|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
中國加密貨幣記者兼部落客 Colin Wu 分享了日本警方首次成功識別並逮捕嫌疑人的消息
Japanese police have reportedly succeeded, for the first time, in identifying and arresting a cyber criminal by tracing their Monero (XMR) transactions and analyzing the gathered data.
據報道,日本警方透過追蹤門羅幣(XMR)交易並分析收集到的數據,首次成功識別並逮捕了一名網路犯罪分子。
The arrested crypto villain had a team of approximately 20 people, and together they earned more than 100 million yen. Wu's data comes from today's Nikkei article, a link to which he published in his post.
被捕的加密貨幣惡棍擁有約20人的團隊,他們總共賺了超過1億日元。吳的數據來自今天的《日經新聞》文章,他在貼文中發布了該文章的連結。
Caught over laundering money through XMR
因透過 XMR 洗錢而被捕
According to Nikkei, Japanese cyber police joined forces with other police departments and managed to spot and then arrest a 26-year-old Yuta Kobayashi. His occupation in real life remains unknown, however, he is suspected of conducting computer fraud and using credit cards of unaware victims to obtain illegal profits.
根據《日經新聞》報道,日本網路警察與其他警察部門聯手,成功發現並逮捕了 26 歲的小林雄太。他在現實生活中的職業不明,但涉嫌進行電腦詐騙,並利用不知情的受害者的信用卡獲取非法利益。
The estimated damage brought by the culprits exceeds 100 million yen. The criminal group tried to launder the stolen funds using privacy coin Monero. It was designed to be highly confidential and make it impossible to trace senders and receivers of these coins. However, the cyber police managed to identify Kobayashi by tracing the XMR flow. This was the first-ever suspect to be identified by analysing data from XMR transactions.
預計肇事者造成的損失超過1億日圓。該犯罪集團試圖使用隱私幣門羅幣洗錢。它被設計為高度保密,使得無法追蹤這些硬幣的發送者和接收者。然而,網路警察透過追蹤 XMR 流,成功識別了小林的身份。這是有史以來第一個透過分析 XMR 交易數據來識別的嫌疑犯。
For the first time, Japanese police identified suspects by analyzing Monero money laundering. The gang conducted about 900 fraudulent transactions between June 2021 and January 2022, and the police have arrested 18 people. https://t.co/UiaoyalZwZ
日本警方首次透過分析門羅幣洗錢活動來識別嫌疑犯。該團在2021年6月至2022年1月期間進行了約900筆詐欺交易,警方已逮捕18人。 https://t.co/UiaoyalZwZ
The arrested suspect listed fictitious products on the Japanese flea market website Mercari in the summer of 2021. Then he used the credit card data of other people and led the operating company to believe that those transactions were completed, thus defrauding it of millions of yen.
被捕嫌疑人於2021年夏天在日本跳蚤市場網站Mercari上列出了虛構的產品,然後使用其他人的信用卡數據,引導營運公司相信這些交易已經完成,從而騙取了數百萬日元。
Between June 2021 and January 2022, the scammer group conducted approximately 900 fraudulent transactions missing the credit cards of unaware people. This data was likely stolen using phishing via fake sites and fraudulent emails.
2021 年 6 月至 2022 年 1 月期間,詐騙集團進行了約 900 筆詐欺交易,並遺漏了不知情者的信用卡。這些數據很可能是透過虛假網站和詐騙電子郵件透過網路釣魚被盜的。
Up to now, apart from Yuta Kobayashi, 18 cyber criminals from his team have been taken into custody. Those gang members were hired as they were offered to take “illegal part-time jobs” on social media. All the communication between them and Kobayashi were conducted using high-confidence messenger apps.
截至目前,除小林雄太外,其團隊中的18名網路犯罪者已被逮捕。這些團夥成員之所以被雇用,是因為他們在社群媒體上被要求從事「非法兼職工作」。他們和小林之間的所有溝通都是透過高可信度的通訊應用程式進行的。
CZ warns against scammers using his name
CZ警告詐騙者不要冒用他的名字
As reported by U.Today earlier, founder and former CEO of the Binance exchange, Changpeng Zhao, published a tweet, saying that he had noticed at least two verified X accounts impersonating him.
根據《今日美國》早些時候報道,幣安交易所創始人兼前首席執行官趙長鵬發表推文稱,他注意到至少有兩個經過驗證的 X 帳戶冒充他。
While they both start with “cz,” Zhao warned the community that he only uses the @cz_binance X handle.
雖然它們都以“cz”開頭,但趙警告社區,他只使用@cz_binance X 句柄。
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
- 由於衍生性商品指標保持顯著穩定,比特幣 (BTC) 價格跌至 6.7 萬美元
- 2024-10-22 07:35:01
- 10 月 21 日,比特幣 (BTC) 價格跌至 67,000 美元,抹去了前三天的漲幅。
-
- 比特幣飆升至 69,000 美元以上,然後在市場波動中回落
- 2024-10-22 07:35:01
- 週一,比特幣價格飆升至 69,000 美元以上,然後調整至撰寫本文時目前的 67,510 美元。
-
- 如何為比特幣繁榮做好準備
- 2024-10-22 07:35:01
- 比特幣可能正處於新一輪牛市的邊緣。 Adamant Research 的 Tuur Demeester 在他的出版品《如何定位》中指出
-
- Ripple 轉移 2 億 XRP,引發關於轉移目的的猜測
- 2024-10-22 07:35:01
- 今天,這家區塊鏈支付公司將價值超過 1.09 億美元的 2 億 XRP 轉移到了一個未知的錢包。