2,000 unauthorized transactions.

Morgan, a rapper and former Forbes contributor, describes herself as 'an expert in persuasion, social engineering, and game theory'

Morgan, a rapper and former Forbes contributor, describes herself as ‘an expert in persuasion, social engineering, and game theory’

The couple is accused of conspiring to launder 119,754 bitcoin that was stolen, after a hacker attacked Bitfinex and initiated more than 2,000 unauthorized transactions

The couple is accused of conspiring to launder 119,754 bitcoin that was stolen, after a hacker attacked Bitfinex and initiated more than 2,000 unauthorized transactions

Justice Department officials said the transactions at the time were valued at $71 million in Bitcoin, but with the rise in the currency’s value, it is now valued at over $4.5 billion.

‘As the complaint alleges, the FBI and federal prosecutors were able to trace the movement of Bitcoin from this hack,’ said Matthew Graves, the U.S. Attorney for the District of Columbia.

He added that the money moved through a major darknet market exchange tied to a host of crimes, as well as cryptocurrency addresses tied to child sexual abuse materials.

Lichtenstein and Morgan are facing charges of conspiring to commit money laundering, as well as to defraud the United States.

Prosecutors said on Tuesday the illegal proceeds were spent on a variety of things, from gold and non-fungible tokens to ‘absolutely mundane things such as purchasing a Walmart gift card for $500.’

Bitfinex said in a statement that it was to working with the Department of Justice to ‘establish our rights to a return of the stolen bitcoin.’

‘We have been cooperating extensively with the DOJ since its investigation began and will continue to do so,’ the company said. 

Bitfinex said it intends to provide further updates on its efforts to obtain a return of the stolen bitcoin as and when those updates are available. 

Tuesday’s criminal complaint came more than four months after Monaco announced the department was launching a new National Cryptocurrency Enforcement Team, which is comprised of a mix of anti-money laundering and cybersecurity experts.

The August 2016 Bitfinex hack itself was one of the largest crypto heists ever recorded - so massive that news of the theft knocked 20 percent off Bitcoin's value

The August 2016 Bitfinex hack itself was one of the largest crypto heists ever recorded – so massive that news of the theft knocked 20 percent off Bitcoin’s value

Lichtenstein and Morgan are facing charges of conspiring to commit money laundering, as well as to defraud the United States

Lichtenstein and Morgan are facing charges of conspiring to commit money laundering, as well as to defraud the United States

Morgan is seen rapping with the New York Stock Exchange behind her to the right

Morgan is seen rapping with the New York Stock Exchange behind her to the right

Cyber criminals who attack companies, municipalities and individuals with ransomware often demand payment in the form of cryptocurrency.

In one high-profile example last year, hackers caused a widespread gas shortage on the U.S. East Coast when by using encryption software called DarkSide to launch a cyber attack on the Colonial Pipeline.

The Justice Department later recovered some $2.3 million in cryptocurrency ransom that Colonial paid to the hackers.

Cases like these demonstrate that the Justice Department ‘can follow money across the blockchain, just as we have always followed it within the traditional financial system,’ said Kenneth Polite, assistant attorney general of the department’s Criminal Division. 

Justice Department officials say that though the proliferation of cryptocurrency and virtual currency exchanges represent innovation, the trend has also been accompanied by money laundering, ransomware and other crimes

‘Toda’´s arrests, and the Department’s largest financial seizure ever, show that cryptocurrency is not a safe haven for criminals,’ Deputy Attorney General Lisa Monaco said in a statement. 

‘In a futile effort to maintain digital anonymity, the defendants laundered stolen funds through a labyrinth of cryptocurrency transactions. Thanks to the meticulous work of law enforcement, the department once again showed how it can and will follow the money, no matter the form it takes.’  

<div id="external-source-links" class="item"
data-track-module=”am-external-links^external-links”>
Read more:

DM.later(‘bundle’, function()
DM.has(‘external-source-links’, ‘externalLinkTracker’);
);

The post Crocodile of Wall Street hilariously bad raps granted bail at $3m appeared first on The News Max.

]]>
US sanctions crypto exchange over ransomware ties https://www.thenewsmax.co/us-sanctions-crypto-exchange-over-ransomware-ties-4/ Sat, 06 Jan 2024 17:04:06 +0000 https://www.thenewsmax.co/?p=26713 Washington has announced sanctions against a cryptocurrency exchange it says has worked with ransomware attackers The United States imposed sanctions Tuesday on cryptocurrency exchange SUEX for its ties to ransomware extortionists, dark darknet market url as Washington seeks to crack down on a sharp rise in digital crime attacks. The move marks the first US [...]

The post US sanctions crypto exchange over ransomware ties appeared first on The News Max.

]]>

Washington has announced sanctions against a cryptocurrency exchange it says has worked with ransomware attackers

Washington has announced sanctions against a cryptocurrency exchange it says has worked with ransomware attackers

The United States imposed sanctions Tuesday on cryptocurrency exchange SUEX for its ties to ransomware extortionists, dark darknet market url as Washington seeks to crack down on a sharp rise in digital crime attacks.

The move marks the first US sanctions against a virtual currency exchange and they come as President Joe Biden’s administration has been under pressure to act after high-profile hacks and data breaches.

The attacks on a major US oil pipeline, a meatpacking company and Microsoft Exchange email system caused real-world problems and dark markets drew attention to the vulnerability to US infrastructure to digital pirates.

The US Treasury Department, which announced the sanctions, did not say if SUEX was implicated in any of those incidents, but noted that 40 percent of the exchange’s known transaction history was linked to “illicit actors.”

“Some virtual currency exchanges are exploited by malicious actors, but others, as is the case with SUEX, facilitate illicit activities for their own illicit gains,” a Treasury statement said, adding they are the first sanctions against a crypto exchange.

As a result of the sanctions, any assets of the platform under US jurisdiction are now blocked and Americans are barred from using SUEX.

– $10 million reward –

Crypto experts from Chainalysis noted large sums had moved through the platform, much of it from suspect sources.

“In Bitcoin alone, SUEX’s deposit addresses hosted at large exchanges have received over $160 million from ransomware actors, scammers and darknet market dark market 2024 operators,” said a report from Chainalysis, which provides data on cryptocurrency.

SUEX is registered in the Czech Republic, and has branches in Russia and the Middle East.

Chainalysis said the US designation is important because it “represents significant action” by Washington to combat the money laundering that is key to digital crime.

The United States also issued a fresh warning against companies and individuals paying ransoms to unlock their files seized by ransomware hackers.

It noted that Americans could face penalties themselves if they are involved in making ransom payments as the United States already has a blacklist of people and countries, some of which are linked to ransomware attacks.

Tuesday’s announcement comes after Washington in July offered $10 million rewards for information on online extortionists abroad as it stepped up efforts to halt a sharp rise in ransomware attacks.

This year has seen a slew of prominent ransomware attacks which have disrupted a US pipeline, a meat processor and the software firm Kaseya — affecting 1,500 businesses, dark markets 2024 many of them far from the limelight.

Some $350 million was paid to malicious cyber actors last year, a spike of 300 percent from 2019, according to the Department of Homeland Security.

US officials say many of the attacks originate in Russia although they have debated to what extent there is state involvement.

Russia denies responsibility.


The post US sanctions crypto exchange over ransomware ties appeared first on The News Max.

]]>
German investigators shut down big darknet marketplace https://www.thenewsmax.co/german-investigators-shut-down-big-darknet-marketplace-5/ Sat, 06 Jan 2024 15:04:16 +0000 https://www.thenewsmax.co/?p=26681 BERLIN (AP) – German prosecutors said Tuesday that they have taken down what they believe was the biggest illegal marketplace on the darknet market and arrested its suspected operator. The site, known as DarkMarket, was shut down on Monday, prosecutors in the southwestern city of Koblenz said. All sorts of drugs, forged money, stolen or [...]

The post German investigators shut down big darknet marketplace appeared first on The News Max.

]]>
BERLIN (AP) – German prosecutors said Tuesday that they have taken down what they believe was the biggest illegal marketplace on the darknet market and arrested its suspected operator.

