Tagged articles
7 articles
Page 1 of 1
Black & White Path
Black & White Path
May 20, 2026 · Industry Insights

How a Dark‑Web Drug King Was Caught After Sending Bitcoin‑Bought Gold Bars to His Home

The article recounts the seven‑year evasion of a dark‑web drug trafficker who converted illicit cryptocurrency into gold bars, mailed them to his German address, and was ultimately exposed through blockchain analysis and KYC‑linked purchases, illustrating that cryptocurrency is not truly anonymous.

KYCblockchain analysiscryptocurrency
0 likes · 7 min read
How a Dark‑Web Drug King Was Caught After Sending Bitcoin‑Bought Gold Bars to His Home
Black & White Path
Black & White Path
Apr 9, 2026 · Information Security

North Korean IT Worker’s ‘123456’ Password Exposes $1M Money‑Laundering Backend

An investigation by ZachXBT uncovered that a North Korean IT laborer’s use of the default password “123456” on the internal payment platform luckyguys.site allowed researchers to access a $1 million‑per‑month money‑laundering operation, revealing weak OpSec, infostealer infection, forged identities, and links to OFAC‑sanctioned companies.

BlockchainOPSECinformation security
0 likes · 7 min read
North Korean IT Worker’s ‘123456’ Password Exposes $1M Money‑Laundering Backend
Architect
Architect
Aug 21, 2024 · Industry Insights

How Dark Apps Launder Money Through Phone and Electricity Top‑Ups

The article analyzes a hidden money‑laundering ecosystem where shady mobile apps use phone‑bill and electricity‑bill recharge interfaces, various QR‑code transfers, and intermediary shops to disguise illicit funds, detailing the process, payment methods, server traces, and the challenges of dismantling the network.

black marketindustry insightmoney laundering
0 likes · 9 min read
How Dark Apps Launder Money Through Phone and Electricity Top‑Ups
Architecture Digest
Architecture Digest
Jul 25, 2024 · Information Security

Investigation of Phone and Electricity Recharge Money‑Laundering Schemes in Illicit Apps

The article analyzes how shady mobile applications exploit phone‑credit and electricity‑bill recharge interfaces to funnel user payments through complex, hidden channels, describing the laundering chain, various payment methods, server tracing details, and the broader security implications for the black‑gray market.

black marketcybercrimeinformation security
0 likes · 8 min read
Investigation of Phone and Electricity Recharge Money‑Laundering Schemes in Illicit Apps
Java Architect Essentials
Java Architect Essentials
Feb 22, 2024 · Information Security

Analysis of Recharge‑Based Money Laundering Schemes in Illicit Apps

The article examines how certain shady applications use phone‑bill and electricity‑bill recharge interfaces as covert channels to launder money, detailing the multi‑step chain from unsuspecting consumers through small merchants and QR‑code transfers to black‑market accounts, and warns readers of the hidden risks.

black marketcybercrimemoney laundering
0 likes · 7 min read
Analysis of Recharge‑Based Money Laundering Schemes in Illicit Apps
Java Architect Essentials
Java Architect Essentials
Feb 25, 2023 · Information Security

Analysis of Phone and Electricity Recharge Money‑Laundering Schemes in Illicit Apps

The article investigates how certain illicit mobile applications use phone‑bill and electricity‑bill recharge interfaces to launder money, describing the hidden industry chain, the roles of unsuspecting users, the various payment methods involved, and the challenges of tracing the illicit funds.

illicit appsinformation securitymoney laundering
0 likes · 11 min read
Analysis of Phone and Electricity Recharge Money‑Laundering Schemes in Illicit Apps
Java Architect Essentials
Java Architect Essentials
Aug 1, 2021 · Information Security

Investigation Exposes High‑Tech Investment Scam Apps Built by Elite Computer Science Graduates

A recent police announcement reveals a massive network‑investment fraud scheme in which sophisticated, custom‑made scam apps—developed by top university computer science graduates—tricked victims nationwide into investing over 1 billion yuan, while also operating a large‑scale money‑laundering platform.

cybersecurityinvestment fraudmoney laundering
0 likes · 8 min read
Investigation Exposes High‑Tech Investment Scam Apps Built by Elite Computer Science Graduates