Daily Drop (698): CN: Private Hacker Army, Pirated macOS Apps, Foxconn & HCL, Myanmar: Cybercrime, (EPMM) & MobileIron, MLFlow Vul, Illicit "Stablecoins", Intel, NoName: DDoS Davos, XMRig, VMware
01-19-24
Friday, Jan 19 2024 // (IG): BB // ShadowNews // Coffee for Bob // Proxies
*Started adding the Proof Of Concepts (PoC) if available for mentioned CVE’s :
A Proof of Concept (PoC) is a small exercise to test a certain hypothesis or demonstrate that a potential project can be viable. It's primarily used to verify that certain concepts or theories have the potential for real-world application. The purpose of a PoC is to showcase the feasibility, functionality, and potential of a concept before proceeding to the development of the full-scale project. *
China's Cybersecurity Law Fosters Unofficial Hacker Force for Cyber Espionage
Bottom Line Up Front (BLUF): China has inadvertently created a private hacker army aimed at identifying vulnerabilities in foreign computer networks, owing to its cybersecurity law mandating Chinese entities to report discovered software loopholes within 48 hours. This law potentially enables subtle forms of state-backed cyber warfare, with young cybersecurity engineers being increasingly promoted to exploit foreign systems.
Analyst Comments: China's 2021 cybersecurity regulations have significantly altered the dynamics of network security within the country, placing the Chinese government at the center of the vulnerability discovery and reporting process. This shift illustrates Beijing's broader strategy of centralizing control over cybersecurity data and other IT information. The focus on nurturing young cybersecurity talent reflects China's intent to strengthen its cyber capabilities, which could have far-reaching implications for international cybersecurity dynamics. This development is a strategic move by China to bolster its cyber warfare capabilities, leveraging the skills of these 'white hat' hackers for potential exploitation of foreign networks. It underscores the need for heightened global vigilance and robust cybersecurity measures to counter such state-sponsored cyber threats.
FROM THE MEDIA: The Regulations on the Management of Network Product Security Vulnerabilities, implemented in 2021, require Chinese companies to report software vulnerabilities to the government, fostering competition among agencies and leading to the creation of an unofficial hacker army. This regulation marks a departure from the earlier voluntary disclosures to China's cyberspace watchdog or intelligence services. Over 170,000 white hats were reported in China in 2021, mainly young men born between 1990 and 2009. The regulation has implications for China's cybersecurity industry and international relations, as these white hat hackers, capable of identifying system vulnerabilities, could also be directed at foreign networks. This development emphasizes the dual-use nature of cybersecurity skills and the potential for their exploitation in cyber espionage activities.
READ THE STORY: NewsWeek
Pirated macOS Applications Contain Malicious Backdoors, Warn Security Experts
Bottom Line Up Front (BLUF): Security researchers from Jamf Threat Labs have discovered a backdoor in pirated macOS applications hosted on a Chinese website, posing a significant risk to users. This malware, once activated, downloads and executes multiple payloads to compromise the victim's machine. Applications like Navicat Premium, UltraEdit, FinalShell, SecureCRT, and Microsoft Remote Desktop are among those affected.
Analyst Comments: This discovery highlights the ongoing risks associated with using pirated software, particularly for macOS users. The sophisticated nature of this malware, leveraging a dropper component and incorporating a feature-rich backdoor, underlines the evolving tactics of cybercriminals targeting macOS. The use of legitimate software titles to disguise the backdoor suggests a strategic approach to target a broad user base. Users must be vigilant and avoid downloading software from unverified sources. This incident also calls for increased awareness and education on cybersecurity best practices, particularly in personal software management.
FROM THE MEDIA: The backdoored disk image files contain unauthorized modifications to establish communication with actor-controlled infrastructure. The attack chain involves a dropper component that activates upon opening the pirated application, leading to the download of a backdoor and a downloader from a remote server. The backdoor, based on the Khepri post-exploitation toolkit, grants remote control capabilities, while the downloader establishes persistence and retrieves additional payloads. The malware shares similarities with the previously observed ZuRu malware, indicating a possible evolution of this threat. Users are urged to exercise caution and only download applications from official and trusted sources to prevent such security breaches.