The site, known as DarkMarket, was shut down on Monday, prosecutors in the southwestern city of Koblenz said.
All sorts of drugs, forged money, stolen or forged credit cards, anonymous mobile phone SIM cards and malware were among the things offered for sale there, they added.

German investigators were assisted in their months-long probe by U.S. authorities and by Australian, British, dark web market urls darknet market link Danish, Swiss, Ukrainian and Moldovan police.

The marketplace had nearly 500,000 users and more than 2,400 vendors, prosecutors said.

They added that it processed more than 320,000 transactions, and Bitcoin and dark Market onion Monero cryptocurrency to the value of more than 140 million euros ($170 million) were exchanged.

The darknet market is a part of the web accessible only with specialized identity-cloaking tools.

The suspected operator, a 34-year-old Australian man, dark web market list websites was arrested near the German-Danish border.

Prosecutors said a judge has ordered him held in custody pending possible formal charges, and dark market onion he hasn’t given any information to investigators.

More than 20 servers in Moldova and Ukraine were seized, German prosecutors said. They hope to find information on those servers about other participants in the marketplace.

Prosecutors said the move against DarkMarket originated in an investigation of a data processing center installed in a former NATO bunker in southwestern Germany that hosted sites dealing in drugs and other illegal activities.

It was shut down in 2019.

That center hosted DarkMarket at one point.


The post German investigators shut down big darknet marketplace appeared first on The News Max.

]]>
Just 270 crypto addresses laundered $1.3 bln in dirty funds last… https://www.thenewsmax.co/just-270-crypto-addresses-laundered-1-3-bln-in-dirty-funds-last-5/ Sat, 06 Jan 2024 14:04:15 +0000 https://www.thenewsmax.co/?p=26626 By Tom Wilson LONDON, Feb 11 (Reuters) – Criminals are using a small group of cryptocurrency brokers and services to launder hundreds of millions of dollars of dirty virtual money, research shared with Reuters showed on Thursday. Just 270 cryptocurrency addresses, dark darknet market list many connected to over-the-counter brokers, received $1.3 billion in illicit [...]

The post Just 270 crypto addresses laundered $1.3 bln in dirty funds last… appeared first on The News Max.

]]>
By Tom Wilson

LONDON, Feb 11 (Reuters) – Criminals are using a small group of cryptocurrency brokers and services to launder hundreds of millions of dollars of dirty virtual money, research shared with Reuters showed on Thursday.

Just 270 cryptocurrency addresses, dark darknet market list many connected to over-the-counter brokers, received $1.3 billion in illicit digital coins last year – some 55% of all criminal crypto flows identified by U.S.

blockchain researcher Chainalysis.

A cryptocurrency address is a set of random letters and numbers that represents a location on a virtual network. Bitcoin, for instance, can be sent from a particular address to others on its network.

The illegal use of cryptocurrencies has long worried regulators and law enforcement, with U.S.

Treasury Secretary Janet Yellen and European Central Bank President Christine Lagarde both calling for tighter oversight last month.

The calls for stricter rules have come as bigger investors, especially from the United States, dark market onion have stepped up their embrace of bitcoin, turbo-charging a 1,000% rally for the world’s biggest cryptocurrency since March last year.

Bitcoin hit an all-time high of over $48,200 on Tuesday after Elon Musk’s Tesla Inc revealed a $1.5 billion bet on the coin, leading some investors to claim cryptocurrencies were set to become a mainstream asset class.

Yet virtual money is subject to patchy regulation across the world, and remains popular with criminals.

On Wednesday, for instance, European police agency Europol said it assisted in the arrest of hackers suspected of stealing crypto assets worth $100 million.

The Chainalysis study website only covered crime that originates on the blockchain ledger that underpins most cryptocurrencies, including scams, dark darknet market 2024 cyberheists, ransomware and darknet markets url marketplaces used to buy contraband.

Also linked to the digital addresses were services connected to cryptocurrency exchanges.

Some may have received illicit funds inadvertently due to lax compliance checks, the study said.

The true scale of money laundering and other crime using cryptocurrencies – for example where criminals use bitcoin to launder traditional cash – is not known.

The United States, Russia and China received the highest volume of digital currency from illicit addresses, reflecting their high shares of crypto trading volumes, Chainalysis said.

