The post US Strike Force Seizes Crypto Domain Funding Burmese Rebels appeared on BitcoinEthereumNews.com. The Justice Department announced the seizure of a web domain used by Burmese scammers. The DoJ created the Scam Center Strike Force to deal with organized crime that targets Americans. Any victim of an organized crypto investment fraud scam has been requested to file a complaint with the FBI. The Justice Department has taken down a web domain used to defraud crypto investors. On Tuesday, the Justice Department announced the takeover of tickmilleas, and has obtained its control together with the Federal Bureau of Investigation (FBI).  As such, the FBI together with the DoJ has requested any victim of the scam to file an official complaint. Source: tickmilleas Related: Chen Zhi’s Rise and Fall: How a Fujian-Born Tycoon Became the Center of a $15 Billion Global Fraud Case U.S. Agencies Bring Down a Crypto Crime Syndicate  The Justice Department noted that the tickmilleas web domain was used by a highly organized Southeast Asia criminal group located at the Tai Chang scam compound, dubbed Casino Kosai, in Kyuakhat village in Burma. The U.S. law enforcement agencies noted that the Tai Chang scam is affiliated with the Burmese Group dubbed the Democratic Karen Benevolent Army (DKBA). Additionally, the operators of the tickmilleas website were associated with the Trans Asia International Holding Group Thailand Company Limited. On November 12, the Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned the DKBA alongside its top leaders for defrauding billions of dollars from American investors. The take down of the tickmilleas website was a major success for the recently created District of Columbia U.S. Attorney’s Office’s Scam Center Strike Force. The Scam Center Strike Force also took down two additional web domains used by the Tai Chang scam compound in regards to the crypto scams. Furthermore, the FBI involved tech giants Google and… The post US Strike Force Seizes Crypto Domain Funding Burmese Rebels appeared on BitcoinEthereumNews.com. The Justice Department announced the seizure of a web domain used by Burmese scammers. The DoJ created the Scam Center Strike Force to deal with organized crime that targets Americans. Any victim of an organized crypto investment fraud scam has been requested to file a complaint with the FBI. The Justice Department has taken down a web domain used to defraud crypto investors. On Tuesday, the Justice Department announced the takeover of tickmilleas, and has obtained its control together with the Federal Bureau of Investigation (FBI).  As such, the FBI together with the DoJ has requested any victim of the scam to file an official complaint. Source: tickmilleas Related: Chen Zhi’s Rise and Fall: How a Fujian-Born Tycoon Became the Center of a $15 Billion Global Fraud Case U.S. Agencies Bring Down a Crypto Crime Syndicate  The Justice Department noted that the tickmilleas web domain was used by a highly organized Southeast Asia criminal group located at the Tai Chang scam compound, dubbed Casino Kosai, in Kyuakhat village in Burma. The U.S. law enforcement agencies noted that the Tai Chang scam is affiliated with the Burmese Group dubbed the Democratic Karen Benevolent Army (DKBA). Additionally, the operators of the tickmilleas website were associated with the Trans Asia International Holding Group Thailand Company Limited. On November 12, the Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned the DKBA alongside its top leaders for defrauding billions of dollars from American investors. The take down of the tickmilleas website was a major success for the recently created District of Columbia U.S. Attorney’s Office’s Scam Center Strike Force. The Scam Center Strike Force also took down two additional web domains used by the Tai Chang scam compound in regards to the crypto scams. Furthermore, the FBI involved tech giants Google and…

US Strike Force Seizes Crypto Domain Funding Burmese Rebels

2025/12/04 05:45
  • The Justice Department announced the seizure of a web domain used by Burmese scammers.
  • The DoJ created the Scam Center Strike Force to deal with organized crime that targets Americans.
  • Any victim of an organized crypto investment fraud scam has been requested to file a complaint with the FBI.

The Justice Department has taken down a web domain used to defraud crypto investors. On Tuesday, the Justice Department announced the takeover of tickmilleas, and has obtained its control together with the Federal Bureau of Investigation (FBI). 

As such, the FBI together with the DoJ has requested any victim of the scam to file an official complaint.

Source: tickmilleas

Related: Chen Zhi’s Rise and Fall: How a Fujian-Born Tycoon Became the Center of a $15 Billion Global Fraud Case

U.S. Agencies Bring Down a Crypto Crime Syndicate 

The Justice Department noted that the tickmilleas web domain was used by a highly organized Southeast Asia criminal group located at the Tai Chang scam compound, dubbed Casino Kosai, in Kyuakhat village in Burma.

