Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop
Tag:

Spying

Decrypt logo
NFT Gaming

Israeli Man Accused of Spying for Iran in Exchange for Crypto

by admin June 24, 2025



In brief

  • Israel’s security agency has arrested a 27-year-old for allegedly photographing military sites for Iran.
  • Suspects allegedly received crypto payments worth $500 for each task, racking up thousands of dollars.
  • Two other Israeli citizens were arrested for similar espionage activities.

Israeli authorities have arrested a 27-year-old Tel Aviv man on espionage charges after he allegedly completed intelligence tasks for Iranian operatives in exchange for crypto payments.

The suspect allegedly carried out various missions, including photographing sensitive locations and spray-painting politically motivated graffiti, the Israel Security Agency (Shin Bet) and Tel Aviv District Police announced in a joint statement released to various local media on Monday.

Organizations behind the espionage activities “reach out through social media platforms,” the agencies said, urging citizens and residents of Israel “not to engage with foreign actors or carry out any missions on their behalf,” as cited in a report from local media outlet Arutz Sheva.

The arrests come as cyberattacks linked to the Israel–Iran conflict have intensified, with the conflict causing uncertainty in crypto markets.

Last week, a pro-Israel hacker group claimed responsibility for an exploit that drained roughly $90 million worth of crypto from Iranian exchange Nobitex, citing ties between the platform and Iranian intelligence services.

Crypto markets eased by Monday after President Trump claimed that a ceasefire mediated by Qatar was being discussed.

At the time of writing, Israel maintained warnings for citizens to take shelter, claiming a third Iranian missile barrage to be incoming, per an update from the Associated Press.



Paid in crypto

In the Sunday operation, authorities seized computers and digital storage devices suspected of being linked and used for communication with Iranian handlers working with Or Beilin, a Tel Aviv resident.

After his arrest, Beilin was brought before the Tel Aviv Magistrate’s Court, which decided to extend his detention to June 26, pending investigation.

Beilin joins two others already in custody by Israeli police, including Dmitri Cohen, 28, from Haifa.

Cohen was arrested last month on suspicion of gathering intelligence on Amit Yardeni, who was set to marry Avner Netanyahu, the son of Israeli Prime Minister Benjamin Netanyahu, according to a separate report from the Times of Israel.

Cohen was reportedly promised $500 for each task and received thousands in crypto since working with Iranian agents. Another individual was arrested in the Sharon region, though the 19-year-old suspect was not named in local reports.

Decrypt reached out to Shin Bet and the Israel Police to confirm identities and if the arrests formed a pattern.

Edited by Sebastian Sinclair

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.



Source link

June 24, 2025 0 comments
0 FacebookTwitterPinterestEmail
Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying
Product Reviews

Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying

by admin May 22, 2025


The hacker ecosystem in Russia, more than perhaps anywhere else in the world, has long blurred the lines between cybercrime, state-sponsored cyberwarfare, and espionage. Now an indictment of a group of Russian nationals and the takedown of their sprawling botnet offers the clearest example in years of how a single malware operation allegedly enabled hacking operations as varied as ransomware, wartime cyberattacks in Ukraine, and spying against foreign governments.

The US Department of Justice today announced criminal charges today against 16 individuals law enforcement authorities have linked to a malware operation known as DanaBot, which according to a complaint infected at least 300,000 machines around the world. The DOJ’s announcement of the charges describes the group as “Russia-based,” and names two of the suspects, Aleksandr Stepanov and Artem Aleksandrovich Kalinkin, as living in Novosibirsk, Russia. Five other suspects are named in the indictment, while another nine are identified only by their pseudonyms. In addition to those charges, the Justice Department says the Defense Criminal Investigative Service (DCIS)—a criminal investigation arm of the Department of Defense—carried out seizures of DanaBot infrastructure around the world, including in the US.

Aside from alleging how DanaBot was used in for-profit criminal hacking, the indictment also makes a rarer claim—it describes how a second variant of the malware it says was used in espionage against military, government, and NGO targets. “Pervasive malware like DanaBot harms hundreds of thousands of victims around the world, including sensitive military, diplomatic, and government entities, and causes many millions of dollars in losses,” US attorney Bill Essayli wrote in a statement.

Since 2018, DanaBot—described in the criminal complaint as “incredibly invasive malware”—has infected millions of computers around the world, initially as a banking trojan designed to steal directly from those PCs’ owners with modular features designed for credit card and cryptocurrency theft. Because its creators allegedly sold it in an “affiliate” model that made it available to other hacker groups for $3,000 to $4,000 a month, however, it was soon used as a tool to install different forms of malware in a broad array of operations, including ransomware. Its targets, too, quickly spread from initial victims in Ukraine, Poland, Italy, Germany, Austria, and Australia to US and Canadian financial institutions, according to an analysis of the operation by cybersecurity firm Crowdstrike.

At one point in 2021, according to Crowdstrike, Danabot was used in a software supply-chain attack that hid the malware in a javascript coding tool called NPM with millions of weekly downloads. Crowdstrike found victims of that compromised tool across the financial service, transportation, technology, and media industries.

That scale and the wide variety of its criminal uses made DanaBot “a juggernaut of the e-crime landscape,” according to Selena Larson, a staff threat researcher at cybersecurity firm Proofpoint.

More uniquely, though, DanaBot has also been used at times for hacking campaigns that appear to be state-sponsored or linked to Russian government agency interests. In 2019 and 2020, it was used to target a handful of Western government officials in apparent espionage operations, according to the DOJ’s indictment. According to Proofpoint, the malware in those instances was delivered in phishing messages that impersonated the Organization for Security and Cooperation in Europe and a Kazakhstan government entity.



Source link

May 22, 2025 0 comments
0 FacebookTwitterPinterestEmail

Categories

  • Crypto Trends (926)
  • Esports (703)
  • Game Reviews (653)
  • Game Updates (819)
  • GameFi Guides (918)
  • Gaming Gear (883)
  • NFT Gaming (902)
  • Product Reviews (872)
  • Uncategorized (1)

Recent Posts

  • Cardano (ADA) Price Prediction for August 21
  • Key Date for XRP Holders Revealed by Top US Exchange Gemini
  • Africa Is Buying a Record Number of Chinese Solar Panels
  • Razer and Side launch large-scale playtesting solution that could reduce costs by 80%
  • Tales Of Xillia Remastered Getting Physical PS5 And Switch Versions

Recent Posts

  • Cardano (ADA) Price Prediction for August 21

    August 21, 2025
  • Key Date for XRP Holders Revealed by Top US Exchange Gemini

    August 21, 2025
  • Africa Is Buying a Record Number of Chinese Solar Panels

    August 21, 2025
  • Razer and Side launch large-scale playtesting solution that could reduce costs by 80%

    August 21, 2025
  • Tales Of Xillia Remastered Getting Physical PS5 And Switch Versions

    August 21, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

About me

Welcome to Laughinghyena.io, your ultimate destination for the latest in blockchain gaming and gaming products. We’re passionate about the future of gaming, where decentralized technology empowers players to own, trade, and thrive in virtual worlds.

Recent Posts

  • Cardano (ADA) Price Prediction for August 21

    August 21, 2025
  • Key Date for XRP Holders Revealed by Top US Exchange Gemini

    August 21, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

@2025 laughinghyena- All Right Reserved. Designed and Developed by Pro


Back To Top
Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop

Shopping Cart

Close

No products in the cart.

Close