👀 家人們,每天看行情、刷大佬觀點,卻從來不開口說兩句?你的觀點可能比你想的更有價值!
廣場新人 & 回歸福利正式上線!不管你是第一次發帖還是久違回歸,我們都直接送你獎勵!🎁
每月 $20,000 獎金等你來領!
📅 活動時間: 長期有效(月底結算)
💎 參與方式:
用戶需爲首次發帖的新用戶或一個月未發帖的回歸用戶。
發帖時必須帶上話題標籤: #我在广场发首帖 。
內容不限:幣圈新聞、行情分析、曬單吐槽、幣種推薦皆可。
💰 獎勵機制:
必得獎:發帖體驗券
每位有效發帖用戶都可獲得 $50 倉位體驗券。(注:每月獎池上限 $20,000,先到先得!如果大家太熱情,我們會繼續加碼!)
進階獎:發帖雙王爭霸
月度發帖王: 當月發帖數量最多的用戶,額外獎勵 50U。
月度互動王: 當月帖子互動量(點讚+評論+轉發+分享)最高的用戶,額外獎勵 50U。
📝 發帖要求:
帖子字數需 大於30字,拒絕純表情或無意義字符。
內容需積極健康,符合社區規範,嚴禁廣告引流及違規內容。
💡 你的觀點可能會啓發無數人,你的第一次分享也許就是成爲“廣場大V”的起點,現在就開始廣場創作之旅吧!
Binance Freezes $4.4 Million in Crypto Related to North Korean Hackers
On the 25th of May, Binance announced the seizure of approximately $4.4 million in cryptocurrency belonging to fronts for North Korean organizations operating in the country and abroad.
Due to sanctions against the rogue nation, agents working for it have often turned to illicit methods of raising funds, including theft of crypto.
Illicit Research Funding Blocked
The funds seized today were to be remitted to the Pyongyang University of Automation, responsible for the training of the infamous North Korean hackers, according to the U.S. Department of Treasury, and the North Korean Technical Reconnaissance Bureau, which employs said bad actors.
Most of the cybercriminals trained at the Pyongyang University of Automation are part of the 110th Research Center, the unit in charge of running the Lazarus Group and similar groups.
In order to fund these entities, North Korean IT professionals – often based in Russia and China – seek employment in companies around the world, turning over their salaries to the North Korean government. However, the latest batch of funding was stopped due to the efforts of the U.S. Government and Binance.
Brian Nelson, a spokesperson for the U.S. Treasury, thanked their “partners in the private sector” for the help offered.
Commitment to a Safer World
Binance has previously come under fire for allegedly not doing enough to prevent cybercriminals and radical groups from receiving funding from sympathizers worldwide.
The firm, though, has responded to the allegations, stating that the team does everything in its power to stop these actions.
Indeed, cybersecurity is a numbers game – the fact that a few bad actors manage to squeeze through the net says nothing about the much larger number of bad actors stopped. This is amplified by the fact that companies do not publicly announce which bad actors they stopped and how did they do it, as this would help others evade detection.