Báo cáo tội phạm Crypto 2025 – The 2025 Crypto Crime Report

How crypto is scaling traditional crime types, like drug trafficking, money laundering, and fraud.

Download repport https://go.chainalysis.com/2025-Crypto-Crime-Report.html

Ransomware 

Darknet Markets 

Market Manipulation 

Scams 

Stolen Funds 

Extremism 

Organized Crime

Báo cáo tội phạm mạng hoạt động ở Đông Nam Á – Compound crime: Cyber scam operations in Southeast Asia

Repurposed hotels, casinos, and private compounds across Cambodia, Laos, Myanmar and the Philippines have become centres of global fraud. These compounds are operated by organized criminal networks that exploit hundreds of thousands of people, many of whom are trafficked and forced to perpetrate online scams. Victims include not only those defrauded online but also the scam workers themselves, subjected to threats, violence, sexual exploitation and extreme working conditions. 

The report details how cyber scams —including ‘pig-butchering’ romance-investment scams, crypto fraud, impersonation and sextortion— now generate tens of billions of dollars annually.  

Download report https://globalinitiative.net/analysis/compound-crime-cyber-scam-operations-in-southeast-asia/

Thống kê và xu hướng tội pham Crypto 2025 – Crypto Crime Report: 2025 Statistics & Trends

Crypto crime is escalating fast and shifting in form. In 2024 alone, $51 billion flowed into illicit wallets, with $40 billion laundered and over $2 billion stolen outright. Bitcoin is no longer king in the shadows; stablecoins now dominate criminal crypto flows. This report breaks down who’s losing money, how it’s being funneled, and why tracking these shifts is critical. The insights ahead reveal patterns that can help spot emerging threats and shape stronger policy.

How much cryptocurrency has been stolen in the world

How many Bitcoins have been stolen?
How much Ethereum was stolen?
How much Solana has been stolen?
The biggest crypto rug pulls
Cryptocurrency money laundering statistics
The biggest crypto scams in history
Insights & Implications:
Methodology:
References:

Download report https://coinledger.io/research/crypto-crime-report

Online fraud leaves nobody safe – The vast and sophisticated global enterprise that is Scam Inc

economist.com

EDGAR MET Rita on LinkedIn. He worked for a Canadian software company, she was from Singapore and was with a large consultancy. They were just friends, but they chatted online all the time. One day Rita offered to teach him how to trade crypto. With her help, he made good money. So he raised his stake. However, after Edgar tried to cash out, it became clear that the crypto-trading site was a fake and that he had lost $78,000. Rita, it turned out, was a trafficked Filipina held prisoner in a compound in Myanmar.

In their different ways, Edgar and Rita were both victims of “pig-butchering”, the most lucrative scam in a global industry that steals over $500bn a year from victims all around the world. In “Scam Inc”, our eight-part podcastThe Economist investigates the crime, the criminals and the untold suffering they cause. “Scam Inc” is about the most significant change in transnational organised crime in decades.

Pig-butchering, or sha zhu pan, is Chinese criminal slang. First the scammers build a sty, with fake social-media profiles. Then they pick the pig, by identifying a target; raise the pig, by spending weeks or months building trust; cut the pig, by tempting them to invest; and butcher the pig by squeezing “every last drop of juice” from them, their family and friends.

The industry is growing fast. In Singapore scams have become the most common felony. The UN says that in 2023 the industry employed just under 250,000 people in Cambodia and Myanmar; another estimate puts the number of workers worldwide at 1.5m. In “Scam Inc” we report how a man in Minnesota lost $9.2m and how a bank in rural Kansas collapsed when its chief executive embezzled $47m to invest in crypto, under the tutelage of a fake online woman, called Bella. A part-time pastor, he also stole from his church.

