List of Flash News about sanctions risk
Time | Details |
---|---|
2025-08-27 11:06 |
Anthropic Threat Intelligence Flags DPRK Fake Jobs and AI-Made Ransomware; What Crypto Traders Should Watch Now
According to @AnthropicAI, its new Threat Intelligence report says the company identified and disrupted attempts to use Claude for cybercrime, including a North Korea–linked fraudulent employment scheme and the sale of AI-created ransomware by a low-skill actor. Source: Anthropic post on X dated August 27, 2025. Ransomware operators commonly demand payment in cryptocurrency, with at least $1.1 billion in ransomware revenue recorded in 2023, highlighting direct crypto-exposure to ransomware activity. Source: Chainalysis 2024 Ransomware Crime Report. U.S. authorities have warned that North Korean IT workers use fake identities to obtain remote jobs and generate revenue for the regime under sanctions, which elevates sanctions-compliance risk for platforms and counterparties. Source: U.S. Treasury, State Department, and FBI joint advisory on DPRK IT Workers, May 2022. Regulators have sanctioned crypto mixing services tied to DPRK-linked laundering in prior cases, underscoring ongoing compliance risk for exchanges and privacy tools. Source: U.S. Treasury OFAC sanctions on Blender.io (May 6, 2022) and Tornado Cash (August 8, 2022). For traders, heightened focus on AI-enabled cybercrime and DPRK activity raises headline and compliance risk for crypto-exposed equities, exchanges, and privacy-focused tokens, making regulatory news flow a near-term catalyst to monitor. Source: FinCEN 2024 AML/CFT Priorities emphasizing ransomware and sanctions evasion. |
2025-08-13 12:55 |
On-chain risk alert: 0x78e1 address linked to USD 680,000 Favrr exploit and DPRK IT workers in June 2025
According to @zachxbt, the on-chain address 0x78e1 is closely tied to the USD 680,000 Favrr exploit from June 2025, with the project’s CTO and other developers identified as DPRK IT workers using fraudulent documents, source: ZachXBT on X, Aug 13, 2025. According to @zachxbt, additional DPRK IT workers were identified at projects linked to the 0x78e1 address, heightening sanctions and compliance risk for counterparties interacting with related wallets, source: ZachXBT on X, Aug 13, 2025. According to @zachxbt, traders should watch for movements from 0x78e1 and linked addresses to manage exposure to tainted funds and potential liquidity disruptions on affected venues, source: ZachXBT on X, Aug 13, 2025. |