
The FBI claimed it found Incognito Market’s alleged owner, Rui-Siang Lin, by tracking crypto from the dark web drug market to a crypto exchange account allegedly in his name.
A 23-year-old man has been arrested in New York and charged with owning, running and profiting from a $100 million dark web narcotics marketplace after authorities claimed to have tracked crypto transfers that uncovered his real identity.
Rui-Siang Lin, known online as “Pharoah,” was arrested at New York’s John F. Kennedy Airport on May 18 and appeared in federal court on Monday, May 20, the Manhattan United States Attorney’s Office wrote in a statement.
“For nearly four years, Rui-Siang Lin allegedly operated ‘Incognito Market,’ one of the largest online platforms for narcotics sales, conducting $100 million in illicit narcotics transactions and reaping millions of dollars in personal profits,” added FBI Assistant Director in Charge James Smith.
Crypto hackers have turned their attention toward the crypto user, and “security hygiene” is more important than ever, according to Binance’s Jimmy Su.
Lurking in the shadiest corners of the dark web is a “well-established” ecosystem of hackers that target cryptocurrency users with poor “security hygiene,” according to Binance’s chief security officer, Jimmy Su.
Speaking to Cointelegraph, Su said that hackers had shifted their gaze toward crypto end-users in recent years.
Su noted when Binance first opened in July 2017, the team saw plenty of hacking attempts on its internal network. However, the focus has shifted as crypto exchanges continued to beef up their security.
Phishing scams are particularly prevalent in emails.
— Binance (@binance) July 4, 2023
They are used as a way to collect your sensitive information by impersonating someone you trust.
Use the blog below to learn how to stay safe from them. https://t.co/UtKBvR52lX
“Hackers always choose the lowest bar to achieve their goals because, for them, it’s a business as well. The hacker community is a well-established ecosystem.”
According to Su, this ecosystem comprises four distinct layers: intelligence gatherers, data refiners, hackers and money launderers.
The most upstream layer is what Su described as “threat intelligence.” Here, bad actors collect and collate ill-gotten intel about crypto users, creating entire spreadsheets filled with details about different users.
This could include crypto websites a user frequents, what emails they use, their name, and whether they’re on Telegram or social media.
“There is a market for this on the dark web where this information is sold [...] that describes the user,” explained Su in a May interview.
Su noted this information is usually gathered in bulk, such as previous customer information leaks, or hacks targeting other vendors or platforms.
An employee of our email vendor, https://t.co/6vM4WAcJal, misused their employee access to download & share email addresses with an unauthorized external party.
— OpenSea (@opensea) June 30, 2022
Email addresses provided to OpenSea by users or newsletter subscribers were impacted.https://t.co/Osb6qqkqZZ
In April, a research paper by Privacy Affairs revealed cybercriminals have been selling hacked crypto accounts for as little as $30 a pop. Forged documentation, often used by hackers to open accounts on crypto trading sites, can also be bought on the dark web.
According to Su, the data gathered is then sold downstream to another group — usually made up of data engineers specializing in refining data.
“For example, there was a data set last year for Twitter users. [...] Based on the information there, they can further refine it to see, based on the tweets to see which ones are actually crypto-related.”
These data engineers will then use “scripts and bots” to figure out which exchanges the crypto enthusiast may be registered with.
They do this by attempting to create an account with the user’s email address. If they get an error that says the address is already in use, they’ll know if they use the exchange, which could be valuable information that more targeted scams could use, said Su.
The third layer is usually what creates headlines. Phishing scammers or hackers will take the previously refined data to create “targeted” phishing attacks.
“Because now they know ‘Tommy’ is a user of exchange ‘X,’ they can just send an SMS saying, ‘Hey Tommy, we detected someone withdrew $5,000 from your account; please click this link and reach customer service if it wasn’t you.’”
In March, hardware wallet provider Trezor warned its users about a phishing attack designed to steal investors’ money by making them enter the wallet’s recovery phrase on a fake Trezor website.
The phishing campaign involved attackers posing as Trezor and contacting victims via phone calls, texts, or emails, claiming that there has been a security breach or suspicious activity on their Trezor account.
Once the funds are stolen, the final step is getting away with the heist. Su explained this could involve leaving the funds dormant for years and then moving them to a crypto mixer such as Tornado Cash.
Related: Arbitrum-based Jimbos Protocol hacked, losing $7.5M in Ether
“There are groups that we know that may sit on their stolen gains for two, three years without any movement,” added Su.
While not much can stop crypto hackers, Su urges crypto users to practice better “security hygiene.”
This could involve revoking permissions for decentralized finance projects if they no longer use them, or ensuring communication channels, such as email or SMS used for two-factor authentication, are kept private.
Magazine: Tornado Cash 2.0 — The race to build safe and legal coin mixers
The compromised accounts could give bad actors confidential information about companies and individuals.
Over the past year, more than 100,000 login credentials to the popular artificial intelligence chatbot ChatGPT have been leaked and traded on the dark web, according to a Singaporean cybersecurity firm.
A June 20 blog post by Group-IB revealed just over 101,000 compromised logins for OpenAI’s flagship bot have traded on dark web marketplaces between June 2022 and May 2023.
The login information was found in the logs of “info-stealing malware.” May 2023 saw a peak of nearly 27,000 ChatGPT-related credentials made available on online black markets.
According to our findings, the Asia-Pacific region has experienced the highest concentration of ChatGPT credentials being offered for sale. pic.twitter.com/s3TbsntCgX
— Group-IB Threat Intelligence (@GroupIB_TI) June 20, 2023
The Asia-Pacific region had the highest amount of compromised logins for sale over the past year, making up around 40% of the nearly 100,000 figure.
Indian-based credentials took the top spot overall with over 12,500 and the United States had the sixth most logins leaked online at nearly 3,000. France was seventh overall behind the U.S. and took the pole position for Europe.
ChatGPT accounts can be created directly through OpenAI. Additionally, users can choose to use their Google, Microsoft or Apple accounts to login and use the service.
Cointelegraph contacted OpenAI for comment but did not immediately receive a response.
Related: How AI is changing the way humans interact with machines
Group-IB said it noticed an uptick in the number of employees using ChatGPT for work. It warned confidential information about companies could be exposed by unauthorized users as user queries and chat history is stored by default.
Such information could then be exploited by others to undertake attacks against companies or individual employees.
The firm advised users to regularly update passwords and use two-factor authentication to better secure ChatGPT accounts.
Interestingly, the firm noted that the press release was written with the assistance of ChatGPT.
AI Eye: Is AI a nuke-level threat? Why AI fields all advance at once, dumb pic puns