Top related persons:
Top related locs:
Top related orgs:

Search resuls for: "Darkweb"


6 mentions found


The cofounders of crypto mixer Samourai Wallet were charged with money laundering. The service anonymized hundreds of millions of dollars for dark web criminals, prosecutors said. AdvertisementThe cofounders of a cryptocurrency mixing service called Samourai Wallet — which rendered crypto transactions anonymous — have been arrested and charged with money laundering, according to an indictment unsealed Wednesday. Rodriguez and Hill were charged with conspiracy to commit money laundering and conspiracy to operate an unlicensed money transmitting business. Related storiesThe Samourai Wallet website has been seized.
Persons: Samourai's cofounders, , — Keonne Rodriguez, William Lonergan Hill —, Rodriguez, Hill, James Smith, haven't Organizations: Service, Prosecutors, Southern, of, FBI Locations: of New York, Portugal, DMs
Surfing the web in the 1990s and early 2000s was a slower endeavor, and fewer people had access to the technology. Those robust online forums have since been flattened into algorithmic social media feeds or hidden on messaging apps, a shift mourned by several video games with a shared fondness for bygone internet eras. Games like last year’s Videoverse, 2019’s Hypnospace Outlaw and the upcoming Darkweb Streamer use chat interfaces akin to AIM or MSN, as well as fake websites that greet people with MIDI songs and text written in bold fonts. Each experience has its own nostalgic lens but is a snapshot of lost expression, creativity and independence. Chantal Ryan, an anthropologist and the lead developer of Darkweb Streamer, a horror simulation game that merges the perils of modern streaming with the ’90s internet, bemoaned how high-quality independent services were often cannibalized by corporate interests.
Persons: Videoverse, Chantal Ryan Organizations: AIM, MSN, Amazon
Advertisement23andMe customer accounts were breached by hackers last year, but it took the DNA testing company five months to detect the intrusion. The company learned about the attack after stolen customer data was advertised on Reddit, as well as on the darkweb forum BreachForums, per the filing. The filing stated: "On October 10, we required all 23andMe customers to reset their password. 23andMe previously told Business Insider that the hackers gained access to customer data through " credential stuffing ." 23andMe didn't immediately respond to a request for comment from Business Insider, made outside normal working hours.
Persons: 23andMe, didn't, , 23andMe didn't Organizations: Service, TechCrunch, Business
REUTERS/Kacper Pempel/Illustration/File Photo Acquire Licensing RightsWASHINGTON, Nov 29 (Reuters) - A cyber extortion gang suspected of being an offshoot of the notorious Russian Conti group of hackers has raked in more than $100 million since it emerged last year, researchers said in a report published on Wednesday. An attempt to reach Black Basta via its darkweb site was not immediately successful. Elliptic cofounder Tom Robinson said the massive haul made Black Basta "one of the most profitable ransomware strains of all time." "Conti was perhaps the most successful ransomware gang we've seen," Robinson said. The latest findings suggest "some of the individuals responsible are replicating its success with the Black Basta ransomware."
Persons: Kacper, Russian Conti, Tom Robinson, Robinson, Conti, Black Basta, we've, Basta, Raphael Satter, James Pearson, Gerry Doyle Organizations: REUTERS, Rights, Insurance, U.S . Treasury, Thomson Locations: Russian, bitcoin, Black, Russia, Ukraine, London
[1/3] A redacted online resume of a North Korean IT worker is shown in this screenshot of a report obtained by Reuters on November 20, 2023. The documents contain dozens of fraudulent resumes, online profiles, interview notes, and forged identities that North Korean workers used to apply for jobs in software development. Some of the scripts, designed to prepare the workers for interview questions, contain excuses for the need to work remotely. North Korean developers working at U.S. companies had hidden behind pseudonymous email and social media accounts and generated millions of dollars a year on behalf of sanctioned North Korean entities through the scheme, the DOJ said. The researchers, part of Palo Alto's Unit 42 cyber research division, made the discovery when examining a campaign by North Korean hackers that targeted software developers.
Persons: Richard, Covid, Richard Lee, , James Pearson, Ted Hesson, Daphne Psaledakis, Chris Sanders, Anna Driver Organizations: North, Reuters, Palo Alto Networks, REUTERS Acquire, Palo Alto, United Nations, United, United Arab Emirates, U.S . Justice Department, DOJ, Federal Bureau of Investigation, FBI, North Korean, U.S, of Liberty, Palo Alto's, Constella Intelligence, U.S . Department of Homeland Security, Thomson Locations: North Korean, Korean, North Korea, United States, South Korea, U.S, Chile, New Zealand, Uzbekistan, United Arab, Singapore, Los Angeles, LA, China, Russia, Africa, Southeast Asia, Pyongyang, Palo, Britain, Japan, Spain, Australia, Washington
Procurorii DIICOT au destructurat o reţea de traficanţi droguri din București condusă de o femeie, care aducea heroină din Turcia sau etnobotanice comandate în Olanda prin Darkweb - reţeaua „ascunsă” de pe Internet folosită de grupări criminale din toată lumea, informează DIICOT. De asemenea, din grupare mai făceau parte un cumnat al femeii, dar și fiul ei. Anchetatorii au descoperit că femeia s-a deplasat de mai multe ori în Turcia, unde avea stabilite relaţii vechi cu furnizori de heroină. Un rol important îl avea şi fiul femeii care se ocupa de traficul de cocaină. Alţi membri ai grupării aveau rolul de a efectua comenzi online pe Darkweb de substanţe psihoactive (etnobotanice) de pe teritoriul Olandei, plăţile fiind realizate cu criptomonedă Bitcoin.
Persons: Anchetatoriii, Miercuri Organizations: DIICOT Locations: București, Turcia, Olanda, Darkweb, România, Bucureşti, Olandei, Capitală, ţara
Total: 6