The lights dim on Laos’ brief Bitcoin dream

mekoneye.com By Võ Kiều Bảo Uyên 17 November 2025 at 14:50

Four years after it first approved Bitcoin mining projects powered by surplus hydropower, Laos is beginning to rethink whether the energy-hungry industry — now linked to massive transnational cryptocurrency scams — is worth keeping alive

High-rise buildings stand in the Boten Special Economic Zone in northern Laos, near the border with China. The area is suspected to be a hotspot for scam operations, including schemes that store fraudulent money in crypto for later laundering. PHOTO: Thanh Hue

Houaphanh Province, LAOS — Bitcoin is a world far away from 19-year-old Chai, an ethnic Hmong and a college student who has never owned a computer. 

But its shadow has already crept into his mountainous village, where power outages are common—often a side effect of the vast energy demands elsewhere, including cryptocurrency mining.

Despite the national grid being connected to his remote community seven years ago, he and his classmate studied by candlelight, oil lamp, or mobile flashlight at night to prepare for university entrance exams. The blackout worsens during the dry seasons when hydropower drops. 

Tiếp tục đọc “The lights dim on Laos’ brief Bitcoin dream”

Microsoft terminates services for Israeli military after investigation into mass surveillance of Palestinians

CNN

Displaced Palestinians move with their belongings southwards on a road in the Nuseirat refugee camp area in the central Gaza Strip.

Displaced Palestinians move with their belongings southwards on a road in the Nuseirat refugee camp area in the central Gaza Strip. Eyad Baba/AFP/Getty Images

Microsoft has terminated a set of services for the Israeli military after an investigation suggested Israel was using the company’s cloud computing technology for mass surveillance of Palestinians.

In a statement posted the company’s blog, Microsoft President Brad Smith said the company had “ceased and disabled a set of services to a unit within the Israel Ministry of Defense.” The move comes after an investigation by The Guardian and Israel’s +972 Magazine in early-August reported that Israel’s military intelligence unit, known as 8200, relied on Microsoft Azure to store millions of phone calls made by Palestinians in Gaza and the occupied West Bank.

Microsoft announced on August 15 that it had begun a review of the allegations. Smith said Microsoft does not provide technology “to facilitate mass surveillance of civilians,” a principle it has applied “in every country around the world.” The review, Smith said, focused on business records, financial statements, internal documents and other records without accessing the content of the stored material.

During the investigation, the company says it found evidence that supports elements of the investigation from the news outlets, including Israel’s “consumption of Azure storage capacity in the Netherlands and the use of AI services.” Microsoft informed Israel of the decision “to cease and disable specific [Israel Defense Ministry] subscriptions and their services, including their use of specific cloud storage and AI services and technologies.”

An Israeli security official said, “There is no damage to the operational capabilities of the IDF.”

Microsoft said the review was still ongoing.

Báo cáo tội phạm Crypto 2025 – The 2025 Crypto Crime Report

How crypto is scaling traditional crime types, like drug trafficking, money laundering, and fraud.

Download repport https://go.chainalysis.com/2025-Crypto-Crime-Report.html

Ransomware 

Darknet Markets 

Market Manipulation 

Scams 

Stolen Funds 

Extremism 

Organized Crime

Báo cáo tội phạm mạng hoạt động ở Đông Nam Á – Compound crime: Cyber scam operations in Southeast Asia

Repurposed hotels, casinos, and private compounds across Cambodia, Laos, Myanmar and the Philippines have become centres of global fraud. These compounds are operated by organized criminal networks that exploit hundreds of thousands of people, many of whom are trafficked and forced to perpetrate online scams. Victims include not only those defrauded online but also the scam workers themselves, subjected to threats, violence, sexual exploitation and extreme working conditions. 

The report details how cyber scams —including ‘pig-butchering’ romance-investment scams, crypto fraud, impersonation and sextortion— now generate tens of billions of dollars annually.  

