Germany shuts down 47 cryptocurrency exchange services used by cybercriminals

Jason Macuray
German law enforcement has shut down 47 cryptocurrency exchange services that ransomware gangs and other cybercriminals used for money laundering.

German law enforcement has shut down 47 cryptocurrency exchange services that ransomware gangs and other cybercriminals used for money laundering.

According to the German federal police (BKA), the seized services were hosted in Germany and allowed cybercriminals to exchange cryptocurrencies without requiring registration or identity verification.

The platforms were designed to “quickly, easily, and anonymously” allow users to hide the origin of funds, the BKA said in a statement on Thursday.

“Exchange services that enable anonymous financial transactions, and thus facilitate money laundering, are among the most crucial elements of the cybercrime industry,” the police said.

The seized services include platforms such as Bankcomat, CoinBlinker, Cryptostrike, Baksman, and Prostocash. The most prolific among them, Xchange.cash, was used by nearly half a million people and processed 1.3 million transactions since its founding in 2012.

Among the users of these platforms were ransomware groups, darknet merchants and botnet operators. They used these services to exchange ransom payments or other criminal proceeds for regular currency.

Now, when users attempt to access one of the seized websites, they are greeted by a message from the German police stating: “This was your final exchange.”

“For years, the operators of these criminal exchange services have led you to believe that their hosting could not be found, that they did not store any customer data, and that all data was deleted immediately after the transaction,” the message read.

“We have found their servers and seized them — development servers, production servers, backup servers. We have their data — and therefore we have your data. Transactions, registration data, IP addresses.”

The police explained that during the operation, they were able to obtain “extensive” user and transaction data from the deactivated exchange services, “providing valuable investigative leads in the fight against cybercrime.”

No arrests have been publicly announced yet as part of “Operation Final Exchange,” but the police said their “search for traces” has begun.

CybercrimeNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Iran backdoors planted across Middle East telecoms, government agencies, Google says

Next Post

Ukraine bans Telegram on state and military devices

Related Posts

Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware

Microsoft is warning of several phishing campaigns that are leveraging tax-related themes to deploy malware and steal credentials. "These campaigns notably use redirection methods such as URL shorteners and QR codes contained in malicious attachments and abuse legitimate services like file-hosting services and business profile pages to avoid detection," Microsoft said in a report shared with The
Avatar
Read More

Malicious npm Package Modifies Local ‘ethers’ Library to Launch Reverse Shell Attacks

Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring the continued evolution of software supply chain attacks targeting the open-source ecosystem. The packages in question are ethers-provider2 and ethers-providerz, with the former downloaded 73 times to date since it was published on
Avatar
Read More