READ THE STORY: THN
Foxconn and HCL Group's Semiconductor Venture in India
Bottom Line Up Front (BLUF): Taiwanese manufacturing giant Foxconn, also known as Hon Hai Technology Group, has teamed up with India's HCL Group to establish a semiconductor assembly and testing facility in India. This initiative, Foxconn's first India-based OSAT (Outsourced Semiconductor Assembly and Test) operation, aligns with its strategy to diversify into semiconductors. The collaboration aims to build a resilient supply chain ecosystem for the domestic industry and strengthen local communities through Foxconn's BOL (build-operate-localize) model.
Analyst Comments: Foxconn's partnership with HCL Group signifies a strategic move in the global semiconductor industry, reflecting the increasing importance of India as a key player. This joint venture is poised to enhance India's capabilities in semiconductor manufacturing, addressing global supply chain challenges and reducing dependency on traditional semiconductor powerhouses. Foxconn's BOL model in this venture indicates a commitment to not only business growth but also socio-economic development in the region. The move also comes amid challenges, including a ransomware attack on Foxconn's semiconductor unit and regulatory scrutiny in China, suggesting a complex landscape that the company must navigate.
FROM THE MEDIA: The joint venture between Foxconn and HCL Group marks a significant step in India's efforts to boost its semiconductor industry, attracting global players through initiatives like the $10 billion India Semiconductor Mission. Foxconn's investment in the project, amounting to $37.2 million for a 40 percent stake, demonstrates its commitment to diversifying its operations beyond China. HCL Group's involvement, especially its plans for a chip wafer fabrication unit, further underscores India's growing prominence in the semiconductor sector. Despite past setbacks, such as Foxconn's withdrawal from a $19.5 billion project and tax audits in China, the company's continued investment in India highlights its strategic focus on expanding its global manufacturing footprint and contributing to the development of local ecosystems.
READ THE STORY: The Register
The Complex Interplay of Cybercrime, Human Trafficking, and Guerrilla Warfare in Myanmar
Bottom Line Up Front (BLUF): The rise of cyberscam operations in Southeast Asia, particularly in Myanmar, has created a unique nexus between cybercrime, human trafficking, and ongoing civil war. These scams, involving the abduction of people to conduct internet fraud, have led to China's increased involvement in Myanmar's conflict, as many victims are Chinese nationals.
Analyst Comments: The proliferation of cyberscam centers in Myanmar’s border regions, exploiting the chaos of the country's civil conflict, highlights a new dimension in the nexus of technology and warfare. The practice of abducting individuals, often under false pretenses of legitimate employment, to run these scam centers, signifies a disturbing trend in human trafficking. It also reflects the adaptability of criminal networks to leverage the digital sphere for financial gain. China’s reaction, including a crackdown on militia officials and a public awareness campaign, underlines the significant impact these scams have had on its citizens. This situation also illustrates how modern conflicts can extend beyond traditional battlefields, encompassing digital arenas and impacting international relations. China's deeper involvement in Myanmar's conflict due to these scams suggests a realignment of its approach towards the country, potentially influencing the broader geopolitical dynamics in the region.
FROM THE MEDIA: The surge in cyberscams, particularly the "pig butchering" scams, in Myanmar has become a major concern for China, leading to its increased intervention in the country's affairs. These scams involve a sophisticated process of social engineering and financial deception, often executed by victims of human trafficking who are coerced into participating in these fraudulent activities. China's response, driven by the need to protect its citizens from these scams and the broader geopolitical implications, highlights the complex interplay between cybercrime, human trafficking, and guerrilla warfare. The involvement of Chinese nationals, both as victims and perpetrators, has turned these scams into a transnational issue, requiring concerted efforts from multiple stakeholders to address the challenge effectively.
READ THE STORY: VOX
U.S. Agency Highlights Urgent Need to Patch Critical Flaw in Endpoint Manager Mobile
Bottom Line Up Front (BLUF): The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the critical flaw CVE-2023-35082 in Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core to its Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild. This flaw, patched by Ivanti, is an authentication bypass related to another vulnerability, CVE-2023-35078. Federal agencies are urged to apply fixes by February 8, 2024.
Analyst Comments: The addition of CVE-2023-35082 to CISA's KEV catalog underscores the gravity of the threat it poses to organizations using Ivanti EPMM. This development highlights the escalating trend of cybercriminals exploiting critical vulnerabilities in widely used enterprise software. The quick response from Ivanti with a patch reflects the growing need for rapid and proactive security measures in the face of sophisticated cyber threats. Organizations should prioritize patching this vulnerability to mitigate potential risks, emphasizing the importance of continuous monitoring and timely updates in maintaining cybersecurity resilience.