(Reporting by Tom Wilson. Editing by Mark Potter)


The post Just 270 crypto addresses laundered $1.3 bln in dirty funds last… appeared first on The News Max.

]]>
Most weapons on the dark web come from US, study finds https://www.thenewsmax.co/most-weapons-on-the-dark-web-come-from-us-study-finds-4/ Sat, 06 Jan 2024 13:04:11 +0000 https://www.thenewsmax.co/?p=26566 id=”article-body” class=”row” section=”article-body” data-component=”trackCWV”> US guns make up as much as 60 percent of the weapons on sale on the dark web, new research has found. Related links Weapons, drugs and stolen identities are readily available on the dark web, a . To investigate where guns, darknet Markets Onion address ammunition and guides to their use [...]

The post Most weapons on the dark web come from US, study finds appeared first on The News Max.

]]>
id=”article-body” class=”row” section=”article-body” data-component=”trackCWV”>

US guns make up as much as 60 percent of the weapons on sale on the dark web, new research has found.

Weapons, drugs and stolen identities are readily available on the dark web, a . To investigate where guns, darknet Markets Onion address ammunition and guides to their use come from, dark darknet market the UK’s University of Manchester and think tank Rand Europe — or cryptomarkets — and found 811 listings relevant to the study, published Wednesday.

Most weapons were from the USA, where , and darkmarkets most sales were destined for Europe. A gun bought from the Dark Market Url web was used in a .

“The dark web is both an enabler for the trade of illegal weapons already on the black darknet market and a potential source of diversion for weapons legally owned”, said Giacomo Persi Paoli, dark web marketplaces the report’s lead author. “The ability for criminals and terrorists, as well as vulnerable or fixated individuals, to make virtually anonymous purchases is perhaps the most dangerous aspect.”

On Thursday, US and European law enforcement agencies the , dark market link two of the three largest dark web darknet markets url

The post Most weapons on the dark web come from US, study finds appeared first on The News Max.

]]>
German investigators shut down big darknet marketplace https://www.thenewsmax.co/german-investigators-shut-down-big-darknet-marketplace-4/ Sat, 06 Jan 2024 11:04:08 +0000 https://www.thenewsmax.co/?p=26498 BERLIN (AP) – German prosecutors said Tuesday that they have taken down what they believe was the biggest illegal marketplace on the darknet market and arrested its suspected operator. The site, known as DarkMarket, was shut down on Monday, prosecutors in the southwestern city of Koblenz said. All sorts of drugs, forged money, stolen or [...]

The post German investigators shut down big darknet marketplace appeared first on The News Max.

]]>
BERLIN (AP) – German prosecutors said Tuesday that they have taken down what they believe was the biggest illegal marketplace on the darknet market and arrested its suspected operator.

The site, known as DarkMarket, was shut down on Monday, prosecutors in the southwestern city of Koblenz said.
All sorts of drugs, forged money, stolen or darknet market sites forged credit cards, anonymous mobile phone SIM cards and malware were among the things offered for sale there, they added.

German investigators were assisted in their months-long probe by U.S. authorities and by Australian, British, Danish, Swiss, Dark market link Ukrainian and dark web link Moldovan police.

The marketplace had nearly 500,000 users and more than 2,400 vendors, prosecutors said.

They added that it processed more than 320,000 transactions, and Bitcoin and Monero cryptocurrency to the value of more than 140 million euros ($170 million) were exchanged.

The darknet market is a part of the web accessible only with specialized identity-cloaking tools.

The suspected operator, a 34-year-old Australian man, was arrested near the German-Danish border.

Prosecutors said a judge has ordered him held in custody pending possible formal charges, and he hasn’t given any information to investigators.

More than 20 servers in Moldova and Ukraine were seized, German prosecutors said. They hope to find information on those servers about other participants in the marketplace.

Prosecutors said the move against DarkMarket originated in an investigation of a data processing center installed in a former NATO bunker in southwestern Germany that hosted sites dealing in drugs and other illegal activities.

It was shut down in 2019.

That center hosted DarkMarket at one point.


The post German investigators shut down big darknet marketplace appeared first on The News Max.

]]>