cryptocurrency theft

The Singapore government reminds citizens to be vigilant against cryptocurrency theft incidents

ChainCatcher news, according to 8world, the Singapore Police Force and the Cyber Security Agency issued a joint statement indicating that recently, criminals have been observed using various methods to steal cryptocurrency from victims' wallets. Their common tactics include:Impersonating legitimate entities on social media, using giveaways or promotional activities as bait, and asking victims to "verify" their wallets by sharing login credentials and other personal information.Criminals may also impersonate the owners of cryptocurrency companies, sending malicious links under the pretext of assessing the victims' capabilities in the blockchain field. Once clicked, these links automatically transfer cryptocurrency from the victims' wallets.Additionally, criminals may exploit phishing websites, software vulnerabilities, smart contracts, etc., to invade victims' wallets and steal cryptocurrency.Singapore government agencies urge the public to take preventive measures to protect their wallets, such as: using hardware wallets and other secure offline storage devices; employing strong passwords and two-factor authentication; and regularly checking accounts.If you suspect that you have become a victim, you should immediately contact the cryptocurrency exchange to stop trading or freeze your account if possible; check and revoke any suspicious token authorizations; promptly transfer any remaining cryptocurrency from the affected wallet to another wallet; and report to the relevant authorities.

ZachXBT: Genesis creditors fall victim to $243 million cryptocurrency theft, two suspects have been arrested

ChainCatcher news, on-chain detective ZachXBT posted on platform X, revealing a significant cryptocurrency asset theft case targeting Genesis creditors.On August 19, 2024, three hackers stole $243 million worth of cryptocurrency assets from a Genesis creditor through a highly sophisticated social engineering attack. According to ZachXBT's investigation, the attackers first impersonated Google customer service, deceiving the victim over the phone and successfully breaching their personal account. Subsequently, they posed as support staff from the Gemini exchange, claiming the account had been hacked, and tricked the victim into resetting two-factor authentication and transferring funds from their Gemini account to a controlled wallet. Finally, the hackers lured the victim into using AnyDesk remote desktop software to share their screen, thereby stealing the private keys to the Bitcoin Core wallet.ZachXBT confirmed three main suspects: Veer Chetal (alias Wiz), Malone Iam (alias Greavys), and Jeandiel Serrano (alias Box). Among them, Veer received the largest share of the loot, approximately $34.5 million. Malone lived a lavish lifestyle in Los Angeles and Miami, spending between $250,000 and $500,000 daily, even gifting women Hermes handbags. Jeandiel was responsible for impersonating Gemini customer service to carry out the fraud.Currently, over $9 million in funds have been successfully frozen, with more than $500,000 returned to the victims. Malone and Jeandiel have been arrested in Miami and Los Angeles, respectively. Law enforcement expects to seize more funds during the arrests, as a significant amount of fund transfers were observed before and after the arrests.
ChainCatcher Building the Web3 world with innovators