FROM THE MEDIA: The critical flaw CVE-2023-35082, with a high CVSS score of 9.8, allows unauthorized remote access potentially leading to data breaches. Discovered and reported by cybersecurity firm Rapid7, this flaw can be chained with CVE-2023-35081 to enable attackers to write malicious web shells on compromised systems. The revelation of mass exploitation of two other zero-day flaws in Ivanti Connect Secure VPN devices further intensifies the security concerns. Over 1,700 devices have been compromised globally, with multiple threat actors exploiting the vulnerabilities. Security researchers from Assetnote have also uncovered additional exploitation endpoints, highlighting the sophisticated nature of these attacks and the urgent need for robust defensive strategies against such advanced threats.
READ THE STORY: THN // PoC: CVE-2023-35082
MLFlow Vulnerable to Multiple High-Ranked Bugs
Bottom Line Up Front (BLUF): Protect AI has detected four critical vulnerabilities in MLFlow, an open-source machine learning framework. These high-severity bugs, all rated CVSS 10, pose imminent threats to users, allowing for Remote Code Execution (RCE), Arbitrary File Overwrite, and Local File Include. The vulnerabilities were discovered within a span of 50 days, underlining the framework's security risks.
Analyst Comments: The discovery of these vulnerabilities in MLFlow, a widely-used machine learning lifecycle platform, raises significant concerns about the security of open-source machine learning tools. The high criticality of these flaws, combined with the rapid frequency of their detection, indicates a potentially systemic issue in the framework's security posture. The ability for attackers to execute RCE, overwrite files, and include local files could lead to severe consequences, such as system takeover, data loss, and disruption of service. This situation highlights the need for robust security practices in the development and maintenance of open-source frameworks, especially those used in sensitive fields like machine learning and AI. As MLFlow boasts a large user base, including major companies like Facebook and Microsoft, addressing these vulnerabilities swiftly is crucial to prevent widespread exploitation.
FROM THE MEDIA: Protect AI's AI/ML bug bounty program, hunter AI, uncovered four high-severity vulnerabilities in MLFlow. The most recent, identified as CVE-2024-0520, involves a path traversal flaw that could enable attackers to execute RCE by deceiving users into using a malicious remote data source. This vulnerability affects the MLFlow.data module listed within the PyPi registry. Another significant flaw, CVE-2023-6709, discovered in December 2023, allowed improper validation in a template engine, enabling RCE attacks. Additionally, CVE-2023-6831, identified in the same month, allowed bypassing file path validation, leading to potential remote file overwrites on MLFlow servers. The fourth critical flaw discovered enabled attackers to read sensitive files on MLFlow servers, presenting a risk of system takeover if critical keys were accessible.
READ THE STORY: CSO Online
Chainalysis Report Highlights $40 Billion in Illicit Transactions via Stablecoins Since 2022
Bottom Line Up Front (BLUF): A recent report by Chainalysis, a firm specializing in cryptocurrency tracing, has revealed that stablecoins, cryptocurrencies pegged to stable values like the US dollar, have been increasingly used in illicit activities, including scams and international sanctions evasion. The report finds that stablecoins were involved in 70% of crypto scam transactions and 83% of crypto payments to sanctioned countries in 2023. This highlights a growing trend where the stability and ease of transactions offered by stablecoins are being exploited for criminal purposes.
Analyst Comments: The Chainalysis report sheds light on a concerning trend in the cryptocurrency space. Stablecoins, designed to offer a less volatile alternative to cryptocurrencies like Bitcoin, are becoming tools for significant criminal activities. This utilization undermines the intended purpose of stablecoins, highlighting a gap in regulatory and monitoring frameworks. The ease and stability that make stablecoins attractive to legitimate users also make them ideal for illicit transactions, particularly in evading sanctions and conducting scams. This development calls for heightened vigilance and regulatory measures to prevent the misuse of stablecoins while maintaining their legitimate financial utility.
FROM THE MEDIA: There is a significant shift in the landscape of cryptocurrency-related crimes, with stablecoins like Tether increasingly being used for illegal transactions. This shift is attributed to their stable value, which is appealing for activities like sanctions evasion and financial scams. In 2023, stablecoins were the predominant choice for these illicit activities, outstripping their use in legitimate transactions. The report's findings are alarming, as they suggest that while stablecoins are gaining popularity among general users, they are also becoming the currency of choice for criminals looking to exploit their stability and transactional ease. The trend underscores the need for more robust monitoring and regulatory frameworks to combat the growing use of stablecoins in criminal activities.
READ THE STORY: Wired
Intel Gains Legal Ground in Appeal Against €1bn EU Fine
Bottom Line Up Front (BLUF): Intel's long-standing legal battle against a €1bn fine imposed by the European Commission has taken a positive turn for the company. An advocate-general for the European Court of Justice, Laila Medina, identified errors in the Commission's economic analysis, potentially affecting the outcome of Intel's appeal. This case could have broader implications for future decisions on pricing practices within the EU.
Analyst Comments: The development in Intel's legal challenge against the European Commission's fine is noteworthy, as it signals potential shifts in how antitrust regulations are applied in the EU, especially concerning technology companies. The advocate-general's opinion, which pointed out flaws in the Commission's economic analysis under the "as-efficient competitor" test, could redefine the regulatory landscape for pricing practices. While this opinion is not binding, the European Court of Justice often aligns with such recommendations. The decision's potential impact extends beyond Intel, possibly influencing how other tech companies structure their pricing strategies in the EU. Additionally, Intel's substantial investment in the EU, including a planned €30bn boost in chip manufacturing, illustrates the company's strategic commitment to the region despite its legal challenges. This case underscores the complex interplay between large tech corporations and regulatory bodies in a rapidly evolving digital economy.
FROM THE MEDIA: Intel received support in its appeal against a €1.06bn fine levied by the European Commission in 2009. Advocate-General Laila Medina found that the Commission had incorrectly calculated the damage to competitors from Intel's rebate practices for computer chips. This opinion follows the European Court of Justice's 2022 decision to quash the original fine, challenging the Commission's findings of Intel abusing its dominant market position.
READ THE STORY: FT
Pro-Russian Hackers Target Swiss Websites During Davos Forum
Bottom Line Up Front (BLUF): Swiss websites, including those run by the Federal Administration, faced a series of distributed denial-of-service (DDoS) attacks coinciding with the World Economic Forum in Davos. The attacks, likely orchestrated by pro-Russian hackers, were claimed by a group known as NoName. These incidents align with the group's history of targeting European nations supporting Ukraine in the ongoing conflict with Russia.
Analyst Comments: The DDoS attacks on Swiss websites during the World Economic Forum highlight the evolving landscape of cyber warfare, where political motivations increasingly drive cyberattacks. The targeting of Swiss infrastructure by NoName, a group with pro-Kremlin interests, underscores the extension of geopolitical conflicts into the digital realm. These attacks, while causing temporary disruptions, signal a broader trend of nation-state-affiliated groups leveraging cyber tactics to express dissent and influence international events. Switzerland's anticipation of such cyber threats and its proactive measures reflect the growing need for national cybersecurity preparedness in the face of politically motivated cyber incidents.
FROM THE MEDIA: The coordinated DDoS attacks by NoName targeted not just government websites but also local airports, railways, hotels, and restaurants, demonstrating the group's capacity to disrupt a range of public and private sector services. The Swiss National Cybersecurity Centre's swift response to mitigate the attacks underscores the importance of rapid detection and response mechanisms in national cybersecurity strategies. The incidents also highlight the necessity for international cooperation in addressing cyber threats that cross national borders and impact global events like the World Economic Forum. As geopolitical tensions continue to manifest in cyberspace, the role of cybersecurity in national defense and international diplomacy becomes increasingly pivotal.
READ THE STORY: The Record
Sophisticated Trojan Disguised in npm Package "Oscompatible"
Bottom Line Up Front (BLUF): A malicious package named "oscompatible," uploaded to the npm registry, has been discovered deploying an advanced remote access trojan on Windows systems. Detected by software supply chain security firm Phylum, the package includes a set of binaries and scripts designed to bypass User Account Control and install the AnyDesk remote desktop software, along with a remote access trojan. The package, which attracted 380 downloads before removal, represents a growing trend of attackers targeting open-source software ecosystems for supply chain attacks.
Analyst Comments: The use of legitimate tools like Microsoft Edge components and PowerShell, combined with advanced techniques like DLL search order hijacking, showcases the evolving tactics of threat actors to bypass traditional security measures. This incident underlines the critical importance of robust security practices and vigilance in software development and deployment, especially in widely used platforms like npm. It also highlights the need for improved monitoring and rapid response mechanisms within open-source repositories to mitigate such threats.
FROM THE MEDIA: The "oscompatible" npm package utilized a multi-stage attack process, starting with a compatibility check for Windows OS, followed by privilege elevation through a UAC prompt. The trojanized DLL then decrypts and executes another DLL, establishing connections to a remote domain and retrieving a ZIP file containing AnyDesk and a remote access trojan. This sophisticated process demonstrates the advanced capabilities of the attackers, including the ability to capture keyboard and mouse events, install Chrome extensions, and disable Windows shutdown features. The incident serves as a warning about the vulnerabilities in software supply chains and the need for continuous security improvements in these ecosystems.
READ THE STORY: THN
CISA and FBI Warn of Threats Posed by Chinese Drones to US Critical Infrastructure
Bottom Line Up Front (BLUF): The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released guidance on the potential threats posed by Chinese-manufactured Unmanned Aircraft Systems (UAS) to U.S. critical infrastructure. This guidance aims to raise awareness among infrastructure owners and operators about the risks associated with using these drones, which could potentially expose sensitive information to Chinese authorities. The guidance highlights the legal framework in China that allows for government access to data held by firms within the country and recommends cybersecurity safeguards to mitigate these risks.
Analyst Comments: The timing and nature of these DDoS attacks during the World Economic Forum in Davos suggest a politically motivated cyber campaign, likely in response to Ukraine's presence at the forum. NoName's claim of responsibility and their history of aligning with pro-Kremlin interests point towards a continued pattern of cyberattacks as a form of political protest or disruption. These attacks demonstrate how international political events can become flashpoints for cyber aggression, particularly from groups with nation-state affiliations or sympathies. The Swiss National Cybersecurity Centre's (NCSC) anticipation and warning about potential cyberattacks indicate a growing awareness and preparedness for such incidents. However, the successful disruption caused by these attacks highlights the persistent challenge of safeguarding critical digital infrastructure against politically motivated cyber threats.
FROM THE MEDIA: The Swiss National Cybersecurity Centre (NCSC) reported that several Swiss websites, including those of the Federal Administration, were hit by DDoS attacks, temporarily disrupting access. The attacks were promptly detected, and measures were taken to restore access quickly. NoName, a Russian politically-motivated hacker group, claimed responsibility for these attacks, linking them to Ukrainian President Volodymyr Zelensky's attendance at the World Economic Forum in Davos.
READ THE STORY: The Record
New Docker Malware Campaign Exploits Vulnerable Services for Cryptomining and Traffic Generation
Bottom Line Up Front (BLUF): A novel cyberattack campaign is targeting vulnerable Docker services by deploying both an XMRig cryptocurrency miner and the 9Hits Viewer software, as reported by cloud security firm Cado. This multifaceted approach to monetization is the first documented case of malware using 9Hits as a payload. The attacks primarily impact Docker hosts, leading to resource exhaustion and potential further breaches.
Analyst Comments: This new campaign exploiting Docker services reflects a growing trend among cybercriminals to diversify their monetization strategies by combining different types of malware. The use of both the XMRig miner and 9Hits Viewer software in a single campaign is particularly notable for its dual approach. While XMRig harnesses the computing resources of the infected hosts for cryptocurrency mining, 9Hits Viewer drives artificial website traffic, which can be monetized through ad revenue or other means. The attackers' method of targeting Docker services, a popular platform for running applications, indicates a strategic move to exploit widely-used but potentially vulnerable systems. The impact of these attacks, particularly in terms of resource exhaustion and the potential for more serious breaches, underscores the need for robust security measures for Docker services and similar platforms.
FROM THE MEDIA: The attackers behind this campaign are exploiting vulnerable Docker services to deploy malware that generates profit through two channels: cryptocurrency mining and artificial website traffic generation. The XMRig miner is used to mine cryptocurrency using the computational resources of the compromised hosts. Simultaneously, the 9Hits Viewer software, which runs a headless Chrome browser instance, visits websites requested by other members of the 9Hits service, earning credits for the attacker.
