Binance to Undergo False "KYC Leak" Info Attack

According to the representatives of the exchange, data spread on the web has no relation to real users of the trading desk
07 August 2019   158

Information spread in the network that  the Binance bitcoin exchange was allegedly hacked and “thousands of Binance users KYC data”  is in one of the Telegram messenger groups.

Zhao posted a tweet in which he noted that "the news is old, just a different interpretation."

Additionally, a video explanation was provided.

And then, an official statement was released.

We would like to inform you that an unidentified individual has threatened and harassed us, demanding 300 BTC in exchange for withholding 10,000 photos that bear similarity to Binance KYC data. We are still investigating this case for legitimacy and relevancy. After refusing to cooperate and continuing with this extortion, this individual has begun distributing the data to the public and to media outlets.

First and foremost, there are inconsistencies when comparing this data to the data in our system. At the present time, no evidence has been supplied that indicates any KYC images have been obtained from Binance, as these images do not contain the digital watermark imprinted by our system. With that said, our security team is hard at work pursuing all possible leads in an attempt to identify the source of these images.
 

Binance Team

Binance also added that the security service of the exchange is diligently trying to determine the source of the images. For any information that helps to identify this person, the exchange is ready to offer a reward of up to 25 BTC.

China to Finance Hacker Attacks on Exchanges, - FireEye

Experts believe that the victims of APT41 are industry participants, the development of which is a priority in the current Chinese five-year period
08 August 2019   247

The hacker group APT41 attacks companies in the areas of healthcare, telecommunications, fintech, media, and cryptocurrency exchanges. This activity is funded by the Chinese government, according to analysts of cybersecurity company FireEye.

Experts believe that the victims of APT41 are industry participants, the development of which is a priority in the current Chinese five-year period.

Industries Targeted by APT41
Industries Targeted by APT41

At the same time, APT41 pursues its own goals, extracting financial benefits from attacks, which is unusual for other groups under the Chinese government, according to FireEye.

APT41 is known to include at least two people with the pseudonyms Chzan Xuiguan and Wolfji. The group probably has connections with other hacker organizations like BARIUM and Winnti.

FireEye also evaluated at what time of the day the APT41 attacked the gaming industry (its core target) and businesses from other areas. It turned out that this was happening outside the framework of a standard working day - probably these people, among other things, have the main job.

APT41 Operational Times
APT41 Operational Times

According to the UN Security Council, hackers under the DPRK government stole about $ 2 billion from banking institutions and cryptocurrency exchanges.