Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Designing For TV: Principles, Patterns And Practical Guidance (Part 2)

      September 5, 2025

      Neo4j introduces new graph architecture that allows operational and analytics workloads to be run together

      September 5, 2025

      Beyond the benchmarks: Understanding the coding personalities of different LLMs

      September 5, 2025

      Top 10 Use Cases of Vibe Coding in Large-Scale Node.js Applications

      September 3, 2025

      Building smarter interactions with MCP elicitation: From clunky tool calls to seamless user experiences

      September 4, 2025

      From Zero to MCP: Simplifying AI Integrations with xmcp

      September 4, 2025

      Distribution Release: Linux Mint 22.2

      September 4, 2025

      Coded Smorgasbord: Basically, a Smorgasbord

      September 4, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Drupal 11’s AI Features: What They Actually Mean for Your Team

      September 5, 2025
      Recent

      Drupal 11’s AI Features: What They Actually Mean for Your Team

      September 5, 2025

      Why Data Governance Matters More Than Ever in 2025?

      September 5, 2025

      Perficient Included in the IDC Market Glance for Digital Business Professional Services, 3Q25

      September 5, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      How DevOps Teams Are Redefining Reliability with NixOS and OSTree-Powered Linux

      September 5, 2025
      Recent

      How DevOps Teams Are Redefining Reliability with NixOS and OSTree-Powered Linux

      September 5, 2025

      Distribution Release: Linux Mint 22.2

      September 4, 2025

      ‘Cronos: The New Dawn’ was by far my favorite experience at Gamescom 2025 — Bloober might have cooked an Xbox / PC horror masterpiece

      September 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»DOJ Moves to Seize $848K in Tether Linked to Crypto Confidence Scams

    DOJ Moves to Seize $848K in Tether Linked to Crypto Confidence Scams

    September 6, 2025

    Confidence Scams

    The U.S. Department of Justice has initiated a civil forfeiture action targeting $848,247 in Tether (USDT), suspected to be proceeds from elaborate confidence scams that defrauded victims across several states. The funds, laundered through a complex network of cryptocurrency wallets, are believed to be tied to schemes operating between September 2022 and February 2025. 

    The civil complaint was filed in the District of Columbia, as announced by U.S. Attorney Jeanine Ferris Pirro, with support from Acting Assistant Attorney General Matthew R. Galeotti of the Justice Department’s Criminal Division and FBI Special Agent in Charge David K. Porter from the Honolulu Field Office. 

    Confidence Scams with a Personal Touch 

    The investigation for these confidence scams, led by the FBI Honolulu Division Cyber Squad, began in late 2022 when a victim in Hawaii reported a loss of $1.3 million to the LME Crypto Group. This group falsely claimed to be affiliated with the London Metal Exchange while running a cryptocurrency investment fraud that exploited online relationships to lure victims into depositing money on fraudulent trading platforms. 

    One victim in the District of Columbia reported a loss of $30,000 in December 2023 through the FBI’s Internet Crime Complaint Center (IC3). The individual believed they were making a legitimate investment that would generate “big profits in a short amount of time” and deposited funds via a platform called “LME.” Like others, they were misled into believing the investment was both legitimate and lucrative, until access to their funds was cut off. 

    The confidence scams detailed in the complaint often begin with simple, misdirected text messages. These messages are used to initiate contact with victims, who are then manipulated over time via dating apps, social networking platforms, or professional investment groups. Scammers typically cultivate trust and recommend fake investment opportunities, boasting their own (fabricated) financial success. 

    Fake Platforms, Real Losses 

    A common scam pattern involves directing victims to websites that closely mimic legitimate trading platforms. Scammers assist victims in opening cryptocurrency exchange accounts, often U.S.-based, and help them transfer funds, eventually funneling all assets into wallets under the scammer’s control. Early in the process, victims are sometimes allowed to withdraw a small portion of supposed “profits” to build credibility. Eventually, however, all access is cut off, and victims are locked out permanently. 

    These fraudulent platforms can look authentic and display fake dashboards showing inflated returns, all designed to encourage further investment. But beneath the surface, all activity routes to addresses are fully controlled by the perpetrators. In the end, victims are left with nothing. 

    In 2024 alone, the FBI’s IC3 received reports of approximately $5.8 billion in losses linked to cryptocurrency investment fraud. 

    Government Action and Ongoing Investigation 

    The Justice Department acknowledged the support of Tether, the issuer of the USDT cryptocurrency, in assisting with the asset seizure. Additional assistance came from the Department’s Office of International Affairs and the FBI’s Virtual Asset Unit for confronting these confidence scams.

    The case is being prosecuted by Assistant U.S. Attorneys Kevin Rosenberg and Rick Blaylock Jr. from the District of Columbia, in collaboration with Trial Attorneys Stefanie Schwartz, Ethan Cantor, and Gaelin Bernstein from the Computer Crime and Intellectual Property Section, and Daniel Zytnick from the Consumer Protection Branch of the Justice Department. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleParents warned that robot toys spied on children’s location without consent
    Next Article Streameast Piracy Network Dismantled After Global Enforcement Operation

    Related Posts

    Development

    GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

    September 6, 2025
    Development

    VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages

    September 6, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    HeyDream AI: Advanced AI Image Generator

    Web Development

    CVE-2025-33103 – IBM i TCP/IP Connectivity Utilities for i Privilege Escalation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    T-Mobile will give you 4 free iPhone 16 phones right now – here’s how to get yours

    News & Updates

    68% of tech vendor customer support to be handled by AI by 2028, says Cisco report

    News & Updates

    Highlights

    CVE-2024-26009 – Fortinet FortiOS Authentication Bypass via FGFM Requests

    August 12, 2025

    CVE ID : CVE-2024-26009

    Published : Aug. 12, 2025, 7:15 p.m. | 6 hours, 25 minutes ago

    Description : An authentication bypass using an alternate path or channel [CWE-288] vulnerability in Fortinet FortiOS version 6.4.0 through 6.4.15 and before 6.2.16, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8 and before 7.0.15 & FortiPAM before version 1.2.0 allows an unauthenticated attacker to seize control of a managed device via crafted FGFM requests, if the device is managed by a FortiManager, and if the attacker knows that FortiManager’s serial number.

    Severity: 8.1 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    La rivoluzione architetturale di AerynOS: Non solo una distribuzione GNU/Linux

    May 25, 2025

    CVE-2025-53384 – Apache HTTP Server Information Disclosure

    June 28, 2025

    How Amazon maintains accurate totals at scale with Amazon DynamoDB

    May 19, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.