READ THE STORY: THN
Broadcom's VMware Takeover Shakes Up Virtualization Market, Benefits Nutanix
Bottom Line Up Front (BLUF): Following Broadcom's acquisition of VMware, major changes to VMware's channel program and a focus shift are providing opportunities for competitors like Nutanix. Broadcom's strategy to focus on VMware Cloud Foundation and transition to subscription licensing has led to the end of VMware’s partner program and the divestment of certain company segments. This upheaval is causing partners and customers to consider alternatives, notably benefiting Nutanix.
Analyst Comments: Broadcom's acquisition and subsequent restructuring of VMware signify a major shift in the virtualization and cloud services market. By discontinuing VMware’s existing partner program and initiating significant organizational changes, Broadcom is realigning VMware's strategic focus towards its Cloud Foundation and subscription-based models. This move has created uncertainty among VMware's existing partners and customers, prompting them to explore alternatives. Nutanix, known for its hyperconverged infrastructure solutions, emerges as a primary beneficiary of this situation. Nutanix's AHV hypervisor and Cloud Platform are increasingly being seen as viable replacements for VMware's ESX hypervisor and related services. This development could lead to a reshuffling of market dynamics in the virtualization space, with potential long-term impacts on innovation, customer choice, and service models in cloud computing and data center management.
FROM THE MEDIA: The reorganization of VMware following Broadcom's takeover is causing significant disruptions in the virtualization market. Broadcom has ended VMware’s partner program and is focusing on selling VMware Cloud Foundation directly to top-tier customers, signaling a departure from VMware's traditional business model. These changes have raised concerns among partners and customers, many of whom are now evaluating alternatives to VMware's offerings.
READ THE STORY: The Register
Items of interest
Sarah Meiklejohn: The Codebreaker Who Shattered Bitcoin's Anonymity Myth
Bottom Line Up Front (BLUF): Sarah Meiklejohn, a graduate student at the University of California, San Diego, was instrumental in debunking the widely held belief that Bitcoin transactions are untraceable. Her pioneering research in 2013 revealed that Bitcoin's blockchain could actually be used to trace and identify users, overturning the crypto-anarchist notion of perfectly private digital cash. This discovery set the stage for a decade of advancements in cryptocurrency crime investigations, significantly impacting the field of cybercrime.
Analyst Comments: Sarah Meiklejohn's groundbreaking work in cryptocurrency tracing marked a significant turning point in understanding Bitcoin's anonymity - or lack thereof. Her methodical approach to analyzing the blockchain laid the foundation for a new era in digital forensics, challenging the previously held belief that Bitcoin transactions were inherently private and untraceable. By linking multiple Bitcoin addresses to single entities through her innovative clustering techniques, Meiklejohn not only proved the feasibility of tracking Bitcoin transactions but also opened the door for law enforcement agencies to investigate and crack down on cryptocurrency-related crimes. Her work highlights the importance of rigorous academic research in dispelling myths and shaping the future of technology and cybersecurity.
FROM THE MEDIA: Meiklejohn's research journey began with a simple curiosity about the usage patterns of Bitcoin. As she delved deeper, she uncovered the ability to link multiple addresses to single identities, fundamentally challenging the notion of anonymity in Bitcoin transactions. By manually engaging in numerous Bitcoin transactions and meticulously tagging them, Meiklejohn was able to identify patterns and relationships within the blockchain. Her methodical approach led to the revelation that Bitcoin's blockchain, contrary to popular belief, provided a level of transparency that could be harnessed to trace users' activities.
READ THE STORY: Wired
Major Stablecoin Issuer Tether Freezes $870,000 Linked to Criminal Activities in Israel and Ukraine (Video)
FROM THE MEDIA: The largest stablecoin issuer, Tether, has announced the freezing of 32 addresses associated with criminal funds related to incidents in Israel and Ukraine, amounting to $870,000.
$225M USDT Frozen by Tether: Unveiling Crypto Crime Fight! (Video)
FROM THE MEDIA: In today's eye-opening video, we dive deep into the unprecedented action taken by Tether, a leading stablecoin issuer, as they freeze a colossal $225 million in USDT. This is not just a financial maneuver; it's a powerful strike against an international web of romance scams and human trafficking.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.