Download report https://globalinitiative.net/analysis/compound-crime-cyber-scam-operations-in-southeast-asia/

Thống kê và xu hướng tội pham Crypto 2025 – Crypto Crime Report: 2025 Statistics & Trends

Crypto crime is escalating fast and shifting in form. In 2024 alone, $51 billion flowed into illicit wallets, with $40 billion laundered and over $2 billion stolen outright. Bitcoin is no longer king in the shadows; stablecoins now dominate criminal crypto flows. This report breaks down who’s losing money, how it’s being funneled, and why tracking these shifts is critical. The insights ahead reveal patterns that can help spot emerging threats and shape stronger policy.

How much cryptocurrency has been stolen in the world

How many Bitcoins have been stolen?
How much Ethereum was stolen?
How much Solana has been stolen?
The biggest crypto rug pulls
Cryptocurrency money laundering statistics
The biggest crypto scams in history
Insights & Implications:
Methodology:
References:

Download report https://coinledger.io/research/crypto-crime-report

Nhận diện các thủ đoạn rửa tiền thông qua tiền mã hóa – crypto currency

a. Thông qua các sàn giao dịch tiền mã hóa tập trung (Centralised exchanges). 
b. Thông qua hệ thống tài chính phi tập trung (Decentralised Finance – DeFi)
c. Thông qua Máy trộn tiền mã hóa (Mixers hoặc Tumblers) và Cầu nối chuỗi (cross-chain bridge)
d. Thông qua thị trường mua bán trao tay OTC (Over the counter market)
e. Thông qua tiền mã hóa ẩn danh (Privacy coins)
f. Thông qua các sàn đánh bạc trực tuyến
g. Sử dụng tiền mã hóa mua bất động sản, tác phẩm nghệ thuật và hàng hóa bán lẻ

Tạp chí pháp lý 19:10 07/04/2025

(Pháp lý). Bài viết nghiên cứu về thực trạng lợi dụng các đồng tiền mã hóa để phục vụ các hoạt động phạm tội nói chung và tội phạm rửa tiền nói riêng tại Việt Nam và trên thế giới. Trên cơ sở đó, tác giả đề xuất các giải pháp mà các lực lượng chức năng nghiên cứu áp dụng để chủ động phòng, chống tội phạm rửa tiền thông qua các giao dịch tiền mã hóa.

image001-1729504752.png
 

1. Tiền mã hóa – công cụ mới được “ưa chuộng” của tội phạm và rửa tiền 

Trong những năm gần đây, các đồng tiền mã hóa (CryptoCurrency) đã và đang phát triển mạnh mẽ, với hàng loạt các đồng tiền mới được ra đời, dựa trên các công nghệ tiên tiến, và độ phổ biến không ngừng được mở rộng với số lượng người sử dụng và tổng giá trị giao dịch ngày một tăng. 

Tiếp tục đọc “Nhận diện các thủ đoạn rửa tiền thông qua tiền mã hóa – crypto currency”

Is Cambodia serious about ending organized cyberscams?

DW.com

Cambodia’s central bank has reportedly revoked the banking license of a conglomerate accused of illicit online activities. But doubts abound about Phnom Penh’s commitment to taking action against cyberfraud networks.

A symbolic image of cybercrime, a person typing on a keyboard
Southeast Asia’s vast cyber scam industry exploded during the COVID-19 pandemic when many of the region’s illegal casino operators turned to online fraudImage: allOver-MEV/IMAGO

The banking arm of a Cambodia-based conglomerate accused of running the world’s “largest ever illicit online marketplace” has had its banking license revoked by the Cambodia’s central bank, Radio Free Asia reported last week.  

Huione Guarantee, the Telegram marketplace of Huione Group, has reportedly processed up to €22 billion ($24 billion) in illicit transactions since 2021, making it by far the world’s largest illegal online marketplace, cryptocurrency compliance firm Elliptic reported last year.

Huione Pay, the group’s banking arm, had its license withdrawn because of noncompliance with “existing regulations and recommendations that may have been made by the regulators,” a National Bank of Cambodia spokesperson told Radio Free Asia, a US Congress-funded media outlet.

