Yazılar

Cryptocurrency Firm Pleads Guilty After FBI’s Operation Token Mirrors Sting

A cryptocurrency financial services firm, CLS Global, has agreed to plead guilty to charges related to market manipulation after its involvement in a unique FBI sting operation aimed at uncovering fraud in the crypto sector.

Key Points:

  • Guilty Plea and Charges: CLS Global, a UAE-registered firm, admitted to helping manipulate the market for a digital token created by the FBI in its undercover investigation, “Operation Token Mirrors.” The company is set to plead guilty to two counts of fraudulent market manipulation and has agreed to pay $428,059 in restitution.
  • FBI’s Novel Operation: “Operation Token Mirrors” marked the first time the FBI had directed the creation of its own digital token, NexFundAI, to bait fraudsters. The operation also involved setting up a fake cryptocurrency company to lure in market manipulators.
  • Sham Transactions: CLS Global was one of three companies that provided illicit trading services, including wash trading, which is used to artificially inflate trading volumes and prices. These services were provided for the FBI-backed NexFundAI token on the Ethereum blockchain.
  • Consequences for CLS Global: The firm will be barred from participating in cryptocurrency transactions involving U.S. investors or offering services to U.S.-based crypto clients. Additionally, CLS Global must submit annual certifications regarding its business practices.
  • SEC Civil Charges: In addition to the criminal charges, CLS Global will settle related civil charges with the U.S. Securities and Exchange Commission (SEC).

U.S. Lawmakers Call for Scrutiny of Baicells, Chinese Telecom Firm

Baicells, a Chinese telecom hardware manufacturer founded by former Huawei employees, is facing heightened scrutiny from U.S. lawmakers over national security concerns. John Moolenaar, the top Republican on the House Select Committee on China, emphasized the need for rigorous government oversight of Baicells, citing potential cyber vulnerabilities in the company’s products. He warned that any presence of such companies in U.S. networks, particularly in sensitive areas, should raise significant national security alarms.

Despite Baicells’ reassurances that its products do not pose security risks, the company is under investigation by the FBI and the U.S. Department of Commerce. The company has provided base stations and routers to more than 700 U.S. networks, including those near military installations. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has flagged Baicells’ firmware for cyber vulnerabilities, further raising concerns.

Baicells’ chairman, Sun Lixin, defended the company by stating that all tech companies, regardless of their size, continuously release updates to address security vulnerabilities. He also expressed willingness to cooperate with U.S. inquiries.

The scrutiny of Baicells is part of a broader concern in Washington over the potential for Chinese-linked companies to compromise U.S. telecommunications networks. U.S. officials have warned that China-linked suppliers, including state-backed hacking groups like “Volt Typhoon,” could exploit network vulnerabilities for espionage.

Democratic leaders in Congress, including Frank Pallone and Mark Warner, have called for greater accountability and quicker responses to national security risks posed by foreign adversaries in U.S. telecom networks. They argue that focusing on individual companies without addressing systemic risks is insufficient to protect critical infrastructure.

 

US Removes Malware Allegedly Planted by Chinese-Backed Hackers

The U.S. Justice Department announced on Tuesday that it had successfully removed malware, known as “PlugX,” from over 4,200 computers that had been targeted by a group of hackers linked to the Chinese government. The malware, which had been used to steal sensitive information, was installed through infected USB devices by a group identified as “Mustang Panda” or “Twill Typhoon.”

The hackers, allegedly backed by the Chinese government, used PlugX for cyber-espionage, affecting thousands of computers globally. According to U.S. prosecutors, the Chinese government paid the Mustang Panda group to develop the malware. The hacking campaign has been active since at least 2014, targeting computers in the U.S., Europe, and Asia, as well as those belonging to Chinese political dissidents.

Cybersecurity company Sekoia traced the command-and-control infrastructure for PlugX and collaborated with French law enforcement to seize control of it in July 2024. In coordination with French authorities, the FBI identified devices in the U.S. affected by the malware and worked to send self-delete commands to remove it from those devices.

The operation marks a significant step in international cooperation to counteract cyber threats linked to state-sponsored hackers, with U.S. officials emphasizing the importance of protecting critical infrastructure from such sophisticated attacks.