<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Espionage &#8211; Crypto Market Insights: Dive In with CryptoUpdate.io</title>
	<atom:link href="https://cryptoupdate.io/tag/espionage/feed/" rel="self" type="application/rss+xml" />
	<link>https://cryptoupdate.io</link>
	<description>Latest cryptocurrency news, market updates and analysis</description>
	<lastBuildDate>Fri, 27 Jun 2025 09:01:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Israeli Cyber Units Potentially Involved in $90 Million Nobitex Hack for Espionage, Suggests TRM Labs</title>
		<link>https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/</link>
					<comments>https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Fri, 27 Jun 2025 09:01:02 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Nobitex]]></category>
		<category><![CDATA[TRM Labs]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/</guid>

					<description><![CDATA[<p>TRM Labs, a leading crypto analytics organization, has put forth the theory that the infamous $90 million Nobitex crypto exchange hack may have been utilized by Israeli cyber units for espionage purposes. This possible connection was highlighted in the company&#8217;s recent report. The report drew attention to the arrests of three individuals in Israel, allegedly [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/">Israeli Cyber Units Potentially Involved in $90 Million Nobitex Hack for Espionage, Suggests TRM Labs</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>TRM Labs, a leading <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> analytics organization, has put forth the theory that the infamous $90 million Nobitex <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchange hack may have been utilized by Israeli <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> units for espionage purposes. This possible connection was highlighted in the company&rsquo;s recent report.</p>
<p>The report drew attention to the arrests of three individuals in Israel, allegedly engaged in espionage activities for Iran, which involved surveillance, propaganda, and intelligence collection. The intriguing aspect of this case is that the alleged operatives were remunerated using digital assets, a rarely seen method of payment in state-sponsored espionage.</p>
<p>&ldquo;Digital assets enable cross-border transactions without the need for traditional banking systems, which makes them an ideal tool for covert operations,&rdquo; TRM Labs stated in their report.</p>
<p>One of the suspects, 28-year-old Dmitri Cohen, was purportedly paid $500 in <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> for each completed task by Iranian intelligence services. TRM Labs pointed out that these arrests occurred shortly after Nobitex, Iran&rsquo;s largest <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchange, was hacked.</p>
<p>Despite no official confirmation of a connection between the hack and the arrests from Israeli authorities, TRM Labs suggests a potential correlation based on the timing and tactical profile.</p>
<p>The Nobitex hack occurred on June 18, where hot wallets across several networks were emptied, resulting in over $90 million in <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> asset losses. Notably, the pro-Israeli hacker group Gonjeshke Darande claimed responsibility for this <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> attack.</p>
<p>The group has a history of disrupting and collecting intelligence from Iranian-affiliated platforms. According to TRM Labs, the sequence of events, including Israeli strikes, the Nobitex breach, and the arrests, raises the potential that Israeli <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> units may have exploited the Nobitex data for intelligence purposes.</p>
<p>While direct public evidence linking the Nobitex breach to the espionage investigations is lacking, TRM Labs suggests that the theory aligns with known tactics used by Israeli <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> defense teams and Gonjeshke Darande&rsquo;s operational history.</p>
<p>At the time of the hack, onchain analytics platform Chainalysis identified Nobitex as a critical player in Iran&rsquo;s sanctioned <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> space, with numerous ties to illicit activities.</p>
<p>&ldquo;Nobitex&rsquo;s role goes beyond being a local exchange; it serves as a vital hub within Iran&rsquo;s heavily sanctioned <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> ecosystem, providing access to global markets for users isolated from traditional finance,&rdquo; Chainalysis report stated.</p>
<p>Previous onchain investigations have linked Nobitex to nefarious actors, including ransomware operators affiliated with the IRGC and sanctioned Russian <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchanges.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/">Israeli Cyber Units Potentially Involved in $90 Million Nobitex Hack for Espionage, Suggests TRM Labs</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Google Employee Accused of Illegally Sharing AI Tech Secrets with China</title>
		<link>https://cryptoupdate.io/2025/02/05/google-employee-accused-of-illegally-sharing-ai-tech-secrets-with-china/</link>
					<comments>https://cryptoupdate.io/2025/02/05/google-employee-accused-of-illegally-sharing-ai-tech-secrets-with-china/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Wed, 05 Feb 2025 09:31:11 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Trade Secrets]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/02/05/google-employee-accused-of-illegally-sharing-ai-tech-secrets-with-china/</guid>

					<description><![CDATA[<p>On February 5, the US Department of Justice (DOJ) charged a Chinese national employed by Google in the US with economic espionage for purportedly leaking Google&#8217;s confidential AI technology information. Leon Ding, also known as Linwei, is alleged to have transferred over 1,000 private Google files to his personal Google Cloud account from May 2022 [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/02/05/google-employee-accused-of-illegally-sharing-ai-tech-secrets-with-china/">Google Employee Accused of Illegally Sharing AI Tech Secrets with China</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On February 5, the US Department of Justice (DOJ) charged a Chinese national employed by Google in the US with economic espionage for purportedly leaking Google&#8217;s confidential AI technology information. Leon Ding, also known as Linwei, is alleged to have transferred over 1,000 private Google files to his personal Google Cloud account from May 2022 to May 2023.</p>
<p>The stolen data is said to contain proprietary information about Google’s software platform and hardware infrastructure that powers the company’s AI supercomputing systems. Ding, a software engineer at Google since 2019, is accused of secretly associating with two Chinese tech firms and intending to aid the Chinese government by misappropriating Google&#8217;s trade secrets.</p>
<p>According to court documents, Ding initiated conversations with the CTO of a Chinese tech firm in June 2022. By May 2023, he had privately established an AI and machine-learning company in China, where he served as CEO. The DOJ alleges that Ding pilfered sensitive trade secrets, including information about Google’s custom-built SmartNIC, Tensor Processing Unit (TPU), and Graphics Processing Unit (GPU) chips and systems.</p>
<p>The DOJ further alleges that Ding leaked sensitive software designed for chip communications and future AI innovations to favor the government of the People’s Republic of China (PRC). The DOJ further claims that Ding composed and distributed PowerPoint presentations to his Chinese company&#8217;s employees, which cited PRC national policies and talent programs with statements like, “will help China to have computing power infrastructure capabilities that are on par with the international level.”</p>
<p>The FBI is currently investigating the case, and Ding&#8217;s guilt has yet to be established. In March 2024, Ding was initially indicted on four counts of trade secrets theft. If convicted on all seven counts of economic espionage and seven counts of trade secrets theft, Ding could face up to 175 years in prison and fines of up to $36.75 million. However, the final fine will be determined based on the US Sentencing Guidelines and other factors.</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/02/05/google-employee-accused-of-illegally-sharing-ai-tech-secrets-with-china/">Google Employee Accused of Illegally Sharing AI Tech Secrets with China</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/02/05/google-employee-accused-of-illegally-sharing-ai-tech-secrets-with-china/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