Online scamming compares in size and scope to the illegal drug industry. Except that in many ways it is worse. One reason is that everyone becomes a potential target simply by going about their lives. Among the victims we identify are a neuroscience PhD and even relatives of FBI investigators whose job is to shut scams down. Operating manuals give people like Rita step-by-step instructions on how to manipulate their targets by preying on their emotions. It is a mistake to think romance is the only hook. Scammers target all human frailties: fear, loneliness, greed, grief and boredom.

Chasing malware scams: From Singapore to Vietnam, hacker hotspot

CNA

How Do Scammers Take Over Your Phone And Steal Your Money? – Part 1/2

Ever scroll through your social media and come across an advertisement for food or cleaning service? But an innocent ad could turn insidious when the seller asks you to download an app to place an order or booking. Since the start of this year, some 750 people have lost a combined total of over S$10 million to malware app scams. In this episode, host Steven Chia investigates how these scams work and attempts to bait a scammer himself.

00:00 Introduction

01:22 A deal too good to be true?

05:59 Malware: How does it work?

09:12 Could we easily fall for malware scams?

12:19 What a malware app might look like

18:55 Why are Android phones at greater risk than iPhones?

21:06 If I lose my money, will banks give my money back?

Who Are The People Behind Malware Scams? – Part 2/2

After investigating how malware scams affect victims, host Steven Chia heads to Vietnam to find out who is behind these scams and how easy it is to create malware. He meets a notorious ex-hacker who digs further into an app embedded with malware that was making its rounds in Singapore. He also finds out how sophisticated scams are going to get, and what we can do to protect ourselves. WATCH Part 1:    • How Do Scammers Take Over Your Phone …  

Tiếp tục đọc “Chasing malware scams: From Singapore to Vietnam, hacker hotspot”

Cyber-scam hits the big screen, and Cambodia isn’t happy

focus-cambodia.com

The banning of the Chinese blockbuster “No More Bets” warns that Beijing’s patience is wearing thin over Cambodia’s apparent inability to control cyber crime within its borders. A dramatic drop in tourism numbers may be one symptom. 

All bets are off with regard to the impact in Cambodia of “No More Bets”, a hit Chinese movie based upon Southeast Asia’s cyber-scam industry.

Cambodia’s Ministry of Culture and Fine Arts last week requested the Chinese Embassy to stop screening the action thriller, banning it in Cambodia and calling for censorship in China.

International observers say the movie already is testing the limits of the two nations’ “ironclad” friendship, as well as impacting the already-collapsing Chinese tourism market in Cambodia. Indeed, the outrage generated by “No More Bets” is amplifying awareness of possible further political and economic consequences of this “scamdemic”.

Tiếp tục đọc “Cyber-scam hits the big screen, and Cambodia isn’t happy”

What is the UN cybercrime treaty and why does it matter?

chathamhouse.org

Explaining the UN cybercrime treaty, its potential benefits and risks, key issues in the negotiations, and likely paths forward.

What is the UN cybercrime treaty?

Since May 2021, UN member states have been negotiating an international treaty on countering cybercrime. If adopted by the UN General Assembly, it would be the first binding UN instrument on a cyber issue. The treaty could become an important global legal framework for international cooperation on preventing and investigating cybercrime, and prosecuting cybercriminals.

But without a clearly defined scope and sufficient safeguards, the treaty could endanger human rights – both online and offline – and repressive governments could abuse its provisions to criminalize online free speech. It could also threaten digital rights by legitimizing intrusive investigations and unhindered law enforcement access to personal information.

What is cybercrime?

There is no universally accepted definition of cybercrime. A common approach is to define it in two categories: cyber-dependent crimes and cyber-enabled crimes.

Cyber-dependent crimes are crimes that can only be committed by using Information and Communication Technologies (ICTs). A notorious example is ransomware: hacking into an organization or individual’s device, encrypting data and demanding payment for decryption.

Without a clearly defined scope and sufficient safeguards, the treaty could endanger human rights – both online and offline – and repressive governments could abuse its provisions to criminalize online free speech.

Tiếp tục đọc “What is the UN cybercrime treaty and why does it matter?”