Hub for cyberscams

Tiếp tục đọc “Is Cambodia serious about ending organized cyberscams?”

“More than 0s and 1s”: Cambodia battles cybercrime

UNODC.org

Through training held in Phnom Penh, UNODC is helping to build a more robust response to cybercrime in Cambodia.

Photo: UNODC / Laura Gil

Through training held in Phnom Penh, UNODC is helping to build a more robust response to cybercrime in Cambodia.

All the screens in the room, including the one projected on the wall, have turned black, and a series of green letters have started to rain down. “Your wallet has been stolen,” one of the trainers says. All participants —some in uniform, others in suits— start scrolling down, looking for the fictitious cybercriminal.

The mix of Cambodian cybercops, law enforcement officials and judges in the room each have a laptop, and each have a task at hand: to seize the cryptocurrencies before it’s too late. If they collect and manage the digital evidence, they have succeeded, because that evidence can be later presented to the court. On their screens, what they are seeing is a simulation of a cyber-enabled fraud case involving cryptocurrencies in which criminals operate nowadays.

Tiếp tục đọc ““More than 0s and 1s”: Cambodia battles cybercrime”

India’s Thriving Scam Industry: Before You Call Tech Support 

We go deep into the vast world of India’s scam call centers, meeting those behind the deception and the new breed of international scambaiters who are trying to bring these scammers down. After seven years of running tech support scams, ‘Leo’ has leveled up. He is now an entrepreneur or a scam call center consultant who sets up scamming outfits for those with money to invest. From hiring to hardware, he has it down to a science, especially on how long it will take to generate returns for the investors. At the other end of the spectrum, we follow an Indian scambaiter ‘Sven’ as he investigates a local company that’s running a scam call center. The majority of their victims are English-speaking foreigners overseas. Through reverse tracking, he has managed to get into the company’s systems, securing access to their confidential files and real-time CCTV footage of scams taking place. Will ‘Sven’ be able to find enough evidence to submit to the police and conduct a crackdown?

Online fraud leaves nobody safe – The vast and sophisticated global enterprise that is Scam Inc

economist.com

EDGAR MET Rita on LinkedIn. He worked for a Canadian software company, she was from Singapore and was with a large consultancy. They were just friends, but they chatted online all the time. One day Rita offered to teach him how to trade crypto. With her help, he made good money. So he raised his stake. However, after Edgar tried to cash out, it became clear that the crypto-trading site was a fake and that he had lost $78,000. Rita, it turned out, was a trafficked Filipina held prisoner in a compound in Myanmar.

In their different ways, Edgar and Rita were both victims of “pig-butchering”, the most lucrative scam in a global industry that steals over $500bn a year from victims all around the world. In “Scam Inc”, our eight-part podcastThe Economist investigates the crime, the criminals and the untold suffering they cause. “Scam Inc” is about the most significant change in transnational organised crime in decades.

Pig-butchering, or sha zhu pan, is Chinese criminal slang. First the scammers build a sty, with fake social-media profiles. Then they pick the pig, by identifying a target; raise the pig, by spending weeks or months building trust; cut the pig, by tempting them to invest; and butcher the pig by squeezing “every last drop of juice” from them, their family and friends.

The industry is growing fast. In Singapore scams have become the most common felony. The UN says that in 2023 the industry employed just under 250,000 people in Cambodia and Myanmar; another estimate puts the number of workers worldwide at 1.5m. In “Scam Inc” we report how a man in Minnesota lost $9.2m and how a bank in rural Kansas collapsed when its chief executive embezzled $47m to invest in crypto, under the tutelage of a fake online woman, called Bella. A part-time pastor, he also stole from his church.

Online scamming compares in size and scope to the illegal drug industry. Except that in many ways it is worse. One reason is that everyone becomes a potential target simply by going about their lives. Among the victims we identify are a neuroscience PhD and even relatives of FBI investigators whose job is to shut scams down. Operating manuals give people like Rita step-by-step instructions on how to manipulate their targets by preying on their emotions. It is a mistake to think romance is the only hook. Scammers target all human frailties: fear, loneliness, greed, grief and boredom.

