{"id":79922,"date":"2024-05-30T11:46:17","date_gmt":"2024-05-30T15:46:17","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=79922"},"modified":"2024-05-30T11:46:20","modified_gmt":"2024-05-30T15:46:20","slug":"us-doj-arrests-chinese-citizen-over-130m-botnet-cyberscam","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/us-doj-arrests-chinese-citizen-over-130m-botnet-cyberscam\/","title":{"rendered":"US DOJ Arrests Chinese Citizen Over $130M Botnet Cyberscam"},"content":{"rendered":"\n<p>The<a href=\"https:\/\/coinscreed.com\/staging\/us-department-of-justice-charges-two-russians-in-mt-gox-hack.html\"> US Department of Justice<\/a> (DOJ) has arrested a Chinese national, Yunhe Wang, over his suspected involvement in the 130M botnet scam.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"830\" height=\"553\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/10\/US-Department-of-Justice-announces-the-launch-of-a-national-crypto-enforcement-team-1.jpg\" alt=\"US DOJ Arrests Chinese Citizen Over $130M botnet Cyberscam\" class=\"wp-image-11868\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/10\/US-Department-of-Justice-announces-the-launch-of-a-national-crypto-enforcement-team-1.jpg 830w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/10\/US-Department-of-Justice-announces-the-launch-of-a-national-crypto-enforcement-team-1-300x200.jpg 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/10\/US-Department-of-Justice-announces-the-launch-of-a-national-crypto-enforcement-team-1-768x512.jpg 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/10\/US-Department-of-Justice-announces-the-launch-of-a-national-crypto-enforcement-team-1-750x500.jpg 750w\" sizes=\"(max-width: 830px) 100vw, 830px\" \/><figcaption class=\"wp-element-caption\">US DOJ Arrests Chinese Citizen Over $130M botnet Cyberscam<\/figcaption><\/figure>\n\n\n\n<p>A 35-year-old national of the People's Republic of China and citizen-by-investment of St. Kitts and Nevis, Yune Wang, was arrested by the U.S. Department of Justice (DOJ) on suspicion of involvement in a botnet scam &#8220;used to commit cyber attacks, large-scale fraud, child exploitation, harassment, bomb threats, and export violations.&#8221;<\/p>\n\n\n\n<p>The indictment No. 29 of May, alleges that between 2014 and 202, Wang &#8220;created and disseminated malware to compromise and amass a network of millions of residential Windows computers worldwide&#8221; via the 911 S5 botnet, which impacted more than 19 million IP addresses. <\/p>\n\n\n\n<p>The defendant subsequently engaged in the sale of compromised IP addresses to cybercriminals in exchange for cryptocurrencies. These cybercriminals targeted victims in over 200 countries and orchestrated a multitude of computer-enabled offenses, such as identity theft, financial fraud, and child exploitation.<\/p>\n\n\n\n<p>Wang-affiliated wallet addresses collectively contained over $130 million in illicit commission-profitable digital assets, according to a separate analysis by the<a href=\"https:\/\/www.chainalysis.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> blockchain analytics firm Chainlysis<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a>. Scientists from Chainalysis composed:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>&#8220;The 911 S5 botnet was able to provide these services by distributing deceptive free VPN services to victims, which purported to give users enhanced privacy while browsing the web. In reality, 911 S5 used backdoors in its code to illegally hijack the IP addresses of millions of victims around the world. This enabled the 911 S5 administrators to make millions of dollars per year with a subscription-based service allowing cybercriminals to use victims\u2019 IP addresses.&#8221;<\/em><\/p>\n<\/blockquote>\n\n\n\n<p>In the interim, DOJ law enforcement officials added:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>&#8220;911 S5 customers allegedly targeted certain pandemic relief programs. For example, the United States estimates that 560,000 fraudulent unemployment insurance claims originated from compromised IP addresses, resulting in a confirmed fraudulent loss exceeding $5.9 billion.&#8221;<\/em><\/p>\n<\/blockquote>\n\n\n\n<p>Law enforcement officials from the United States, Singapore, Thailand, and Germany worked in concert to seize 23 domains across 70 servers that constituted the backbone of Wang's operations. Additionally, police claim to have seized $30 million in assets associated with 911 S5.<\/p>\n\n\n\n<p>A report surfaced last month suggesting that via application-specific <a href=\"https:\/\/coinscreed.com\/staging\/a-guide-to-crypto-mining-from-bitcoin-to-altcoins.html\" target=\"_blank\" rel=\"noreferrer noopener\">integrated circuit mining devices<\/a> manufactured domestically, China may have planted a Trojan Horse in the Bitcoin mining infrastructure of the United States. <\/p>\n\n\n\n<p>According to an authority, the rigs facilitate cyber espionage by Chinese intelligence agencies, which may target sensitive military installations, power systems, or communication networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The US Department of Justice (DOJ) has arrested a Chinese national, Yunhe Wang, over his suspected involvement in the 130M botnet scam. A 35-year-old national of the People&#8217;s Republic of China and citizen-by-investment of St. Kitts and Nevis, Yune Wang, was arrested by the U.S. Department of Justice (DOJ) on suspicion of involvement in a [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":11868,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[21],"tags":[19775,14256,19776],"class_list":["post-79922","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-botnet-cyberscam","tag-us-doj-2","tag-yunhe-wang"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/10\/US-Department-of-Justice-announces-the-launch-of-a-national-crypto-enforcement-team-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/79922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=79922"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/79922\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/11868"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=79922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=79922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=79922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}