{"id":91293,"date":"2025-11-22T07:00:00","date_gmt":"2025-11-22T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=91293"},"modified":"2025-11-22T07:01:44","modified_gmt":"2025-11-22T04:01:44","slug":"dirty-money-still-washes-through-cex-a-whatsapp-privacy-flaw-and-other-cybersecurity-news","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/dirty-money-still-washes-through-cex-a-whatsapp-privacy-flaw-and-other-cybersecurity-news\/","title":{"rendered":"Dirty money still washes through CEX, a WhatsApp privacy flaw, and other cybersecurity news"},"content":{"rendered":"<p>A round-up of the week\u2019s key cybersecurity stories.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Investigation: criminals keep laundering funds via CEX.<\/li>\n<li>American pleads guilty to laundering $25m.<\/li>\n<li>A serious privacy flaw found in WhatsApp.<\/li>\n<li>Military dismantles a second scam compound in Myanmar.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\">Investigation: laundering continues via CEX<\/h2>\n<p>The International Consortium of Investigative Journalists (ICIJ) <a href=\"https:\/\/www.icij.org\/investigations\/coin-laundry\/cryptocurrency-exchanges-binance-okx-money-laundering-crime\/\">published<\/a> a report titled The Coin Laundry, revealing how criminal syndicates wash funds through major <span data-descr=\"centralised exchanges\" class=\"old_tooltip\">CEX<\/span>.<\/p>\n<p>According to the ICIJ, crypto exchanges continue to process crime-linked transactions despite regulatory oversight. The report highlights Huione Group, a network tied to human trafficking and scams in Asia. Reporters say at least $408m flowed from it to Binance.<\/p>\n<p>OKX, which in February 2025 <a href=\"https:\/\/forklog.com\/en\/news\/okx-to-pay-over-504-million-in-u-s-justice-department-settlement\">admitted<\/a> violating US law, continued to \u201creceive hundreds of millions of dollars\u201d from the same sources as Binance. More than $161m arrived after the US Treasury labelled Huione a \u201cprimary money laundering concern,\u201d the investigation says.<\/p>\n<p>With 37 media partners across 35 countries, the ICIJ compiled hundreds of crypto addresses linked to North Korean hackers, Russian money-laundering schemes and Chinese drug networks. An analysis of tens of thousands of transactions found criminal groups actively used accounts on Binance, Coinbase, OKX, HTX, KuCoin and other exchanges.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cThe crypto industry has effectively built a parallel shadow financial system in which exchanges continue to profit from dubious transactions while victims of crimes are left with no real chance of recovering losses.\u201d<\/em>, the authors concluded.<\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\">American pleads guilty to laundering $25m<\/h2>\n<p>A 45-year-old California resident pleaded guilty to laundering at least $25m stolen in a fraud scheme, according to a <a href=\"https:\/\/www.justice.gov\/usao-dc\/pr\/cryptocurrency-money-launderer-pleads-guilty-rico-conspiracy-scheme-stole-263-million\">US Department of Justice<\/a> release.<\/p>\n<p>According to the department, Kunal Mehta was part of a group active from October 2023 to March 2025. On 18 August 2024 the perpetrators <a href=\"https:\/\/forklog.com\/en\/news\/us-authorities-arrest-suspects-in-4100-btc-theft-from-genesis-creditor\">stole<\/a> more than 4,100 BTC (over $230m at the time) from a victim in Washington, DC. The conspirators converted most of the funds into <a href=\"https:\/\/forklog.com\/en\/news\/what-is-monero-xmr\">Monero<\/a> but made mistakes that allowed investigators to link the transactions to the stolen assets.<\/p>\n<p>In 2024, Mehta set up several shell companies to legitimise the proceeds, the DOJ said. He received partially \u201cclean\u201d cryptocurrency and sent it to partners who executed more complex schemes. The money then returned to accounts of legitimate firms connected to him.<\/p>\n<h2 class=\"wp-block-heading\">A serious flaw found in WhatsApp<\/h2>\n<p>Researchers at <a href=\"https:\/\/github.com\/sbaresearch\/whatsapp-census\/blob\/main\/Hey_there_You_are_using_WhatsApp.pdf\">SBA Research<\/a> uncovered a serious privacy issue in WhatsApp. They collected data from 3.5bn user accounts due to a lack of request rate limits, <a href=\"https:\/\/www.wired.com\/story\/a-simple-whatsapp-security-flaw-exposed-billions-phone-numbers\/\">Wired<\/a> reports.<\/p>\n<p>Enumeration via the web client reached up to 100m phone numbers per hour. Ultimately, researchers obtained profile photos for 57% of accounts and \u201cAbout\u201d text for 29%.<\/p>\n<p>They notified Meta in April and deleted the harvested data, according to the outlet. The company, however, did not fix the flaw until October.<\/p>\n<p>Media suggested attackers could have had similar access earlier. Meta told Wired there was no sign of abuse and that only \u201cpublic data\u201d were exposed.<\/p>\n<p>Country statistics showed a high share of profiles with open information:<\/p>\n<ul class=\"wp-block-list\">\n<li>US \u2014 44% with a photo, 33% with \u201cAbout\u201d data;<\/li>\n<li>India \u2014 62% with a photo;<\/li>\n<li>Brazil \u2014 61% with a photo.<\/li>\n<\/ul>\n<p>The report also notes that WhatsApp is banned in China, Myanmar, North Korea and several other countries. Even so, the team found millions of active accounts tied to numbers from these regions.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"405\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-6e0424af3023480e-10149886614077891-1024x405.png\" alt=\"image\" class=\"wp-image-270254\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-6e0424af3023480e-10149886614077891-1024x405.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-6e0424af3023480e-10149886614077891-300x119.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-6e0424af3023480e-10149886614077891-768x304.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-6e0424af3023480e-10149886614077891-1536x607.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-6e0424af3023480e-10149886614077891.png 1593w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: SBA Research.<\/figcaption><\/figure>\n<p>Some cryptographic keys appeared hundreds of times, and for 20 US numbers the cipher consisted entirely of zeros. The experts suggested the cause was the use of unofficial or modified WhatsApp clients, not a flaw in the service itself.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"301\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-3e799d6a234003d5-10149886220455762-1024x301.png\" alt=\"image\" class=\"wp-image-270253\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-3e799d6a234003d5-10149886220455762-1024x301.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-3e799d6a234003d5-10149886220455762-300x88.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-3e799d6a234003d5-10149886220455762-768x226.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-3e799d6a234003d5-10149886220455762-1536x452.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-3e799d6a234003d5-10149886220455762.png 1597w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: SBA Research.<\/figcaption><\/figure>\n<p>A closer look at accounts with identical keys showed many appeared fraudulent. The researchers argue the core problem is the identification model\u2014phone numbers are ill-suited for the role.<\/p>\n<p>According to a <a href=\"https:\/\/9to5mac.com\/2025\/11\/06\/whatsapp-username-support-timeline\/\">Meta announcement<\/a>, WhatsApp developers are already testing usernames as a more private alternative.<\/p>\n<h2 class=\"wp-block-heading\">Myanmar military dismantles a second scam compound<\/h2>\n<p>Myanmar\u2019s military has expanded a sweeping operation against crypto-scam compounds, dismantling a second major hub in the city of Shwe Kokko, <a href=\"https:\/\/asia.nikkei.com\/spotlight\/cybersecurity\/myanmar-military-says-it-has-raided-a-2nd-major-online-scam-center\">Nikkei Asia<\/a> reports.<\/p>\n<p>On 25 October, KK Park was targeted. Authorities detained 346 foreign nationals and seized about 10,000 mobile phones used in fraud schemes.<\/p>\n<h2 class=\"wp-block-heading\">Google warns of a Chrome vulnerability<\/h2>\n<p>On 17 November, Google <a href=\"https:\/\/chromereleases.googleblog.com\/2025\/11\/stable-channel-update-for-desktop_17.html\">warned<\/a> of a dangerous vulnerability in the Chrome browser.<\/p>\n<p>Specialists said the flaw stems from improper handling of a certain data type in the V8 JavaScript engine, causing memory corruption. An attacker could exploit it via a web page to execute malicious code.<\/p>\n<p>The company added that attackers had already attempted to exploit the issue. Google recommended promptly checking for an updated browser version:<\/p>\n<ul class=\"wp-block-list\">\n<li>Windows \u2014 142.0.7444.175\/176;<\/li>\n<li>Mac \u2014 142.0.7444.176;<\/li>\n<li>Linux \u2014 142.0.7444.175.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Cloudflare explains a major outage<\/h2>\n<p>Service problems at Cloudflare that <a href=\"https:\/\/forklog.com\/en\/news\/cloudflare-outage-disrupts-multiple-crypto-services\">led<\/a> to significant client outages on 18 November were not the result of a hack, company representatives <a href=\"https:\/\/blog.cloudflare.com\/18-november-2025-outage\/\">said<\/a>.<\/p>\n<p>Initially, the infrastructure giant cited a \u201cspike in unusual traffic,\u201d raising fears of a breach. Cloudflare\u2019s CTO, Dane Knecht, later rejected that theory.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">I won\u2019t mince words: earlier today we failed our customers and the broader Internet when a problem in <a href=\"https:\/\/twitter.com\/Cloudflare?ref_src=twsrc%5Etfw\">@Cloudflare<\/a> network impacted large amounts of traffic that rely on us. The sites, businesses, and organizations that rely on Cloudflare depend on us being available and I\u2026<\/p>\n<p>\u2014 Dane Knecht \ud83e\uddad (@dok2001) <a href=\"https:\/\/twitter.com\/dok2001\/status\/1990791419653484646?ref_src=twsrc%5Etfw\">November 18, 2025<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>An internal review found a service-management error in the bot-mitigation function after a routine configuration change, which propagated to other systems.<\/p>\n<p>Cloudflare serves about 19% of all active websites and the online services of 35% of Fortune 500 firms. The incident affected millions of users.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>Bloomberg <a href=\"https:\/\/forklog.com\/en\/news\/bloomberg-reports-on-us-investigation-into-bitmain\">reported<\/a> a US investigation into Bitmain.<\/li>\n<li>The BNB protocol GANA Payment was <a href=\"https:\/\/forklog.com\/en\/news\/gana-payment-protocol-on-bnb-chain-hacked-for-3-1-million\">hacked<\/a> for $3.1m.<\/li>\n<li>The aPriori team <a href=\"https:\/\/forklog.com\/en\/news\/apriori-team-vanishes-amid-airdrop-misappropriation-allegations\">disappeared<\/a> after accusations of misappropriating an airdrop.<\/li>\n<li>Anthropic <a href=\"https:\/\/forklog.com\/en\/news\/anthropic-unveils-first-ai-driven-cyber-espionage-operation\">revealed<\/a> the first AI-orchestrated cyber-espionage operation.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">What to read this weekend?<\/h2>\n<p>In a new feature, ForkLog explores the ideas and life of one of privacy\u2019s leading ideologues, the creator of Signal, Moxie Marlinspike.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A round-up of the week\u2019s key cybersecurity stories.<\/p>\n","protected":false},"author":1,"featured_media":91294,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"This week: laundering via CEX, a WhatsApp flaw, a Myanmar raid, a Chrome bug, Cloudflare outage.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-91293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"264","promo_type":"1","layout_type":"1","short_excerpt":"This week: laundering via CEX, a WhatsApp flaw, a Myanmar raid, a Chrome bug, Cloudflare outage.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/91293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=91293"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/91293\/revisions"}],"predecessor-version":[{"id":91295,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/91293\/revisions\/91295"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/91294"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=91293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=91293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=91293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}