Public ledgers mean criminals can take cryptocurrency without revealing who they are, but everyone can still see where it went.
The accused are said to have harassed enemies by taking control of phone accounts and sending bomb threats to 1,066 kindergartens.
Deputy Attorney General Jeffrey Rosen said the Chinese state had made the country ‘safe for their own cyber criminals’.
If you create lots of different websites for multiple front organizations you may fail to notice when one has been hacked.
Fraudsters in Gurgaon, India, were raided by police after British hacker Jim Browning published recordings of their crimes.
The numbers were used by English-speaking fraudsters wanting to obtain remote access to their victims’ computers.
Persuading the unwary to allow remote access to their computers is an old trick, but it supposedly is used to execute SIM swaps.
Though no financial data was compromised, there will be an increased risk of account takeovers.
Investigation work by security consultancy Cybereason found that a group of state-sponsored hackers have been gradually infiltrating telco networks since at least 2012.
The Saudis have undoubtedly invested in spytech, but not everyone agrees they were involved in a conspiracy to blackmail Jeff Bezos.