Scan to download
BTC $77,798.80 +4.10%
ETH $2,447.87 +4.31%
BNB $643.04 +3.12%
XRP $1.49 +4.38%
SOL $89.96 +3.57%
TRX $0.3249 -0.39%
DOGE $0.1006 +3.99%
ADA $0.2641 +4.98%
BCH $459.24 +4.55%
LINK $9.77 +4.08%
HYPE $44.91 +0.31%
AAVE $116.30 +6.86%
SUI $1.02 +5.23%
XLM $0.1746 +7.67%
ZEC $343.08 +1.74%
BTC $77,798.80 +4.10%
ETH $2,447.87 +4.31%
BNB $643.04 +3.12%
XRP $1.49 +4.38%
SOL $89.96 +3.57%
TRX $0.3249 -0.39%
DOGE $0.1006 +3.99%
ADA $0.2641 +4.98%
BCH $459.24 +4.55%
LINK $9.77 +4.08%
HYPE $44.91 +0.31%
AAVE $116.30 +6.86%
SUI $1.02 +5.23%
XLM $0.1746 +7.67%
ZEC $343.08 +1.74%

ransomware

ZachXBT accuses Russian OTC broker Aleks Khinkis of being involved in a $4.7 million ransomware money laundering case

Renowned on-chain investigator ZachXBT released a report today stating that a Russian over-the-counter (OTC) broker named Aleksandr (Aleks) Khinkis is suspected of assisting ransomware groups in laundering over $4.7 million since 2025 through a single cryptocurrency trading platform account.The related funds involve three suspicious ransom payments, totaling approximately 796 bitcoins (BTC). The investigation shows that these funds were transferred in batches to his trading platform's deposit address (0xa756) after being bridged between Bitcoin and Avalanche, completing a total of 75 transactions from 2025 to 2026. Additionally, approximately $16.6 million is currently still held in Aave and is being gradually liquidated.ZachXBT pointed out multiple ransom transactions: a ransom payment of about 72 BTC in September 2025 was bridged to the related address; a ransom of about 164 BTC was also discovered in October 2025 and converted to approximately $3.8 million. Some related addresses were blacklisted by Tether in November 2025, and the subsequently frozen USDT was destroyed three weeks ago, indicating that law enforcement and compliance agencies have intervened.Earlier in 2023, this account was also involved in a ransom transaction of about 560 BTC, which was circulated through multiple intermediary addresses and trading platforms before being bridged back to the Avalanche network in 2024. Furthermore, the investigation pointed out that the source addresses of the related bitcoins have a high correlation with multiple ransomware addresses, suspected of serving as payment transit nodes. Although some funds remain dormant, ZachXBT warned that they may still be laundered in the future and urged victims to report related addresses promptly to freeze the funds.

The United States seizes $1 million in Bitcoin and related servers from a Russian ransomware gang

ChainCatcher news reports that U.S. and international law enforcement agencies have seized 4 servers, 9 domain names, and approximately $1 million in Bitcoin, which are linked to a notorious Russian ransomware gang accused of attacking hundreds of institutions across critical sectors.The U.S. Department of Justice stated that the operation began on July 24, executed jointly by U.S. agencies along with those from Canada, Germany, Ireland, France, the UK, Ukraine, and Lithuania, targeting infrastructure associated with BlackSuit and Royal ransomware. Investigators believe that these two ransomware variants were developed by the same cybercrime group.Authorities claim that since 2022, the gang has extorted over $500 million in ransom, with a single ransom demand reaching as high as $60 million. It is alleged that they attacked more than 450 victims in the U.S. during this period, including hospitals, schools, police departments, energy companies, and government agencies, illegally profiting at least $370 million.The seized cryptocurrency was valued at $1,091,453 at the time of the seizure, originating from a digital wallet frozen by a trading platform in January 2024. According to court documents, these funds include a portion of Bitcoin ransom paid by a victim in April 2023, totaling $1.45 million.Victims of BlackSuit and Royal are typically required to pay ransoms in Bitcoin through dark web sites. Cybersecurity officials warn that operators of such malware often combine intimidation tactics with sophisticated data theft techniques, making it difficult to recover data without paying the ransom.
app_icon
ChainCatcher Building the Web3 world with innovations.