|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ZachXBT 是一家獨立的區塊鏈調查員,以揭露加密貨幣領域的詐欺、詐騙和犯罪活動而聞名
Three cybercriminals have been identified and exposed by on-chain sleuth ZackXBT for posing as Gemini support and stealing millions of dollars from Genesis creditors.
鏈上偵探 ZackXBT 已識別並曝光了三名網路犯罪分子,他們冒充 Gemini 支持並從 Genesis 債權人那裡竊取了數百萬美元。
According to ZackXBT, the individuals — Greavys (Malone Iam), Wiz (Veer Chetal), and Box (Jeandiel Serrano) — stole $243 million from a single person using a clever social engineering trick.
據 ZackXBT 報導,這些人——Greavys (Malone Iam)、Wiz (Veer Chetal) 和 Box (Jeandiel Serrano)——利用巧妙的社會工程技巧從一個人那裡竊取了 2.43 億美元。
The individuals posed as trusted companies and deceived the victim into providing access to their personal and financial information.
這些人冒充受信任的公司,欺騙受害者提供其個人和財務資訊。
ZackXBT is an independent blockchain investigator known for exposing fraud, scams, and criminal activity in the cryptocurrency space. Operating anonymously, he utilizes tools like blockchain analysis, open-source intelligence (OSINT), and social media research to track illicit activities involving cryptocurrency.
ZackXBT 是一家獨立的區塊鏈調查員,以揭露加密貨幣領域的詐欺、詐騙和犯罪活動而聞名。他以匿名方式運作,利用區塊鏈分析、開源情報 (OSINT) 和社交媒體研究等工具來追蹤涉及加密貨幣的非法活動。
He frequently shares his findings through detailed threads on Twitter and other platforms, revealing how individuals and groups execute crypto-related scams, laundering operations, and other fraudulent schemes. His work has led to the freezing of stolen funds, arrests, and increased awareness of the risks in the crypto industry. Despite his independence, his investigations have earned him credibility and collaborations with law enforcement and security teams in tracking down criminals.
他經常透過 Twitter 和其他平台上的詳細貼文分享他的發現,揭示個人和團體如何執行與加密貨幣相關的詐騙、洗錢操作和其他詐騙計劃。他的工作導致被盜資金被凍結、逮捕,並提高了人們對加密行業風險的認識。儘管他具有獨立性,但他的調查為他贏得了信譽,並與執法和安全團隊合作追查罪犯。
He noted that on August 19, 2024, attackers called the victim using a fake number and convinced them to grant access to the victim’s account. The perpetrators then pretended to be from Gemini, a cryptocurrency exchange and claimed the victim’s account had been hacked.
他指出,2024 年 8 月 19 日,攻擊者使用虛假號碼致電受害者,並說服他們授予受害者帳戶的存取權。隨後,犯罪者假裝來自加密貨幣交易所 Gemini,並聲稱受害者的帳戶已被駭客入侵。
They used social engineering techniques to persuade the victim to reset their two-factor authentication (2FA) and send Gemini funds to a compromised wallet. The attackers also got the victim to use a remote access tool called AnyDesk, allowing them to see and steal private keys from the victim’s Bitcoin core wallet.
他們使用社會工程技術說服受害者重置其雙重認證 (2FA) 並將 Gemini 資金發送到受感染的錢包。攻擊者還讓受害者使用名為 AnyDesk 的遠端存取工具,使他們能夠查看並竊取受害者的比特幣核心錢包中的私鑰。
In an X post, ZackXBT attached a link to a private video recording showing the criminals reacting live as they received $238 million from their scheme. After stealing the money, they split it among themselves and quickly moved it through more than 15 cryptocurrency exchanges, where it was swapped between different digital currencies like Bitcoin, Litecoin, Ethereum, and Monero to avoid detection.
在 X 帖子中,ZackXBT 附上了一個私人視頻記錄的鏈接,顯示犯罪分子從他們的計劃中收到 2.38 億美元的實時反應。偷走錢後,他們將錢分給自己,並迅速透過超過15 個加密貨幣交易所轉移,在比特幣、萊特幣、以太幣和門羅幣等不同數位貨幣之間進行交換,以避免被發現。
Wiz, one of the perpetrators who received a significant share of the stolen funds, accidentally revealed his full name during a screen-sharing session. This was further confirmed by videos and chats where others called him “Veer.” His friend, Light/Dark (Aakaash), who assisted Wiz in laundering the stolen money using online services, also unintentionally revealed his identity during a screen share.
維茲是獲得大部分被盜資金的犯罪者之一,他在螢幕共享會話中意外洩露了自己的全名。視訊和聊天進一步證實了這一點,其他人稱他為“Veer”。他的朋友光/暗(阿卡西飾)利用線上服務協助 Wiz 洗錢,也在螢幕分享期間無意中透露了自己的身份。
Additionally, Greavys (Malone) started spending the stolen funds lavishly, buying fleets of cars and spending hundreds of thousands of dollars at clubs in Los Angeles and Miami. He even gifted expensive Birkin bags to women. Unbeknownst to him, his location was discovered through social media posts from his friends and his own Instagram photos, which he had posted under his real name earlier this year.
此外,格里維斯(馬龍)開始大肆揮霍偷來的資金,購買車隊,並在洛杉磯和邁阿密的俱樂部花費數十萬美元。他甚至向女性贈送昂貴的柏金包。他不知道的是,他的位置是透過朋友的社交媒體貼文和他自己的 Instagram 照片被發現的,這些照片是他今年早些時候以真名發布的。
The last person, Box (Jeandiel/John), who impersonated a Gemini representative during calls to the victim, used the same profile picture across platforms like Discord and Telegram, making it easier to track him. His ex-girlfriend further exposed his identity by leaking all of his photos on social media.