Chasing malware scams: From Singapore to Vietnam, hacker hotspot

CNA

How Do Scammers Take Over Your Phone And Steal Your Money? – Part 1/2

Ever scroll through your social media and come across an advertisement for food or cleaning service? But an innocent ad could turn insidious when the seller asks you to download an app to place an order or booking. Since the start of this year, some 750 people have lost a combined total of over S$10 million to malware app scams. In this episode, host Steven Chia investigates how these scams work and attempts to bait a scammer himself.

00:00 Introduction

01:22 A deal too good to be true?

05:59 Malware: How does it work?

09:12 Could we easily fall for malware scams?

12:19 What a malware app might look like

18:55 Why are Android phones at greater risk than iPhones?

21:06 If I lose my money, will banks give my money back?

Who Are The People Behind Malware Scams? – Part 2/2

After investigating how malware scams affect victims, host Steven Chia heads to Vietnam to find out who is behind these scams and how easy it is to create malware. He meets a notorious ex-hacker who digs further into an app embedded with malware that was making its rounds in Singapore. He also finds out how sophisticated scams are going to get, and what we can do to protect ourselves. WATCH Part 1:    • How Do Scammers Take Over Your Phone …  

Tiếp tục đọc “Chasing malware scams: From Singapore to Vietnam, hacker hotspot”

What is the UN cybercrime treaty and why does it matter?

chathamhouse.org

Explaining the UN cybercrime treaty, its potential benefits and risks, key issues in the negotiations, and likely paths forward.

What is the UN cybercrime treaty?

Since May 2021, UN member states have been negotiating an international treaty on countering cybercrime. If adopted by the UN General Assembly, it would be the first binding UN instrument on a cyber issue. The treaty could become an important global legal framework for international cooperation on preventing and investigating cybercrime, and prosecuting cybercriminals.

But without a clearly defined scope and sufficient safeguards, the treaty could endanger human rights – both online and offline – and repressive governments could abuse its provisions to criminalize online free speech. It could also threaten digital rights by legitimizing intrusive investigations and unhindered law enforcement access to personal information.

What is cybercrime?

There is no universally accepted definition of cybercrime. A common approach is to define it in two categories: cyber-dependent crimes and cyber-enabled crimes.

Cyber-dependent crimes are crimes that can only be committed by using Information and Communication Technologies (ICTs). A notorious example is ransomware: hacking into an organization or individual’s device, encrypting data and demanding payment for decryption.

Without a clearly defined scope and sufficient safeguards, the treaty could endanger human rights – both online and offline – and repressive governments could abuse its provisions to criminalize online free speech.

Tiếp tục đọc “What is the UN cybercrime treaty and why does it matter?”

FACT SHEET: Biden-⁠Harris Administration Announces National Cybersecurity Strategy

MARCH 02, 2023

  1. STATEMENTS AND RELEASES

Read the full strategy here >>

Today, the Biden-Harris Administration released the National Cybersecurity Strategy to secure the full benefits of a safe and secure digital ecosystem for all Americans. In this decisive decade, the United States will reimagine cyberspace as a tool to achieve our goals in a way that reflects our values: economic security and prosperity; respect for human rights and fundamental freedoms; trust in our democracy and democratic institutions; and an equitable and diverse society. To realize this vision, we must make fundamental shifts in how the United States allocates roles, responsibilities, and resources in cyberspace.

Tiếp tục đọc “FACT SHEET: Biden-⁠Harris Administration Announces National Cybersecurity Strategy”

What is ZeroTrust Strategy?

TĐH: Traditional cybersecurity strategies are no longer sufficient for today’s cyberwar. The Zero Trust strategy is a new concept in cyberwar. To help understand this concept, I post here a paper by the US Department of Defense entitle “DOD Zero Trust Strategy.” This concept will involve not just DOD or military institutions, but also many private enterprises and individuals. Indeed, it involves the entire nation. I select the DOD presentation to post because, by nature of its job, DOD is probaly concerned about cybersecurity more than anyone else. Below is the Foreword of the DOD paper.

