• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
doj seizes $61 million in tether linked to pig butchering

DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams

You are here: Home / General Cyber Security News / DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams
February 27, 2026

The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus cryptocurrency schemes known as pig butchering.

The confiscated funds were traced to cryptocurrency addresses used for the laundering of criminally derived proceeds stolen from victims of cryptocurrency investment scams, the department added.

“Criminal actors and professional money launderers use cyber-enabled fraud schemes to swindle their victims and conceal their ill-gotten gains,” said HSI Charlotte Acting Special Agent in Charge Kyle D. Burns.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“HSI special agents work diligently to trace the illicit proceeds of crime across the globe to disrupt and dismantle the transnational criminal organizations that seek to defraud hardworking Americans.”

As is the norm in such cybercrime operations, threat actors are known to target individuals by cultivating romantic relationships after approaching them on dating and social media messaging apps. These activities are carried out by individuals who are trafficked into scam compounds operating primarily in Southeast Asia with promises of high-paying jobs.

Cybersecurity

The cybercrime syndicates behind the scams then confiscate their passports and are coerced into conning victims online by posing as charming strangers or brokers on investment platforms, or face brutal consequences. The end goal is to coax unsuspecting users into parting with their hard-earned money in fraudulent cryptocurrency investment schemes.

According to the DoJ, the fake platforms displayed made-up investment portfolios displaying unusually high returns in a deliberate attempt to make victims invest more of their funds. The reality hits when users try to withdraw their funds, at which point they are asked to pay an extra fee as a way to extract even more money from them.

“Once the victims’ money transferred to a cryptocurrency wallet under the scammers’ control, the crooks quickly routed that money through many other wallets to hide the nature, source, control, and ownership of that stolen money,” the department added.

In a coordinated announcement, Tether said it has frozen around $4.2 billion in assets linked to illicit activity to date, including nearly $250 million related to scam networks since June 2025 alone.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «900+ sangoma freepbx instances compromised in ongoing web shell attacks 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams
  • 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
  • Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor Feb 27, 2026 Malware / Linux Security Cybersecurity researchers have disclosed details of a malicious Go module that's designed to harvest passwords, create persistent access via SSH, and deliver a Linux backdoor named Rekoobe. The Go module, github[.]com/xinfeisoft/crypto, impersonates the legitimate "golang.org/x/crypto" codebase, but injects malicious code that's responsible for exfiltrating secrets entered via terminal password prompts to a remote endpoint, fetches a shell script in response, and executes it. "This activity fits namespace confusion and impersonation of the legitimate golang.org/x/crypto subrepository (and its GitHub mirror github.com/golang/crypto)," Socket security researcher Kirill Boychenko said . "The legitimate project identifies go.googlesource.com/crypto as canonical and treats GitHub as a mirror, a distinction the threat actor abuses to make github.com/xinfeisoft/crypto look routine in dependency graphs." Specifically, the backdoor has been placed with…
  • ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
  • Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
  • Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams
  • Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown
  • UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor
  • ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories
  • Expert Recommends: Prepare for PQC Right Now

Copyright © TheCyberSecurity.News, All Rights Reserved.