Yazılar

Telegram Blocks Two Massive Black Market Services Linked to Cybercrime and Money Laundering

Telegram has shut down two major digital black markets—Xinbi Guarantee and Huione Guaranteewhich collectively facilitated over $35 billion in transactions since 2021, according to blockchain analytics firm Elliptic. The services, which primarily operated in Chinese and were known hubs for cybercriminals and fraud networks, appeared inactive as of Thursday.

In a statement to Reuters, Telegram confirmed the takedowns, saying:

Criminal activities like scamming or money laundering are forbidden by Telegram’s terms of service and are always removed whenever discovered.”

Massive Fraud Ecosystems Dismantled:

  • Xinbi Guarantee and Huione Guarantee far surpassed older dark web markets such as Silk Road, which was infamous for illegal drug distribution.

  • The platforms served as critical infrastructure for illicit services, including:

    • Stolen data trading

    • Money laundering

    • Fraudulent telecom operations

Elliptic hailed the shutdown as a major win in the fight against online fraud, calling it a big blow for online fraudsters”.

Ties to Broader Cybercrime Networks:

  • Huione Guarantee, which once operated under the name Haowang Guarantee, is a subsidiary of Cambodia-based Huione Group, also linked to Huione Pay and Huione Crypto.

  • U.S. officials allege these entities were used by state-sponsored hacking groups, including North Korea’s Lazarus Group, which funneled more than $150,000 in cryptocurrency through Huione Pay.

Earlier this month, the U.S. Treasury Department sanctioned the Huione Group, describing it as the “marketplace of choice for malicious cyber actors,” effectively cutting it off from the U.S. financial system.

Platform Reaction and Future Concerns:

  • In a statement posted to its website, Huione Guarantee confirmed that it had been blocked by Telegram on Tuesday and would “cease operations from now on.”

  • Attempts to reach Xinbi Guarantee or Huione Group for comment were unsuccessful.

While Telegram’s move highlights growing efforts by tech platforms to combat illegal activity, analysts warn that such services may resurface under new identities unless systemic enforcement and financial sanctions continue to evolve alongside cybercrime techniques.

FBI Warns AI-Generated Voices Used to Impersonate Senior U.S. Officials in Cyber Campaign

The FBI has issued a public warning that malicious actors are leveraging AI-generated voice messages and text to impersonate senior U.S. government officials, targeting both current and former federal and state officials in a sophisticated social engineering campaign.

According to the FBI’s announcement on Thursday, the aim of the scheme is to:

  • Gain access to personal accounts of government officials

  • Target additional contacts once access is gained

  • Harvest sensitive information or even solicit funds fraudulently

How the Scheme Works:

  • Attackers initiate text message conversations to build rapport with the targets.

  • Once trust is established, they urge the recipient to switch to another platform, often linking to a hacker-controlled website designed to harvest credentials like usernames and passwords.

  • In some cases, attackers use AI-generated voice clips to convincingly impersonate the tone and mannerisms of known officials.

Threat Scope:

The FBI has not disclosed how many individuals have been targeted or whether the actors are financially motivated cybercriminals or state-aligned entities. The use of generative AI makes attribution and detection more difficult, and the agency continues to assess the full scope of the threat.

This follows a December 2024 warning from the FBI regarding the broader use of AI-generated contentincluding text, audio, images, and videoto commit crimes such as fraud, extortion, and identity theft.

Broader Implications:

The campaign underscores the growing threat of generative AI in cybercrime, particularly in impersonation and phishing-style attacks aimed at high-value targets. Government agencies and private sector organizations are now being urged to:

  • Strengthen multi-factor authentication

  • Train personnel to recognize AI-driven impersonation attempts

  • Avoid clicking on unsolicited links or moving conversations to unknown platforms

As AI tools become more accessible, security experts warn that digital impersonation will become an increasingly common tactic for attackers seeking access to sensitive systems or socially engineered pathways into secure environments.

Star Health Hacker Claims Responsibility for Death Threats and Bullet Packages Sent to Executives

The hacker known as xenZen”, who last year leaked sensitive data from Star Health and Allied Insurance CompanyIndia’s largest health insurer—has claimed responsibility for sending death threats and bullet cartridges to the company’s top executives, according to a March 31 email obtained by Reuters.

In a chilling escalation, xenZen said the threats were a direct reprisal for the insurer’s alleged denial of medical claims to customers. The packages, reportedly sent in February to Star Health’s headquarters in Chennai, Tamil Nadu, were addressed to CEO Anand Roy and CFO Nilesh Kambli. Inside, a note warned:

next one will go in ur and ur peoples head. tik tik tik.”

Reuters reviewed photographs included in the hacker’s email that appear to show the threatening packages. While the news agency has not independently verified the hacker’s identity or the full accuracy of the information provided, three Indian police sources confirmed that a criminal investigation is underway. According to one source, a man in the neighboring state of Telangana has been arrested for allegedly facilitating the delivery of the packages.

Star Health declined to comment in detail, citing an “ongoing, highly sensitive criminal investigation.” CFO Kambli directed inquiries to the company’s PR team, and CEO Roy did not respond to calls for comment.

The case adds to growing concerns over executive security in the healthcare industry, especially after the murder of UnitedHealthcare CEO Brian Thompson in December — an incident that reportedly inspired xenZen’s threats.

Last year, the hacker leaked what they claimed was 7.24 terabytes of personal data related to over 31 million customers, including medical reports and insurance details. Star Health confirmed the data breach, which followed a ransom demand of $68,000. The company has since launched legal action against xenZen and Telegram, which was used to distribute the stolen data via chatbots. Those bots have since been removed.

In the latest email, xenZen claimed the threats followed requests from disgruntled customers who alleged their valid claims had been denied despite having coverage. Star Health has not responded to these specific allegations.

As the case unfolds, the incident raises urgent questions about data security, corporate accountability, and the physical safety of executives in an era where cyberattacks increasingly blur into real-world consequences.