Tuesday, January 31, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

U.S. Arrests Alleged Operator of Bitzlato Crypto Exchange

Researcher by Researcher
January 19, 2023
in Cybersecurity
0
New FBI Unit Will Focus on Cryptocurrency Exploitation
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Authorities in the United States and France have disrupted the operations of Bitzlato, a major cryptocurrency exchange associated with the now-defunct Hydra darknet marketplace known for processing ransomware payments, and arrested the alleged operator of the marketplace, a Russian national who lived in China.

The alleged operator is Anatoly Legkodymov, who the FBI arrested Tuesday in Miami and the Department of Justice alleges ran Bitzlato in a manner specifically designed to avoid financial regulations in the U.S. and elsewhere and bragged about washing dirty money through Bitzlato. The exchange operated from Hong Kong and U.S. authorities allege that Bitzlato handled more than $15 million in ransomware payments and exchanged more than $700 million in cryptocurrency with users of Hydra. U.S. and German authorities took down the Hydra Market in April 2022, ending the market’s run as one of the more successful and longer-lasting darknet marketplaces in history.

“This will put all of those who seek to exploit the cryptocurrency ecosystem on notice that the Department of Justice will use every tool that we have to attack criminal use of the darknet and cryptocurrency,” said Deputy Attorney General Lisa Monaco in a press conference Wednesday.

“We will not only target hackers, fraudsters and criminals that mask their profits in cryptocurrency, we are also unleashing the full force of the Department of Justice on the crypto ecosystem that supports them. Moving servers offshore will not shield you.”

“It is well known that Russia is a haven for cybercriminals. We will not tolerate criminal enterprises that enrich Russia’s malicious interests.”

In the court documents, the Department of Justice alleges that Legkodymov was the majority shareholder of Bitzlado and operated it in such a way that it allowed customers to avoid financial regulations and oversight. The exchange did not collect any information about users and “Bitzlato sold itself to criminals as a no-questions-asked cryptocurrency exchange, and reaped hundreds of millions of dollars’ worth of deposits as a result,” said Breon Peace, U.S. attorney for the Eastern District of New York, where Legkodymov was charged. Bitzlato outwardly claimed not to do business with customers in the U.S., but had many U.S. customers.

The Department of Justice’s recently formed National Cryptocurrency Enforcement Team played a major role in the Bitzlato operation, and Monaco said this was the team’s biggest accomplishment so far.

“Our actions mark the most significant enforcement action against a cryptocurrency exchange by the National Cryptocurrency Enforcement Team,” she said.

Alongside the actions by the Department of Justice and authorities in France and other European countries, the Treasury Department’s FinCEN arm designated Bitzlato as a ‘primary money laundering concern” connected to the Russian government.

“It is well known that Russia is a haven for cybercriminals. We will not tolerate criminal enterprises that enrich Russia’s malicious interests,” said Brian Turner, associate deputy director of the FBI.

Legkodymov is charged with operating an unlicensed money transmission business.



Source link

Related articles

Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

January 30, 2023
Tags: AllegedArrestsBitzlatocryptoExchangeoperator
Share76Tweet47

Related Posts

Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
0

VMware has released updates for a group of four vulnerabilities in its vRealize Log Insight logging platform, three of which...

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

January 30, 2023
0

There are many organizations moving to the cloud every day. Some are developing software at a fast pace, some are...

The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment

The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment

January 30, 2023
0

On Friday, January 20, 2023, Google announced it would lay off 12,000 employees. Amazon and Microsoft have laid off a...

How IT Budgets Should Fill Cybersecurity Moats in 2023

How IT Budgets Should Fill Cybersecurity Moats in 2023

January 30, 2023
0

TechRepublic speaks with Carlos Morales of Neustar Security Services on the best ways for companies to spend on cybersecurity —...

Boosting Data Security with AI and Blockchain | by Binu Panicker | Jan, 2023

Boosting Data Security with AI and Blockchain | by Binu Panicker | Jan, 2023

January 30, 2023
0

Today, data is considered the new oil and rightly so because the amount and type of data collected on people...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
KITMEK Launches $1 Digital Only School for Children Across MENA

KITMEK Launches $1 Digital Only School for Children Across MENA

January 31, 2023
Whole-Network Visualization With Meraki Dashboard

Whole-Network Visualization With Meraki Dashboard

January 31, 2023
Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

January 30, 2023

Recent Posts

Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
KITMEK Launches $1 Digital Only School for Children Across MENA

KITMEK Launches $1 Digital Only School for Children Across MENA

January 31, 2023
Whole-Network Visualization With Meraki Dashboard

Whole-Network Visualization With Meraki Dashboard

January 31, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved