<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>TRM Labs &#8211; Crypto Market Insights: Dive In with CryptoUpdate.io</title>
	<atom:link href="https://cryptoupdate.io/tag/trm-labs/feed/" rel="self" type="application/rss+xml" />
	<link>https://cryptoupdate.io</link>
	<description>Latest cryptocurrency news, market updates and analysis</description>
	<lastBuildDate>Sun, 10 Aug 2025 08:01:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Ransomware Group Embargo: $34M Crypto Scheme &#038; Powerful Tactics Revealed</title>
		<link>https://cryptoupdate.io/2025/08/10/ransomware-group-embargo-34m-crypto-scheme-tactics/</link>
					<comments>https://cryptoupdate.io/2025/08/10/ransomware-group-embargo-34m-crypto-scheme-tactics/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Sun, 10 Aug 2025 08:01:11 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Embargo]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[TRM Labs]]></category>
		<category><![CDATA[U.S. infrastructure]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/08/10/ransomware-group-embargo-34m-crypto-scheme-tactics/</guid>

					<description><![CDATA[<p>Embargo Ransomware Group has emerged as a formidable force in the cybercrime landscape, amassing over $34 million in cryptocurrency-linked ransom payments since April 2024. This group operates under a ransomware-as-a-service (RaaS) model, targeting critical infrastructure across the United States, including hospitals and pharmaceutical networks. Embargo&#8217;s Impact on U.S. Infrastructure The Embargo ransomware group has left [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/08/10/ransomware-group-embargo-34m-crypto-scheme-tactics/">Ransomware Group Embargo: $34M Crypto Scheme &amp; Powerful Tactics Revealed</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Embargo Ransomware Group</strong> has emerged as a formidable force in the cybercrime landscape, amassing over $34 million in cryptocurrency-linked ransom payments since April 2024. This group operates under a ransomware-as-a-service (RaaS) model, targeting critical infrastructure across the United States, including hospitals and pharmaceutical networks.</p>
<h2>Embargo&rsquo;s Impact on U.S. Infrastructure</h2>
<p>The Embargo ransomware group has left a significant mark on U.S. infrastructure. Notable victims include American Associated Pharmacies, Georgia-based Memorial Hospital and Manor, and Weiser Memorial Hospital in Idaho. These organizations have faced ransom demands reaching up to $1.3 million, according to blockchain intelligence firm TRM Labs.</p>
<h2>Potential Rebranding from BlackCat</h2>
<p>TRM Labs suggests that Embargo could be a rebranded version of the notorious BlackCat (ALPHV) operation, which vanished following a suspected exit scam earlier this year. Both groups exhibit technical overlap, utilizing the Rust programming language and maintaining similar data leak sites. Moreover, they share onchain ties through common wallet infrastructure.</p>
<h2>Embargo Holds $18.8M in Dormant <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Crypto</a></h2>
<p>Around $18.8 million of Embargo&rsquo;s <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> proceeds remain dormant in unaffiliated wallets. Experts believe this tactic is designed to delay detection or exploit better laundering conditions in the future. The group employs a network of intermediary wallets, high-risk exchanges, and sanctioned platforms like Cryptex.net to obscure the origin of funds.</p>
<h2>Double Extortion Tactics</h2>
<p>While not as overtly aggressive as other ransomware groups like LockBit or Cl0p, Embargo has adopted double extortion tactics. They encrypt systems and threaten to leak sensitive data if victims fail to pay. In some cases, they have publicly named individuals or leaked data on their site to increase pressure.</p>
<h2>Targeting High-Value Sectors</h2>
<p>Embargo primarily targets sectors where downtime is costly, including healthcare, business services, and manufacturing. The group has shown a preference for U.S.-based victims, likely due to their higher capacity to pay.</p>
<h2>UK&rsquo;s Ransomware Payment Ban</h2>
<p>In response to the growing threat, the UK is set to ban ransomware payments for all public sector bodies and critical national infrastructure operators, such as energy, healthcare, and local councils. The proposal introduces a prevention regime that requires victims outside the ban to report intended ransom payments.</p>
<p>The plan includes a mandatory reporting system, requiring victims to submit an initial report to the government within 72 hours of an attack and a detailed follow-up within 28 days. Notably, ransomware attacks dropped by 35% last year, marking the first decline in ransomware revenues since 2022, as reported by Chainalysis.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/08/10/ransomware-group-embargo-34m-crypto-scheme-tactics/">Ransomware Group Embargo: $34M Crypto Scheme &amp; Powerful Tactics Revealed</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/08/10/ransomware-group-embargo-34m-crypto-scheme-tactics/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Israeli Cyber Units Potentially Involved in $90 Million Nobitex Hack for Espionage, Suggests TRM Labs</title>
		<link>https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/</link>
					<comments>https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Fri, 27 Jun 2025 09:01:02 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Nobitex]]></category>
		<category><![CDATA[TRM Labs]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/</guid>

					<description><![CDATA[<p>TRM Labs, a leading crypto analytics organization, has put forth the theory that the infamous $90 million Nobitex crypto exchange hack may have been utilized by Israeli cyber units for espionage purposes. This possible connection was highlighted in the company&#8217;s recent report. The report drew attention to the arrests of three individuals in Israel, allegedly [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/">Israeli Cyber Units Potentially Involved in $90 Million Nobitex Hack for Espionage, Suggests TRM Labs</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>TRM Labs, a leading <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> analytics organization, has put forth the theory that the infamous $90 million Nobitex <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchange hack may have been utilized by Israeli <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> units for espionage purposes. This possible connection was highlighted in the company&rsquo;s recent report.</p>
<p>The report drew attention to the arrests of three individuals in Israel, allegedly engaged in espionage activities for Iran, which involved surveillance, propaganda, and intelligence collection. The intriguing aspect of this case is that the alleged operatives were remunerated using digital assets, a rarely seen method of payment in state-sponsored espionage.</p>
<p>&ldquo;Digital assets enable cross-border transactions without the need for traditional banking systems, which makes them an ideal tool for covert operations,&rdquo; TRM Labs stated in their report.</p>
<p>One of the suspects, 28-year-old Dmitri Cohen, was purportedly paid $500 in <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> for each completed task by Iranian intelligence services. TRM Labs pointed out that these arrests occurred shortly after Nobitex, Iran&rsquo;s largest <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchange, was hacked.</p>
<p>Despite no official confirmation of a connection between the hack and the arrests from Israeli authorities, TRM Labs suggests a potential correlation based on the timing and tactical profile.</p>
<p>The Nobitex hack occurred on June 18, where hot wallets across several networks were emptied, resulting in over $90 million in <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> asset losses. Notably, the pro-Israeli hacker group Gonjeshke Darande claimed responsibility for this <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> attack.</p>
<p>The group has a history of disrupting and collecting intelligence from Iranian-affiliated platforms. According to TRM Labs, the sequence of events, including Israeli strikes, the Nobitex breach, and the arrests, raises the potential that Israeli <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> units may have exploited the Nobitex data for intelligence purposes.</p>
<p>While direct public evidence linking the Nobitex breach to the espionage investigations is lacking, TRM Labs suggests that the theory aligns with known tactics used by Israeli <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> defense teams and Gonjeshke Darande&rsquo;s operational history.</p>
<p>At the time of the hack, onchain analytics platform Chainalysis identified Nobitex as a critical player in Iran&rsquo;s sanctioned <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> space, with numerous ties to illicit activities.</p>
<p>&ldquo;Nobitex&rsquo;s role goes beyond being a local exchange; it serves as a vital hub within Iran&rsquo;s heavily sanctioned <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> ecosystem, providing access to global markets for users isolated from traditional finance,&rdquo; Chainalysis report stated.</p>
<p>Previous onchain investigations have linked Nobitex to nefarious actors, including ransomware operators affiliated with the IRGC and sanctioned Russian <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchanges.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/">Israeli Cyber Units Potentially Involved in $90 Million Nobitex Hack for Espionage, Suggests TRM Labs</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>TRM Labs and Magnet Forensics Forge Partnership for Enhanced Blockchain Intelligence and Digital Forensics</title>
		<link>https://cryptoupdate.io/2025/03/14/trm-labs-and-magnet-forensics-forge-partnership-for-enhanced-blockchain-intelligence-and-digital-forensics/</link>
					<comments>https://cryptoupdate.io/2025/03/14/trm-labs-and-magnet-forensics-forge-partnership-for-enhanced-blockchain-intelligence-and-digital-forensics/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Fri, 14 Mar 2025 16:01:01 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Trading]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Digital Forensics]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[Magnet Forensics]]></category>
		<category><![CDATA[partnership]]></category>
		<category><![CDATA[TRM Labs]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/03/14/trm-labs-and-magnet-forensics-forge-partnership-for-enhanced-blockchain-intelligence-and-digital-forensics/</guid>

					<description><![CDATA[<p>SAN FRANCISCO, March 14, 2025 (GLOBE NEWSWIRE) &#8212; A strategic technology partnership was announced recently by global digital investigation solutions provider, Magnet Forensics, and TRM Labs, a leading blockchain intelligence firm. This partnership aims to equip law enforcement and national security agencies with the tools necessary to reveal crucial blockchain evidence from devices seized and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/03/14/trm-labs-and-magnet-forensics-forge-partnership-for-enhanced-blockchain-intelligence-and-digital-forensics/">TRM Labs and Magnet Forensics Forge Partnership for Enhanced Blockchain Intelligence and Digital Forensics</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>SAN FRANCISCO, March 14, 2025 (GLOBE NEWSWIRE)</em> &mdash; A strategic technology partnership was announced recently by global digital investigation solutions provider, Magnet Forensics, and TRM Labs, a leading blockchain intelligence firm. This partnership aims to equip law enforcement and national security agencies with the tools necessary to reveal crucial blockchain evidence from devices seized and analyzed in Magnet Forensics reports.</p>
<p>Magnet Forensics has established itself as a reputable provider of advanced digital investigations solutions, aiding law enforcement, governmental bodies, and corporations in their investigation and analysis of digital evidence across various devices. With the recent partnership, TRM Labs&rsquo; BLOCKINT API will be integrated into Magnet Forensics&rsquo; digital forensics workflows, enabling a more efficient tracking of illicit activities on the blockchain.</p>
<p>&ldquo;Our collaboration with TRM Labs imparts investigators with essential insights to tackle increasingly complex crimes involving blockchain-related evidence,&rdquo; stated Braden Thomas, Chief Product and Research Officer at Magnet Forensics. &ldquo;This partnership simplifies the process of linking digital and blockchain evidence, ensuring truth is revealed and justice prevails.&rdquo;</p>
<p>Agencies utilizing Magnet Forensics to reveal blockchain evidence will be further empowered with a TRM Forensics license, enabling them to trace <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> transactions and combat illegal activities like fraud, money laundering, and cybercrime. This collaboration provides broader access to TRM Labs&rsquo; intelligence through Magnet Forensics&rsquo; integration of TRM&rsquo;s BLOCKINT API, offering investigators deeper understanding of both digital forensics and blockchain-based financial systems.</p>
<p>&ldquo;Criminal gains are no longer merely hidden in offshore accounts or walls&mdash;they&rsquo;re stored in <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> wallets on mobile devices and laptops, sometimes amounting to billions. These wallets hold the keys to solving cases, but only if investigators are equipped with the right data and tools to act swiftly,&rdquo; said Ari Redbord, Global Head of Policy at TRM Labs. &ldquo;Our collaboration with Magnet Forensics provides state-of-the-art blockchain intelligence directly to digital forensics teams, enabling law enforcement to track the money, seize assets, and disassemble criminal networks faster than before.&rdquo;</p>
<p>This collaboration signifies an important advancement in bolstering the capabilities of both organizations, reinforcing their collective mission to combat cybercrime and financial fraud in an increasingly digital and decentralized world.</p>
<p>For further information, visit <a href="www.magnetforensics.com">www.magnetforensics.com</a> and <a href="www.trmlabs.com">www.trmlabs.com</a>.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/03/14/trm-labs-and-magnet-forensics-forge-partnership-for-enhanced-blockchain-intelligence-and-digital-forensics/">TRM Labs and Magnet Forensics Forge Partnership for Enhanced Blockchain Intelligence and Digital Forensics</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/03/14/trm-labs-and-magnet-forensics-forge-partnership-for-enhanced-blockchain-intelligence-and-digital-forensics/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
