Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop
Tag:

Linked

Suspect in Minnesota Shooting Linked to Security Company, Evangelical Ministry
Gaming Gear

Suspect in Minnesota Shooting Linked to Security Company, Evangelical Ministry

by admin June 15, 2025


A man named Vance Boelter allegedly shot and killed Melissa Hortman, a Democratic Minnesota state representative, and her husband Mark Hortman at their home at some point early Saturday morning while, according to law enforcement, impersonating a police officer. He also allegedly shot state senator John Hoffman and his wife Yvette Hoffman at their home. They are alive, but remain in critical condition.

Law enforcement has said they found a manifesto and hit list in the alleged suspect’s car, which included politicians, abortion providers, and pro-abortion rights advocates. There were also allegedly fliers in his car for the “No Kings” protest against President Donald Trump, which took place in cities across the US on Saturday.

The 57-year-old, who has been identified as the suspected shooter by law enforcement, runs an armed security service with his wife, and has been affiliated with at least one evangelical organization, a ministry he has also run with his wife, according to a tax filing reviewed by WIRED. (His wife could not be immediately reached for comment.) According to public records and archived websites reviewed by WIRED, the suspect served for a time as the president of Revoformation Ministries. A version of the ministry’s website captured in 2011 carries a biography in which he is said to have been ordained in 1993.

According to an archived website for the ministry reviewed by WIRED, the suspected shooter’s missionary work took him to Gaza and the West Bank during the Second Intifada, where, the website states, he “sought out militant Islamists in order to share the gospel and tell them that violence wasn’t the answer.”

A later version of the site was designed, according to an archived copy, by Israeli web design firm J-Town. Charlie Kalech, CEO of J-Town, tells WIRED that the alleged suspect was, in his recollection, “clearly religious and evangelistic. He had lots of ideas to make the world a better place.” The suspect, whom Kalech said was “nothing but nice to me,” commissioned J-Town, Kalech recalled, because they’re Jerusalem-based, and he said he wanted to support Israel.

Over the previous several years, according to LinkedIn posts, he was also the CEO of Red Lion Group, which according to an archived copy of its website had aspirations in the oil refining, logging, and glass production sectors in the Democratic Republic of the Congo.

In a 2023 sermon reviewed by WIRED and delivered by the alleged shooter in Matadi, a city in the Democratic Republic of Congo that is on the border with Angola, he preached against abortion and called for different Christian churches to become “one.”

“They don’t know abortion is wrong, many churches,” he said. “They don’t have the gifts flowing. God gives the body gifts. To keep balance. Because when the body starts moving in the wrong direction, when they’re one, and accepting the gifts, God will raise an apostle or prophet to correct their course.”

”God is going to raise up apostles and prophets in America,” he added, “to correct His church.”



Source link

June 15, 2025 0 comments
0 FacebookTwitterPinterestEmail
Andrew Tate linked wallet down $600k, influencer promises to ‘make it all back'
NFT Gaming

Andrew Tate linked wallet down $600k, influencer promises to ‘make it all back’

by admin June 11, 2025



A Hyperliquid wallet linked to internet personality Andrew Tate showed that the influencer lost around $600,000 in leveraged funds, despite initially claiming he had a 138% gain in ETH long.

Traders were able to track down the former kickboxer’s Hyperliquid address after Andrew Tate bragged about his 138.5% gain on Hyperliquid (HYPE) and shared his referral code on a recent X post. The post has since been deleted, however it was already too late. Crypto traders were able to find his address in record-time and found that he had lost around $600,00 in leveraged ETH (ETH).

“Andrew Tate just showed his Hyperliquid trade that was 138.5% profitable to promote his ref link. He apparently forgot that it was a DEX, so his wallet was quickly found and discovered that he was $600,000 in the red,” wrote one trader on X upon discovering Tate’s wallet address.

“it was good while it lasted, bye hyperliquid,” said another user.

In response, Tate simply vowed that he would be able to get back all the money he lost in “one trade.” However, traders are doubtful that he can pull it off.

“I’ll make it all back with one trade. Watch this space,” said Tate.

