Tuesday, February 18, 2025
Homecryptocurrency18 Individuals Charged for Widespread Manipulation Cryptocurrency Markets

18 Individuals Charged for Widespread Manipulation Cryptocurrency Markets

Published on

SIEM as a Service

Follow Us on Google News

18 individuals and entities have been charged with widespread fraud and manipulation within the cryptocurrency markets.

The charges, unsealed in Boston, target leaders of four cryptocurrency companies, four financial services firms known as “market makers,” and various employees.

This case marks a significant step in addressing fraudulent activities in the rapidly evolving digital currency landscape.

Details of the Allegations

The defendants are accused of employing deceptive tactics to inflate the value of cryptocurrencies, misleading investors into purchasing tokens at artificially boosted prices.

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try for Free

The scheme involved creating false trading activity through “wash trades,” where the same asset is bought and sold simultaneously to simulate market interest.

This practice, commonly known as a “pump and dump” scheme, allowed the perpetrators to sell their tokens at inflated prices. 

Among the companies implicated is Saitama, which once boasted a market value in the billions. The firm allegedly made false claims about its business operations and used extensive market manipulation.

Other notable entities involved include ZM Quant, CLS Global, MyTrade, and Gotbit, all of which are accused of facilitating wash trades to deceive investors.

Arrests and Guilty Pleas

US Attorneys’ investigation has already led to several arrests across multiple countries. Three defendants were apprehended in Texas, the United Kingdom, and Portugal.

Additionally, four individuals have pleaded guilty, with another agreeing to do so. Authorities have seized over $25 million in cryptocurrency and deactivated numerous trading bots responsible for millions of dollars in fraudulent transactions.

This case represents a collaborative effort between U.S. law enforcement agencies and international partners.

The Federal Bureau of Investigation (FBI) played a crucial role by creating its cryptocurrency token as part of an undercover operation to expose these fraudulent activities.

Legal and Financial Implications

The charges carry severe penalties, with potential sentences of up to 20 years in prison for market manipulation and wire fraud.

Defendants also face hefty fines and forfeiture of assets gained through illicit activities. The Securities & Exchange Commission has filed civil complaints against several parties for violating securities laws. 

Acting United States Attorney Joshua Levy emphasized the importance of this case as a deterrent against fraud in the cryptocurrency industry. He warned potential investors to remain vigilant and informed about the risks associated with digital currencies.

This case highlights how traditional financial crimes have adapted to exploit new technologies like cryptocurrency. Jodi Cohen, Special Agent of the FBI’s Boston Division, described it as a modern twist on old-school financial crime.

The operation, dubbed “Token Mirrors,” underscores the need for robust regulatory frameworks to protect investors in the digital age.

Investors are urged to conduct thorough research before engaging in digital currency transactions to avoid becoming victims of similar schemes.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide(PDF)

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension

SectopRAT, also known as Arechclient2, is a sophisticated Remote Access Trojan (RAT) developed using...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New Research Aims to Strengthen MITRE ATT&CK for Evolving Cyber Threats

A recent study by researchers from the National University of Singapore and NCS Cyber...

New LLM Vulnerability Exposes AI Models Like ChatGPT to Exploitation

A significant vulnerability has been identified in large language models (LLMs) such as ChatGPT,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension

SectopRAT, also known as Arechclient2, is a sophisticated Remote Access Trojan (RAT) developed using...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New Research Aims to Strengthen MITRE ATT&CK for Evolving Cyber Threats

A recent study by researchers from the National University of Singapore and NCS Cyber...