The post Europol bounty for Russian crypto ransomware gang wasn’t real appeared on BitcoinEthereumNews.com. A $50,000 bounty supposedly issued by Europol to help track down administrators of the Russian-based ransomware gang Qilin was actually just a Telegram scam. News of the fictitious bounty fooled several cybersecurity news outlets into reporting that a reward would be paid to anybody who could give Europol information on two Qilin administrators known as Haise and XORacle. The pair supposedly “coordinate affiliates and oversee extortion activities,” and Europol wanted information that “directly leads to the identification or location of these administrators.” However, Europol confirmed to SecurityWeek that the supposed reward was a “scam” and that the agency never announced the bounty.  Not only that, the only social media channels run by Europol can be found on Facebook, Instagram, Bluesky, X, YouTube, and LinkedIn. SecurityWeek notes that a rival gang may have created the fake bounty to damage a rival’s reputation, steal their affiliates, or create paranoia within the gang.   Qilin attacks national security for crypto Qilin is a prominent ransomware gang that extorts crypto, including bitcoin and monero, through its ransomware-as-a-service. In March this year, Qilin claimed to have stolen and sold data including “private correspondence, personal information, decrees etc,” from the Ukrainian Ministry of Foreign Affairs.  Read more: LockBit ransomware gang sends ‘friendly advice’ to new FBI Director Kash Patel It’s also targeted hospitals in London and published stolen patient data, claiming that it shouldn’t be blamed for its actions.  One Qilin member told BBC reporter Joe Tidy, “We are very sorry for the people who were suffered because of it. Herewith we don’t consider ourselves guilty and we ask you don’t blame us in this situation.” The group instead claimed it attacked hospitals in retaliation for the UK’s role in an unspecified war.  Qilin reportedly doesn’t attack countries within the Commonwealth of Independent States, including Russia, Kyrgyzstan,… The post Europol bounty for Russian crypto ransomware gang wasn’t real appeared on BitcoinEthereumNews.com. A $50,000 bounty supposedly issued by Europol to help track down administrators of the Russian-based ransomware gang Qilin was actually just a Telegram scam. News of the fictitious bounty fooled several cybersecurity news outlets into reporting that a reward would be paid to anybody who could give Europol information on two Qilin administrators known as Haise and XORacle. The pair supposedly “coordinate affiliates and oversee extortion activities,” and Europol wanted information that “directly leads to the identification or location of these administrators.” However, Europol confirmed to SecurityWeek that the supposed reward was a “scam” and that the agency never announced the bounty.  Not only that, the only social media channels run by Europol can be found on Facebook, Instagram, Bluesky, X, YouTube, and LinkedIn. SecurityWeek notes that a rival gang may have created the fake bounty to damage a rival’s reputation, steal their affiliates, or create paranoia within the gang.   Qilin attacks national security for crypto Qilin is a prominent ransomware gang that extorts crypto, including bitcoin and monero, through its ransomware-as-a-service. In March this year, Qilin claimed to have stolen and sold data including “private correspondence, personal information, decrees etc,” from the Ukrainian Ministry of Foreign Affairs.  Read more: LockBit ransomware gang sends ‘friendly advice’ to new FBI Director Kash Patel It’s also targeted hospitals in London and published stolen patient data, claiming that it shouldn’t be blamed for its actions.  One Qilin member told BBC reporter Joe Tidy, “We are very sorry for the people who were suffered because of it. Herewith we don’t consider ourselves guilty and we ask you don’t blame us in this situation.” The group instead claimed it attacked hospitals in retaliation for the UK’s role in an unspecified war.  Qilin reportedly doesn’t attack countries within the Commonwealth of Independent States, including Russia, Kyrgyzstan,…

Europol bounty for Russian crypto ransomware gang wasn’t real

2 min read

A $50,000 bounty supposedly issued by Europol to help track down administrators of the Russian-based ransomware gang Qilin was actually just a Telegram scam.

News of the fictitious bounty fooled several cybersecurity news outlets into reporting that a reward would be paid to anybody who could give Europol information on two Qilin administrators known as Haise and XORacle.

The pair supposedly “coordinate affiliates and oversee extortion activities,” and Europol wanted information that “directly leads to the identification or location of these administrators.”

However, Europol confirmed to SecurityWeek that the supposed reward was a “scam” and that the agency never announced the bounty. 

Not only that, the only social media channels run by Europol can be found on Facebook, Instagram, Bluesky, X, YouTube, and LinkedIn.

SecurityWeek notes that a rival gang may have created the fake bounty to damage a rival’s reputation, steal their affiliates, or create paranoia within the gang.  

Qilin attacks national security for crypto

Qilin is a prominent ransomware gang that extorts crypto, including bitcoin and monero, through its ransomware-as-a-service.

In March this year, Qilin claimed to have stolen and sold data including “private correspondence, personal information, decrees etc,” from the Ukrainian Ministry of Foreign Affairs. 

Read more: LockBit ransomware gang sends ‘friendly advice’ to new FBI Director Kash Patel

It’s also targeted hospitals in London and published stolen patient data, claiming that it shouldn’t be blamed for its actions. 