Andrew Tate’s Hyperliquid wallet address was found after he shared his referral link on X, June 11, 2025 | Source: Hyperdash.info

According to the wallet’s data on Hyperdash, Tate only has one one going perp, which is an Ethereum long position that is leveraged at 25x. His perp equity stands at $146,267 While his earlier deleted post showed that it had risen by 138.5%, his gains have since surged to nearly 250%.

Apparently the gains are only apparent when traders zoom into his most recent trading activity. Within the last 24 hours, Tate has managed to reap a modest profit that has now amounted $16,721. He also has an unrealized PnL that stands at $40,091. However, when the chart is pulled back to all Hyperliquid trades, it reveals that the influencer actually lost a total of $580,113. This number far outweighs the current $16,721 profit he managed to accumulate.

Andrew Tate is no stranger to crypto controversies. Back in October 2024, YouTube Coffeezilla criticized Tate for promoting meme coins like ROOST and DADDY after previously displaying an antagonistic attitude towards crypto. Not long after, he began doxxing Coffeezilla for his comments.



Source link

June 11, 2025 0 comments
0 FacebookTwitterPinterestEmail
A Researcher Figured Out How to Reveal Any Phone Number Linked to a Google Account
Gaming Gear

A Researcher Figured Out How to Reveal Any Phone Number Linked to a Google Account

by admin June 9, 2025


A cybersecurity researcher was able to figure out the phone number linked to any Google account, information that is usually not public and is often sensitive, according to the researcher, Google, and 404 Media’s own tests.

The issue has since been fixed but at the time presented a privacy issue in which even hackers with relatively few resources could have brute forced their way to peoples’ personal information.

“I think this exploit is pretty bad since it’s basically a gold mine for SIM swappers,” the independent security researcher who found the issue, who goes by the handle brutecat, wrote in an email. SIM swappers are hackers who take over a target’s phone number in order to receive their calls and texts, which in turn can let them break into all manner of accounts.

In mid-April, we provided brutecat with one of our personal Gmail addresses in order to test the vulnerability. About six hours later, brutecat replied with the correct and full phone number linked to that account.

“Essentially, it’s bruting the number,” brutecat said of their process. Brute forcing is when a hacker rapidly tries different combinations of digits or characters until finding the ones they’re after. Typically that’s in the context of finding someone’s password, but here brutecat is doing something similar to determine a Google user’s phone number.

Brutecat said in an email the brute forcing takes around one hour for a U.S. number, or 8 minutes for a UK one. For other countries, it can take less than a minute, they said.

In an accompanying video demonstrating the exploit, brutecat explains an attacker needs the target’s Google display name. They find this by first transferring ownership of a document from Google’s Looker Studio product to the target, the video says. They say they modified the document’s name to be millions of characters, which ends up with the target not being notified of the ownership switch. Using some custom code, which they detailed in their write up, brutecat then barrages Google with guesses of the phone number until getting a hit.

“The victim isn’t notified at all :)” a caption in the video reads.

A Google spokesperson told 404 Media in a statement “This issue has been fixed. We’ve always stressed the importance of working with the security research community through our vulnerability rewards program and we want to thank the researcher for flagging this issue. Researcher submissions like this are one of the many ways we’re able to quickly find and fix issues for the safety of our users.”

Phone numbers are a key piece of information for SIM swappers. These sorts of hackers have been linked to countless hacks of individual people in order to steal online usernames or cryptocurrency. But sophisticated SIM swappers have also escalated to targeting massive companies. Some have worked directly with ransomware gangs from Eastern Europe.

Armed with the phone number, a SIM swapper may then impersonate the victim and convince their telecom to reroute text messages to a SIM card the hacker controls. From there, the hacker can request password reset text messages, or multi-factor authentication codes, and log into the victim’s valuable accounts. This could include accounts that store cryptocurrency, or even more damaging, their email, which in turn could grant access to many other accounts.

On its website, the FBI recommends people do not publicly advertise their phone number for this reason. “Protect your personal and financial information. Don’t advertise your phone number, address, or financial assets, including ownership or investment of cryptocurrency, on social media sites,” the site reads.

In their write-up, brutecat said Google awarded them $5,000 and some swag for their findings. Initially, Google marked the vulnerability as having a low chance of exploitation. The company later upgraded that likelihood to medium, according to brutecat’s write-up.