The U.S. law enforcement agencies noted that the Tai Chang scam is affiliated with the Burmese Group dubbed the Democratic Karen Benevolent Army (DKBA). Additionally, the operators of the tickmilleas website were associated with the Trans Asia International Holding Group Thailand Company Limited.

On November 12, the Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned the DKBA alongside its top leaders for defrauding billions of dollars from American investors. The take down of the tickmilleas website was a major success for the recently created District of Columbia U.S. Attorney’s Office’s Scam Center Strike Force.

The Scam Center Strike Force also took down two additional web domains used by the Tai Chang scam compound in regards to the crypto scams. Furthermore, the FBI involved tech giants Google and Apple to remove the affiliated mobile applications from Google Play and the App Store respectively.

Meta also acted on the information by removing more than 2k associated social media accounts from its family of applications.

Crypto Caught Between Political Civil Wars

According to the Department of the Treasury, organized crime in Southeast Asia has heavily relied on crypto assets to facilitate criminal activity. The DoJ noted that the criminal lured investors to make crypto deposits in the platforms with the promise of higher returns.

As such, the proceeds were used to fuel Burma’s civil war, which worsened after 2021. The lack of a strong central government in the country has played a crucial role in the rise of a fragmented constellation of armed actors using crypto assets to fund the civil war.

However, the changing crypto regulatory landscape in major jurisdictions has pushed web3 developers to build highly compliant products. Even though privacy has been advocated through Zero-Knowledge (ZK) proofs, it is prudent to remember that complex onchain analysis, such as by Chainalysis, can doxx most crypto users.

Related: Interpol Declares Global Emergency Over Transnational Crypto Scam Networks

Disclaimer: The information presented in this article is for informational and educational purposes only. The article does not constitute financial advice or advice of any kind. Coin Edition is not responsible for any losses incurred as a result of the utilization of content, products, or services mentioned. Readers are advised to exercise caution before taking any action related to the company.

Source: https://coinedition.com/us-justice-department-seizes-domain-linked-to-burmese-pig-butchering-ring/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Maryland Man Sentenced for Allegedly Aiding North Korea’s US Company Infiltration and Sensitive Data Access

Maryland Man Sentenced for Allegedly Aiding North Korea’s US Company Infiltration and Sensitive Data Access

The post Maryland Man Sentenced for Allegedly Aiding North Korea’s US Company Infiltration and Sensitive Data Access appeared on BitcoinEthereumNews.com. North Korea’s IT workers infiltrated US companies through a Maryland man’s scheme, earning over $970,000 while enabling access to sensitive government systems. This operation supported the regime’s cyber activities, including crypto hacks that stole $2 billion in 2025, funding nuclear programs. Minh Phuong Ngoc Vong sentenced to 15 months in prison for aiding North Korean infiltration. He used fake credentials to secure jobs at 13 US firms, passing work to overseas conspirators. North Korea stole $2 billion in crypto in 2025 via hacks, totaling over $6 billion recently, per blockchain analytics firm Elliptic. Discover how North Korea’s IT infiltration and crypto hacking schemes threaten US security. Learn the details of the Maryland case and regime’s $6B theft. Stay informed on cybersecurity risks today. What is North Korea’s IT Infiltration Scheme in US Companies? North Korea’s IT infiltration scheme involves covertly placing regime-affiliated workers into US companies using fake identities to generate revenue and access sensitive systems. In a recent Maryland case, Minh Phuong Ngoc Vong was sentenced to 15 months in prison and three years of supervised release for facilitating this for three years across 13 companies. The operation netted over $970,000, much of which funded North Korea’s weapons programs through software work performed by overseas actors, including those in China near the border. How Does North Korea Use Crypto Hacking to Fund Its Programs? North Korea employs sophisticated cyber groups to target cryptocurrency exchanges and wallets, stealing digital assets that convert to fiat for regime funding. According to blockchain analytics firm Elliptic, these groups pilfered approximately $2 billion in cryptocurrencies in 2025 alone, contributing to a total exceeding $6 billion in recent years from hacks on platforms like Bybit and Upbit. This influx directly supports nuclear and missile development, as confirmed by US intelligence assessments. Experts note the regime’s…
Share
BitcoinEthereumNews2025/12/06 09:12