PANews reported on September 22nd that data from the Financial Information Analysis Unit ( FIU ) of South Korea showed that virtual asset service providers submitted 36,684 suspicious transaction reports ( STRs ) from January to August 2025 , exceeding the combined total of the previous two years. During the same period, virtual asset-related crimes totaled 9.56 trillion won, with "underground banking" crimes accounting for over 90%. Recently, stablecoins such as USDT have been used for illegal cross-border fund transfers, and relevant authorities are strengthening their monitoring and oversight.PANews reported on September 22nd that data from the Financial Information Analysis Unit ( FIU ) of South Korea showed that virtual asset service providers submitted 36,684 suspicious transaction reports ( STRs ) from January to August 2025 , exceeding the combined total of the previous two years. During the same period, virtual asset-related crimes totaled 9.56 trillion won, with "underground banking" crimes accounting for over 90%. Recently, stablecoins such as USDT have been used for illegal cross-border fund transfers, and relevant authorities are strengthening their monitoring and oversight.

Suspicious virtual asset transactions in South Korea surge, exceeding last year's total in the first eight months of this year

2025/09/22 09:11

PANews reported on September 22nd that data from the Financial Information Analysis Unit ( FIU ) of South Korea showed that virtual asset service providers submitted 36,684 suspicious transaction reports ( STRs ) from January to August 2025 , exceeding the combined total of the previous two years. During the same period, virtual asset-related crimes totaled 9.56 trillion won, with "underground banking" crimes accounting for over 90%. Recently, stablecoins such as USDT have been used for illegal cross-border fund transfers, and relevant authorities are strengthening their monitoring and oversight.

Aviso legal: Los artículos republicados en este sitio provienen de plataformas públicas y se ofrecen únicamente con fines informativos. No reflejan necesariamente la opinión de MEXC. Todos los derechos pertenecen a los autores originales. Si consideras que algún contenido infringe derechos de terceros, comunícate con service@support.mexc.com para solicitar su eliminación. MEXC no garantiza la exactitud, la integridad ni la actualidad del contenido y no se responsabiliza por acciones tomadas en función de la información proporcionada. El contenido no constituye asesoría financiera, legal ni profesional, ni debe interpretarse como recomendación o respaldo por parte de MEXC.
Compartir perspectivas

También te puede interesar

Steam Users Lost $150,000 From a Crypto Gaming Scam

Steam Users Lost $150,000 From a Crypto Gaming Scam

The post Steam Users Lost $150,000 From a Crypto Gaming Scam appeared on BitcoinEthereumNews.com. Online gaming storefront Steam unknowingly hosted crypto malware through one of its games. “Block Blasters,” the fake game in question, enabled at least $150,000 in token thefts. Steam removed this game after popular crypto sleuths amplified news of the hack. Still, the incident represents a major security breach for this venerable software platform. Steam Hosted Crypto Malware Part of the ongoing crypto crime wave has involved increasingly sophisticated malware operations, which use new vectors to steal tokens. Sponsored Sponsored Nonetheless, this newest scamming method is particularly unsettling. Steam is the gold standard for online gaming storefronts, and it directly hosted crypto malware: You clowns allow malware on your platform that has resulted in $150K+ stolen from victims (fake game has been available to download for more than a month) pic.twitter.com/886rO1PbDP — ZachXBT (@zachxbt) September 21, 2025 Specifically, Steam hosted sales of “Block Blasters,” a fake game containing dangerous malware. For over one month, this game was live, running secret executables that would target players’ wallets. In this way, it stole at least $150,000 in various cryptoassets, but the total theft quantity may be much higher. Cracking The Case ZachXBT, a famous crypto sleuth, didn’t necessarily spearhead this malware investigation, but he used his large platform to alert Steam. To its credit, the platform quickly removed the game after his notification. Nonetheless, it never should’ve survived on the storefront for several weeks. The investigators who unraveled this scheme uncovered several disturbing trends. First of all, the malware itself showed telltale fingerprints of AI-generated code, which allowed white hats to dissect it comprehensively. This may explain how they were able to confront the hackers directly. Essentially, this Steam crypto malware investigation began after a terminally ill cancer patient was defrauded of $32,000. The criminals showed zero remorse when confronted, claiming that the…
Compartir
BitcoinEthereumNews2025/09/23 04:44
Compartir