Tuesday, July 16, 2024

Dark Web Drug Vendor Pleads Guilty After Federal Authorities Seized his Bitcoin Worth Nearly $1 Million

Gal Vallerius a 36-year-old Frenchman pleaded guilty in Miami federal court, he was a well-known drug vendor by his alias name “OxyMonster” on the underground marketplace Dream Market.

He was arrested by U.S authorities last year when he arrived at united states to participate in world beard-growing championship.

“Atlanta International Airport confirmed his identity as “OxyMonster”. On his laptop was the TOR browser, apparent log-in credentials for Dream Market $500,000 worth of bitcoin, and a PGP encryption key entitled ”OxyMonster” which matched that advertised as “OxyMonster” on Dream Market.”

“The user “OxyMonster” title was marked as Senior moderator. Agents clicked on the user “OxyMonster” and were taken to “OxyMonster” profile on the Dream Market.”

Vallerius pleaded guilty in Miami federal court and the judges impose 20 years prison, but he could reduce the time by cooperating with investigators.

Also Read Hacker who Stolen Personal details of users from Various sites Including Uber and Groupon Pleaded Guilty

According to a DEA Vallerius had Twitter and Instagram account and the officials compared the writing of social media account with Dream market account.

Agents discovered many similarities in the use of words and punctuation, including the word “cheers,” double exclamation marks, frequent use of quotation marks, and intermittent French posts,” court documents say.

In court hiring Vallerius said that he started as the vendor selling oxycodone and Ritalin, later he hired to act as an administrator and moderator of Dream Market to facilitate the transactions.

Investigators observed the bitcoin “tip jar” address advertised by “OxyMonster” and they identified around 15 to 17 transactions from tip jar advertised account to the wallet controlled by Vallerius on localbitcoins.com.

Federal agents also seized 99 bitcoins and 121 Bitcoin cash that worth nearly 1M based on the exchange rates.


Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles