US Sanctions Sinbad Mixer: Disrupting Threats Unveiled

The U.S. Treasury Department recently took a significant step in the ongoing battle against cybercrime by imposing sanctions on Sinbad. It's a virtual currency mixer utilized by the North Korea-linked Lazarus Group to launder funds obtained through various heists.
This move aims to curb the nefarious activities associated with Sinbad, which has processed millions of dollars in virtual currency.
In this blog, we'll delve into the details of the US Sanctions Sinbad Mixer including the impact and the risks associated.
In response to Sinbad's involvement in money laundering activities, the U.S. Treasury Department not only imposed sanctions but also seized the mixer's website, tracking threat actors in cyberspace.
The sanctions target Sinbad's role in facilitating transactions related to sanctions evasion, drug trafficking, the purchase of illegal materials, and additional illicit sales on darknet marketplaces.
Mixers such as Blender, Tornado Cash, and ChipMixer faced similar measures, reinforcing the commitment to disrupt money laundering services supporting cyber criminals.
Despite these claims, Sinbad emerged as a replacement for Blender, with the Lazarus Group utilizing it to launder virtual currency acquired through the hacks of Atomic Wallet and Harmony Horizon Bridge.
Blockchain analytics firm Elliptic revealed that over one-third of funds sent to Sinbad originated from crypto hacks, making it a preferred choice for DPRK-based hacking activities after the takedown of Tornado Cash and Blender.io.
Sinbad's connection to ransomware actors, darknet markets, and scammers highlights its role in obfuscating the origin, destination, and counterparties involved in illicit transactions.
Elliptic's analysis suggests a strong likelihood that the same individual or group is behind both Sinbad and Blender.
This conclusion is drawn from an examination of on-chain patterns, the operational similarities between the two mixers' shared characteristics in their websites, and their connections to Russia.
Transactions involving a 'service' address on Sinbad's website, Bitcoin transfers between suspected Blender operator wallets, and payments to Sinbad promoters all point to a significant overlap between the two entities.
Chychasov, a Ukrainian national, received an eight-year federal prison sentence in the U.S. for selling personal information, emphasizing the severity of consequences for those engaged in illicit activities.
The joint operation that led to the takedown of SSNDOB involved collaboration between the U.S., Cyprus, and Latvia, showcasing the importance of international cooperation in combating cyber threats.
As per the US, Sinbad played a role in laundering a substantial share of the $100 million in cryptocurrency taken from Atomic Wallet in June 2023, the $620 million pilfered from Axie Infinity in March 2022, and the $100 million acquired from the Horizon Bridge hack in June 2022.
As we navigate the complex landscape of cybersecurity, it becomes evident that the US government response to cyber threats plays a pivotal role in shaping the resilience of our digital ecosystem.
As the US sanctions Sinbad mixer and seizes its website a significant milestone in the ongoing efforts to disrupt cybercriminal activities is achieved.
By targeting virtual currency mixers like Sinbad, authorities aim to undermine the financial infrastructure supporting hacking groups and other illicit enterprises.
The interconnected nature of these Sinbad Mixer cyber threats, as evidenced by the links between Sinbad and Blender, underscores the importance of a global, collaborative approach to safeguarding the digital landscape from malicious actors.
The sources for this piece include articles in The Hacker News and Security Week.


This Cyber News was published on securityboulevard.com. Publication date: Thu, 14 Dec 2023 07:43:04 +0000


Cyber News related to US Sanctions Sinbad Mixer: Disrupting Threats Unveiled

US Sanctions Sinbad Mixer: Disrupting Threats Unveiled - The U.S. Treasury Department recently took a significant step in the ongoing battle against cybercrime by imposing sanctions on Sinbad. It's a virtual currency mixer utilized by the North Korea-linked Lazarus Group to launder funds obtained through ...
6 months ago Securityboulevard.com
US Treasury sanctions Sinbad cryptocurrency mixer used by North Korean hackers - The U.S. Treasury Department on Wednesday sanctioned a popular cryptocurrency mixer used to launder funds stolen by hackers connected to the North Korean government. The Treasury Department's Office of Foreign Assets Control announced new sanctions ...
7 months ago Therecord.media
US seizes Sinbad crypto mixer used by North Korean Lazarus hackers - The U.S. Department of the Treasury has sanctioned the Sinbad cryptocurrency mixing service for its use as a money-laundering tool by the North Korean Lazarus hacking group. A cryptocurrency mixer is a server that allows people to deposit crypto, ...
7 months ago Bleepingcomputer.com
Feds Seize 'Sinbad' Crypto Mixer Used by North Korea's Lazarus - In its continued efforts to crack down on North Korea's most formidable state-sponsored threat group, the US government has seized a virtual currency mixer that has been serving as the principal way the group launders money stolen from its ...
7 months ago Darkreading.com
US sanctions Russian for cleaning Ryuk's and oligarchs' cash The Register - A Russian woman the US accuses of being a career money launderer is the latest to be sanctioned by the country for her alleged role in moving hundreds of millions of dollars on behalf of oligarchs and ransomware criminals. Among these was her alleged ...
7 months ago Theregister.com
North Korea's state hackers stole $3 billion in crypto since 2017 - North Korean-backed state hackers have stolen an estimated $3 billion in a long string of hacks targeting the cryptocurrency industry over the last six years since January 2017. Kimsuky, Lazarus Group, Andariel, and other North Korean hacking groups ...
7 months ago Bleepingcomputer.com
Britain and US Take Action Against Ransomware Criminals by Imposing Sanctions on Seven People - On Thursday, the United Kingdom and United States imposed sanctions on seven people linked to a single criminal network responsible for Conti and Ryuk ransomware gangs and the Trickbot banking trojan. This is the first major move of a new joint ...
1 year ago Therecord.media
North Korean Hackers' $12M Ethereum Laundering Via Tornado Cash Unveiled - It has been reported that North Korean hackers associated with the Lazarus Group have exploited Tornado Cash in a recent development to launder approximately $12 million worth of stolen Ethereum in the last 24 hours, using the coin mix-up service ...
3 months ago Cysecurity.news
Russian-Swedish national behind $400 million crypto mixer convicted of money laundering - A dual Russian-Swedish national was convicted Tuesday in U.S. federal court for operating a notorious cryptocurrency mixer that moved about $400 million in bitcoin over the course of a decade. Roman Sterlingov, 35, was arrested in April 2021 in Los ...
3 months ago Therecord.media
North Korea APT Slapped With Cyber Sanctions After Satellite Launch - The US Department of the Treasury Office of Foreign Assets Control has announced it has sanctioned cyberespionage group Kimsuky for collecting intelligence on behalf of the Democratic People's Republic of Korea. The OFAC said the sanctions are ...
7 months ago Darkreading.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
6 months ago Esecurityplanet.com
The Evolution of Cyber Threats: Past, Present, and Future - Cyber threats have evolved significantly over time, posing increasing risks to individuals, organizations, and governments in our interconnected world. Let's explore the past, present, and future of cyber threats to better understand how to protect ...
5 months ago Securityzap.com
US govt sanctions North Korea's Kimsuky hacking group - The Treasury Department's Office of Foreign Assets Control has sanctioned the North Korean-backed Kimsuky hacking group for stealing intelligence in support of the country's strategic goals. OFAC has also sanctioned eight North Korean agents for ...
7 months ago Bleepingcomputer.com
Protecting Your Digital Realm: Understanding Cybersecurity Threats and Defenses - Understanding the different types of cyber attacks and implementing robust security measures is crucial in safeguarding sensitive data and systems from malicious intent. In the dynamic landscape of cyberspace, threats to digital security continue to ...
5 months ago Feeds.dzone.com
Cybersecurity Trends: Shaping the Future Landscape - Embark on a journey through the ever-evolving landscape of cybersecurity, where hidden threats and silent breaches shape the digital realm. AI is transforming the cybersecurity landscape by enhancing threat detection and mitigation, ushering in a ...
3 months ago Securityzap.com
Lazarus Group hackers appear to return to Tornado Cash for money laundering - North Korea's Lazarus hacking group allegedly has turned back to an old service in order to launder $23 million stolen during an attack in November. Investigators at blockchain research company Elliptic said on Friday that in the last day they had ...
3 months ago Therecord.media
How to Identify & Monitor Insider Threat Indicators [A Guide] - Most security protocols look outward when looking for cybersecurity threats. Our recent study found that 42% of exposed credentials came from an insider threat-former employees whose credentials were still active, employee error, or a malicious ...
3 months ago Securityboulevard.com
Cracking the Code: The Role of AI and UBA in Mitigating Insider Threats to Businesses - Automating mundane tasks and driving data-driven decisions, big data enables businesses to make better decisions and drive transformation. The use of AI has been shown as an effective way of streamlining operations and enhancing security measures, ...
6 months ago Cysecurity.news
U.S. Treasury Sanctions Eight Foreign-Based Agents and North Korean Kimsuky Attackers - Sanctions imposed by the United States are technically in response for a North Korean military reconnaissance satellite launch on Nov. 21, but they are also intended to deprive the DPRK of revenue, materials, and intelligence needed to sustain its ...
6 months ago Cysecurity.news
How Much Do You Know About the Files Entering Your Endpoints? - Malware remains a significant and pervasive threat in the digital age, with its impacts being felt across various sectors globally. The threat of malware extends beyond healthcare. Organizations must prioritize enhanced visibility in their digital ...
5 months ago Securityboulevard.com
Navigating the Labyrinth of Digital Cyberthreats Using AI-Powered Cryptographic Agility - Welcome to the new world of cybersecurity - an ever-changing, intricate maze where new threats lurk around every corner. On the other hand, they can be used to create brand-new threats, introducing vulnerabilities previously unimagined, leaving our ...
3 months ago Cybersecurity-insiders.com
Navigating the Labyrinth of Digital Cyberthreats Using AI-Powered Cryptographic Agility - Welcome to the new world of cybersecurity - an ever-changing, intricate maze where new threats lurk around every corner. On the other hand, they can be used to create brand-new threats, introducing vulnerabilities previously unimagined, leaving our ...
3 months ago Cybersecurity-insiders.com
Navigating the Labyrinth of Digital Cyberthreats Using AI-Powered Cryptographic Agility - Welcome to the new world of cybersecurity - an ever-changing, intricate maze where new threats lurk around every corner. On the other hand, they can be used to create brand-new threats, introducing vulnerabilities previously unimagined, leaving our ...
3 months ago Cybersecurity-insiders.com
Navigating the Labyrinth of Digital Cyberthreats Using AI-Powered Cryptographic Agility - Welcome to the new world of cybersecurity - an ever-changing, intricate maze where new threats lurk around every corner. On the other hand, they can be used to create brand-new threats, introducing vulnerabilities previously unimagined, leaving our ...
3 months ago Cybersecurity-insiders.com
Navigating the Labyrinth of Digital Cyberthreats Using AI-Powered Cryptographic Agility - Welcome to the new world of cybersecurity - an ever-changing, intricate maze where new threats lurk around every corner. On the other hand, they can be used to create brand-new threats, introducing vulnerabilities previously unimagined, leaving our ...
3 months ago Cybersecurity-insiders.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)