Close Menu
    Trending
    • Aid Finally Arrives in Gaza After Two-Month Israeli Blockade
    • Why so many military veterans move into cybersecurity
    • A flagless fleet is threatening the seas
    • Lawmakers Investigate Federal Spending On Gambling, Adult Entertainment And More
    • Brooklyn Beckham Reportedly Snubs Family During London Trip
    • US Army to change transgender soldiers’ records to birth sex
    • Thunder-Wolves: Gilgeous-Alexander leads OKC to Game 1 win in West finals | Basketball News
    • 10 must-have NFL players for Olympics flag football
    Benjamin Franklin Institute
    Friday, May 23
    • Home
    • Politics
    • Business
    • Science
    • Technology
    • Arts & Entertainment
    • International
    Benjamin Franklin Institute
    Home»Technology»The Cybercriminals Who Organized a $243 Million Crypto Heist
    Technology

    The Cybercriminals Who Organized a $243 Million Crypto Heist

    Team_Benjamin Franklin InstituteBy Team_Benjamin Franklin InstituteApril 24, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
    Share
    Facebook Twitter Pinterest Email Copy Link


    A quiet honor student who had recently graduated from Immaculate High School in Danbury, Veer Chetal was about to begin studying at Rutgers University in New Jersey. In 2022, he completed a “future lawyers” program, and a story that year on the Immaculate website showed a photo of a smiling kid with glasses wearing a Tommy Hilfiger windbreaker over a red polo.

    Classmates remember Chetal as shy and a fan of cars. “He just kind of kept to himself,” says Marco Dias, who became friends with Chetal junior year. According to another classmate named Nick Paris, this was true of Chetal until one day in the middle of his senior year, when he showed up at school driving a Corvette. “He just parked in the lot. It was 7:30 a.m., and everyone was like, What?” Paris says. Soon Chetal rolled up in a BMW, and then a Lamborghini Urus. He started wearing Louis Vuitton shirts and Gucci shoes, and on Senior Skip Day, while Paris and many of his classmates went to a nearby mall, Chetal took some friends, including Dias, to New York to party on a yacht he had rented, where they took photos holding wads of cash.

    Chetal said that he had made his money trading crypto; Dias says Chetal showed him trades on his phone as proof one morning during homeroom class. Once, Chetal rented a large house in Stamford, Conn., and hosted a three-day gathering with friends. “I was in the basement at one point, and I was just messing around with my friends, and I just see him, like, just on the couch, just like on his phone, pretty much avoiding everyone at the party,” Dias says. “And I thought, Oh, that’s kind of weird.” Paris remembers that during a school parade, the police stopped Chetal in his Lamborghini Urus for a traffic violation. “He literally called his lawyer on the spot before answering the cops’ questions, which everyone was like: Wow, this guy’s got, like, something going for him. Like, this guy’s got serious money.”

    Independent investigators say Chetal was secretly a member of the Com, also referred to as the Comm or the Community, an online network of chat groups that has its roots in the hacking underground of the 1980s and functions as a kind of social network for cybercriminals or aspiring ones. In an affidavit from an unrelated case, an F.B.I. agent described the Com as “a geographically diverse group of individuals, organized in various subgroups, all of whom coordinate through online communication applications such as Discord and Telegram to engage in various types of criminal activity.” According to the F.B.I. affidavit and experts who study the Com, the various subgroups’ activities include swatting, which entails making false reports to emergency services or institutions like schools to trigger a police response; SIM swapping, when hackers take over a target’s phone number, sometimes by tricking customer-service representatives; ransomware attacks, using a malware that denies users or organizers access to computer files; cryptocurrency theft; and corporate intrusions.

    Allison Nixon, the chief research officer of Unit 221B, a collective of cybersecurity experts, has been following this growing corner of the internet since 2011 and is widely considered to be a pre-eminent expert on the Com. She says most Com members are young men from Western countries. In group chats, many talk about college and taking classes in cybersecurity, which they use to their advantage, she says. The gateway for many is through video games like RuneScape, Roblox and Grand Theft Auto.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link

    Related Posts

    Technology

    Why so many military veterans move into cybersecurity

    May 23, 2025
    Technology

    Will a US-China deal foil India’s factory ambitions?

    May 19, 2025
    Technology

    US cuts tariffs on small parcels from Chinese firms like Shein and Temu

    May 13, 2025
    Technology

    Bill Gates Explains His Plans to Close the Gates Foundation in 2045

    May 8, 2025
    Technology

    Uber Revenue Is Up 14%, Despite Economic Fears

    May 7, 2025
    Technology

    Beware phony IT calls after Co-op and M&S hacks, says UK cyber centre

    May 5, 2025
    Editors Picks

    Iran nuclear programme nearing ‘point of no return’, France’s Macron says | Politics News

    January 6, 2025

    Snow days set to disappear across much of the US

    December 27, 2024

    Opinion | I Just Saw the Future. It Was Not in America.

    April 2, 2025

    Arab foreign ministers reject Trump call for transfer of Palestinians

    February 1, 2025

    Trump says US will sign Ukraine minerals deal soon, peace efforts going ‘pretty well’

    March 20, 2025
    About Us
    About Us

    Welcome to Benjamin Franklin Institute, your premier destination for insightful, engaging, and diverse Political News and Opinions.

    The Benjamin Franklin Institute supports free speech, the U.S. Constitution and political candidates and organizations that promote and protect both of these important features of the American Experiment.

    We are passionate about delivering high-quality, accurate, and engaging content that resonates with our readers. Sign up for our text alerts and email newsletter to stay informed.

    Latest Posts

    Aid Finally Arrives in Gaza After Two-Month Israeli Blockade

    May 23, 2025

    Why so many military veterans move into cybersecurity

    May 23, 2025

    A flagless fleet is threatening the seas

    May 22, 2025

    Subscribe for Updates

    Stay informed by signing up for our free news alerts.

    Paid for by the Benjamin Franklin Institute. Not authorized by any candidate or candidate’s committee.
    • Privacy Policy
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.