One Qilin member told BBC reporter Joe Tidy, “We are very sorry for the people who were suffered because of it. Herewith we don’t consider ourselves guilty and we ask you don’t blame us in this situation.”

The group instead claimed it attacked hospitals in retaliation for the UK’s role in an unspecified war

Qilin reportedly doesn’t attack countries within the Commonwealth of Independent States, including Russia, Kyrgyzstan, Belarus and Moldova, and its affiliates take home 80% of ransom payments below $3 million.

Got a tip? Send us an email securely via Protos Leaks. For more informed news, follow us on X, Bluesky, and Google News, or subscribe to our YouTube channel.

Source: https://protos.com/europol-bounty-for-russian-crypto-ransomware-gang-wasnt-real/

Market Opportunity
Threshold Logo
Threshold Price(T)
$0,008109
$0,008109$0,008109
-%0,30
USD
Threshold (T) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Tags:

You May Also Like

Shibarium May No Longer Turbocharge Shiba Inu Price Rally, Here’s Reason

Shibarium May No Longer Turbocharge Shiba Inu Price Rally, Here’s Reason

The post Shibarium May No Longer Turbocharge Shiba Inu Price Rally, Here’s Reason appeared on BitcoinEthereumNews.com. Shibarium, the layer-2 blockchain of the Shiba Inu (SHIB) ecosystem, is battling to stay active. Shibarium has slipped from hitting transaction milestones to struggling to record any transactions on its platform, a development that could severely impact SHIB. Shibarium transactions crash from millions to near zero As per Shibariumscan data, the total daily transactions on Shibarium as of Sept. 16 stood at 11,600. This volume of transactions reflects how low the transaction count has dropped for the L2, whose daily average ranged between 3.5 million and 4 million last month. However, in the last week of August, daily transaction volume on Shibarium lost momentum, slipping from 1.3 million to 9,590 as of Aug. 28. This pattern has lingered for much of September, with the highest peak so far being on Sept. 5, when it posted 1.26 million transactions. The low user engagement has greatly affected the transaction count in recent days. In addition, the security breach over the weekend by malicious attackers on Shibarium has probably worsened issues. Although developer Kaal Dhairya reassured the community that the attack to steal millions of BONE tokens was successfully prevented, users’ confidence appears shaken. This has also impacted the price outlook for Shiba Inu, the ecosystem’s native token. Following reports of the malicious attack on Shibarium, SHIB dipped immediately into the red zone. Unlike on previous occasions where investors accumulated on the dip, market participants did not flock to Shiba Inu. Shiba Inu price struggles, can burn mechanism help? With the current near-zero crash in transaction volume for Shibarium, SHIB’s price cannot depend on it to support a rally. It might take a while to rebuild user confidence and for transactions to pick up again. In the meantime, Shiba Inu might have to rely on other means to boost prices from its low levels. This…
Share
BitcoinEthereumNews2025/09/18 07:57
👨🏿‍🚀TechCabal Daily – When banks go cashless

👨🏿‍🚀TechCabal Daily – When banks go cashless

In today's edition: South Africa's biggest banks are going cashless || Onafriq and PAPSS pilot Naira wallet transfers from Nigeria to Ghana || South Africa just
Share
Techcabal2026/02/04 14:02
Wormhole launches reserve tying protocol revenue to token

Wormhole launches reserve tying protocol revenue to token

The post Wormhole launches reserve tying protocol revenue to token appeared on BitcoinEthereumNews.com. Wormhole is changing how its W token works by creating a new reserve designed to hold value for the long term. Announced on Wednesday, the Wormhole Reserve will collect onchain and offchain revenues and other value generated across the protocol and its applications (including Portal) and accumulate them into W, locking the tokens within the reserve. The reserve is part of a broader update called W 2.0. Other changes include a 4% targeted base yield for tokenholders who stake and take part in governance. While staking rewards will vary, Wormhole said active users of ecosystem apps can earn boosted yields through features like Portal Earn. The team stressed that no new tokens are being minted; rewards come from existing supply and protocol revenues, keeping the cap fixed at 10 billion. Wormhole is also overhauling its token release schedule. Instead of releasing large amounts of W at once under the old “cliff” model, the network will shift to steady, bi-weekly unlocks starting October 3, 2025. The aim is to avoid sharp periods of selling pressure and create a more predictable environment for investors. Lockups for some groups, including validators and investors, will extend an additional six months, until October 2028. Core contributor tokens remain under longer contractual time locks. Wormhole launched in 2020 as a cross-chain bridge and now connects more than 40 blockchains. The W token powers governance and staking, with a capped supply of 10 billion. By redirecting fees and revenues into the new reserve, Wormhole is betting that its token can maintain value as demand for moving assets and data between chains grows. This is a developing story. This article was generated with the assistance of AI and reviewed by editor Jeffrey Albus before publication. Get the news in your inbox. Explore Blockworks newsletters: Source: https://blockworks.co/news/wormhole-launches-reserve
Share
BitcoinEthereumNews2025/09/18 01:55