DOD ZERO TRUST STRATEGY

Download full paper >>

Foreword


Our adversaries are in our networks, exfiltrating our data, and exploiting the Department’s users. The rapid growth of these offensive threats emphasizes the need for the Department of Defense (DoD) to adapt and significantly improve our deterrence strategies and cybersecurity implementations. Defending DoD networks with high-powered and ever-more sophisticated perimeter defenses is no longer sufficient for achieving cyber resiliency and securing our information
enterprise that spans geographic borders, interfaces with external partners, and support to millions of authorized users, many of which now require access to DoD networks outside traditional boundaries, such as work from home. To meet these challenges, the DoD requires an enhanced cybersecurity framework built upon Zero Trust principles that must be adopted across the Department, enterprise-wide, as quickly as possible as described within this document.

Tiếp tục đọc “What is ZeroTrust Strategy?”

This is the real story of the Afghan biometric databases abandoned to the Taliban

technologyreview.com

By capturing 40 pieces of data per person—from iris scans and family links to their favorite fruit—a system meant to cut fraud in the Afghan security forces may actually aid the Taliban.By 

August 30, 2021

afghans targeted by biometric data

ANDREA DAQUINO

As the Taliban swept through Afghanistan in mid-August, declaring the end of two decades of war, reports quickly circulated that they had also captured US military biometric devices used to collect data such as iris scans, fingerprints, and facial images. Some feared that the machines, known as HIIDE, could be used to help identify Afghans who had supported coalition forces.

According to experts speaking to MIT Technology Review, however, these devices actually provide only limited access to biometric data, which is held remotely on secure servers. But our reporting shows that there is a greater threat from Afghan government databases containing sensitive personal information that could be used to identify millions of people around the country. 

MIT Technology Review spoke to two individuals familiar with one of these systems, a US-funded database known as APPS, the Afghan Personnel and Pay System. Used by both the Afghan Ministry of Interior and the Ministry of Defense to pay the national army and police, it is arguably the most sensitive system of its kind in the country, going into extreme levels of detail about security personnel and their extended networks. We granted the sources anonymity to protect them against potential reprisals. 

Related Story

Tiếp tục đọc “This is the real story of the Afghan biometric databases abandoned to the Taliban”

An ninh mạng hay an toàn dữ liệu cho Việt Nam?

TS – 11/05/2018 08:00 – Hảo Linh

Việt Nam không thể chống đỡ những cuộc tấn công của các nhóm tin tặc chuyên nghiệp và được sự hậu thuẫn của chính phủ các nước khác nếu không thể làm chủ được các thiết bị phần cứng và phần mềm trong hệ thống mạng.


Catalog gián điệp của Cơ quan an ninh Mỹ NSA cho thấy cơ quan này có vô vàn các công cụ cài cắm vào hầu hết các thiết bị phần cứng và giải pháp phần mềm trong hệ thống mạng.

Hệ thống mạng của Việt Nam rất dễ bị tổn thương

Giữa năm 2016, sau chiến thắng của Philippines trước Tòa án Trọng tài thường trực PCA, bác bỏ tuyên bố của Trung Quốc về đường chín đoạn trên Biển Đông, Philippines và Việt Nam trở thành mục tiêu tấn công của các nhóm tin tặc Trung Quốc. Nổi cộm lên vào thời điểm đó, là một loạt sân bay lớn của Việt Nam (bao gồm cả sân bay Nội Bài và Tân Sơn Nhất) bị vô hiệu hóa toàn bộ màn hình hiển thị và loa phát thanh, thay vào đó là những thông tin xúc phạm và xuyên tạc về chủ quyền biển đảo của Việt Nam. Cùng với đó là thông tin cá nhân của 400.000 khách hàng hạng Bông Sen Vàng của Vietnam Airlines bị phát tán trên mạng và bản thân trang web của hãng hàng không này cũng bị thay đổi giao diện và nội dung.

Tiếp tục đọc “An ninh mạng hay an toàn dữ liệu cho Việt Nam?”