最後一個人 Box(Jeandiel/John)在打電話給受害者時冒充 Gemini 代表,在 Discord 和 Telegram 等平台上使用了相同的個人資料圖片,從而更容易追蹤他。他的前女友在社交媒體上洩露了他的所有照片,進一步暴露了他的身份。
Read also: North Korean hackers target crypto firms with new malware, Durian
另請閱讀:北韓駭客利用新惡意軟體 Durian 將加密貨幣公司作為目標
A group of cryptocurrency addresses linked to both Box and Wiz received over $41 million from two exchanges. ZackXBT explained that most of this money was spent on luxury items such as cars, watches, jewelry, and designer clothes. Conversations among the trio reveal they were using the stolen funds for these purchases.
一組與 Box 和 Wiz 相關的加密貨幣地址從兩家交易所收到了超過 4,100 萬美元。 ZackXBT 解釋說,這些錢大部分都花在了汽車、手錶、珠寶和名牌服裝等奢侈品上。三人之間的對話顯示,他們正在使用竊取的資金進行這些購買。
Despite converting most of the stolen funds into Monero, a privacy coin, both Box and Wiz made errors that linked the money to their laundering activities. Wiz, for instance, inadvertently revealed an address he used to buy designer clothes during a screen-sharing session. Similarly, Box reused a deposit address, making it traceable.
儘管將大部分被盜資金轉換為門羅幣(一種隱私幣),Box 和 Wiz 都犯了錯誤,將這些錢與他們的洗錢活動聯繫起來。例如,維茲在螢幕分享會話中無意中透露了他用來購買名牌服裝的地址。同樣,Box 重複使用了存款地址,使其可追溯。
With the help of investigative teams and the Binance Security Team, over $9 million has been frozen, and $500,000 has already been returned to the victim. As a result of the investigation, both Box and Greavys were arrested in Miami and Los Angeles.
在調查團隊和幣安安全團隊的幫助下,超過 900 萬美元已被凍結,其中 50 萬美元已返還給受害者。調查結果顯示,博克斯和格里維斯均在邁阿密和洛杉磯被捕。
The blockchain investigator mentioned that investigations are still ongoing and that updates will be shared as the legal case progresses.
區塊鏈調查員提到,調查仍在進行中,隨著法律案件的進展,將分享最新情況。
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
- SEC 與 TrueUSD 發行人 TrueCoin 和借貸協議營運商 TrustToken 就涉嫌欺詐性銷售未註冊投資合約達成和解
- 2024-09-27 04:25:10
- 聯邦證券監管機構已與 TrueUSD (TUSD) 發行人 TrueCoin 和貸款協議營運商 TrustToken 達成協議,以解決涉嫌
-
- Hamster Kombat ($HMSTR):基於病毒式 Telegram 的點擊賺錢項目綜合指南
- 2024-09-27 04:25:10
- 在關於空投分配的諸多爭議中,基於 Telegram 的熱門點擊賺錢項目 Hamster Kombat ($HMSTR) 終於開放交易
-
- 韓國因濫用個人資料對 Worldcoin 處以 83 萬美元罰款
- 2024-09-27 04:25:10
- 韓國個人資訊保護委員會 (PIPC) 對 Worldcoin 及其姊妹組織處以 11 億韓元(83 萬美元)的罰款
-
- SEI Network (SEI) 價格大幅上漲,SEI 代幣市值升至 $1.6B 以上
- 2024-09-27 04:25:01
- 9 月24 日,SEI 團隊透過X 上的貼文宣布了新的生態系統整合。 。
-
- Mawari Network 籌集 1080 萬美元以擴展空間運算和 XR 體驗
- 2024-09-27 04:25:01
- Mawari 聯合創始人兼執行長 Luis Oscar Ramirez 告訴 The Block,此次融資的結構是一份帶有代幣認股權證的簡單未來股權 (SAFE) 協議。
-
- Nervos Network (CKB)、Sui (SUI) 和 Cutoshi (CUTO) – 跑贏市場的山寨幣
- 2024-09-27 04:25:01
- 大盤加密貨幣正在苦苦掙扎,並面臨整體看跌情緒,但此時,一些有前途的山寨幣表現優於市場,擊敗了所有競爭對手。這些山寨幣可以保護投資者免受資金回撤的影響,並為他們在令人失望的市場條件下生存帶來希望。
-
- ORDI 空投:檢查 $ORDI 完整指南的資格
- 2024-09-27 04:25:01
- 取得區塊鏈 $ORDI 代幣非常簡單!只需完成這些快速步驟即可立即開始使用您的代幣。
-
- Ethena Labs 發布新的法幣支援的穩定幣 UStb,由貝萊德支持並由 Securitize 提供支持
- 2024-09-27 04:25:01
- 專注於去中心化金融業的 Ethena Labs 最近發布了最新產品。這種由法定貨幣支持的穩定幣稱為 UStb。
-
- 加密貨幣分析師 Bluntz 看好不為人知的山寨幣 SAGA,預測 Memecoins WIF 和 POPCAT 的重大走勢
- 2024-09-27 04:25:01
- 廣受關注的加密貨幣分析師和交易員 Bluntz 傾向於看好一種不為人所知的山寨幣,同時提供了他對兩種迷因幣的見解。