Source link

June 9, 2025 0 comments
0 FacebookTwitterPinterestEmail
Decrypt logo
GameFi Guides

US Seizes Crypto and 145 Domains Linked to Dark Web Marketplace

by admin June 5, 2025



In brief

  • U.S. authorities seized 145 domains and crypto linked to BidenCash, a marketplace that sold over 15 million stolen credit cards and generated $17 million in revenue.
  • BidenCash promoted itself by leaking millions of card records for free, using data dumps to attract cybercriminals.
  • The takedown follows global efforts like Operation RapTor, which recently led to 270 arrests and $200 million in crypto and cash seizures across 10 countries.

The U.S. government has seized 145 domains and undisclosed amounts of crypto tied to BidenCash, a dark web marketplace accused of selling millions of stolen credit cards and personal data.

BidenCash began operations in March 2022, offering a centralized space for buying and selling stolen credit card details, login credentials, and server access. 

Prosecutors said the marketplace served over 117,000 customers and generated more than $17 million in revenue during its two-year run by facilitating more than 15 million card transactions, per a statement released by the U.S. Attorney’s Office for the Eastern District of Virginia on Wednesday.

The domains seized in the operation will no longer be accessible and have been redirected to law enforcement-controlled servers, preventing further illicit activity.

The U.S. government has secured legal authorization to seize crypto funds tied to the marketplace, according to the statement.

During its operation, BidenCash administrators reportedly charged transaction fees while enabling users to buy stolen financial and personal information, including access credentials to compromised servers.



To promote its services and expand its reach, BidenCash periodically released massive datasets free of charge. 

Between October 2022 and February 2023, the platform published 3.3 million stolen credit card records, including card numbers, CVVs, account holder names, email addresses, and physical addresses. 

These giveaways were part of a strategy to attract users and build trust among cybercriminals, especially following disruptions such as distributed denial-of-service attacks, according to a report by cybersecurity firm SOCRadar.

DDoS attacks are coordinated efforts to flood a website or server with traffic, forcing it offline or disrupting access.

The takedown adds to a growing list of dark web enforcement actions targeting crypto-enabled criminal networks. 

Just last month, Operation RapTor resulted in the arrests of 270 individuals across 10 countries, the seizure of $200 million in assets, including hundreds of millions in crypto, and the dismantling of multiple dark web drug trafficking platforms.

Edited by Sebastian Sinclair

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.



Source link

June 5, 2025 0 comments
0 FacebookTwitterPinterestEmail

Categories

  • Crypto Trends (675)
  • Esports (511)
  • Game Reviews (483)
  • Game Updates (605)
  • GameFi Guides (676)
  • Gaming Gear (657)
  • NFT Gaming (654)
  • Product Reviews (655)
  • Uncategorized (1)

Recent Posts

  • Bitcoin Market Cools Calmly As Realized Profits Stay Within A Safe Range
  • The Nintendo Console Launches, Ranked From Worst To Best
  • Brad Pitt’s Sci-Fi Film Roles, Ranked
  • Fortnite Music Pass season 9
  • XRP Skyrockets 8,466% in Abnormal Liquidation Imbalance

Recent Posts

  • Bitcoin Market Cools Calmly As Realized Profits Stay Within A Safe Range

    June 19, 2025
  • The Nintendo Console Launches, Ranked From Worst To Best

    June 19, 2025
  • Brad Pitt’s Sci-Fi Film Roles, Ranked

    June 19, 2025
  • Fortnite Music Pass season 9

    June 19, 2025
  • XRP Skyrockets 8,466% in Abnormal Liquidation Imbalance

    June 19, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

About me

Welcome to Laughinghyena.io, your ultimate destination for the latest in blockchain gaming and gaming products. We’re passionate about the future of gaming, where decentralized technology empowers players to own, trade, and thrive in virtual worlds.

Recent Posts

  • Bitcoin Market Cools Calmly As Realized Profits Stay Within A Safe Range

    June 19, 2025
  • The Nintendo Console Launches, Ranked From Worst To Best

    June 19, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

@2025 laughinghyena- All Right Reserved. Designed and Developed by Pro


Back To Top
Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop

Shopping Cart

Close

No products in the cart.

Close