- Gone Phishing
- Posts
- Gandlaf the guilty: Bitzlato founder pleads guilty to money-laundering
Gandlaf the guilty: Bitzlato founder pleads guilty to money-laundering

Welcome to Gone Phishing, your daily cybersecurity newsletter that thought Elon himself had been hacked when it saw the news that Alex Jones is back on Twitter (X). Let the Infowars begin πππ
Todayβs hottest cybersecurity news stories:
π± Gandlaf the guilty: Bitzlato founder pleads guilty to money-laundering πΈ
π» Mac-attack! New Trojan-Proxy malware spreads via pirated software π΄ββ οΈ
π§ More Bluetooth shenanigans: Android, Linux, macOS, and iOS at risk π¨βπ»
Heβs hoping for a plea deal but it might be too little, and a bitz too lato π
π¨ Breaking News: Bitzlato Founder Pleads Guilty in Miami π¨
π΅οΈββοΈ Russian founder Anatoly Legkodymov, known as Gandalf π§, has pleaded guilty to operating an unlicensed money-transmitting business. Arrested almost a year ago in Miami, he now faces a potential 5-year prison term.
πΈ Criminal Profits πΈ
Bitzlato, once a haven for fraudsters and ransomware crews like Conti, amassed a staggering $2.5 billion in cryptocurrency between 2019 and 2023. Shockingly, over half of this sum is traced back to illegal and risky sources.
π΅οΈββοΈ Lax Security Exposed π΅οΈββοΈ
Bitzlato's infamous lax Know Your Customer (KYC) procedures allowed users to register with minimal information, leading to suspicions that some utilised stolen identity documents.
π Darknet Partnership π
The Hydra darknet marketplace, infamous for narcotics, stolen financial information, and money laundering, emerged as Bitzlato's largest counterparty. The partnership facilitated transactions worth no less than $700 million in digital assets before Hydra's dismantling in April 2022.
βοΈ Legal Consequences βοΈ
Acting Assistant Attorney General Nicole M. Argentieri warns, "Transacting in cryptocurrency does not put you beyond the reach of the law."
π Criminal Turnstile π
U.S. Attorney Breon Peace emphasises Legkodymov's full awareness of Bitzlato's misuse, stating, "His guilty plea confirms it was an open turnstile for criminals."
Stay tuned for further updates on this landmark case! ππ


Clear. Concise. Unbiased. 1440's FREE newsletter.
Tired of news with a slant? Struggle to find the truth in a sea of sources? Get a daily dose of unbiased facts with 1440. Explore various topics like politics, business, and science. Be part of the 3 million informed Americans every morning.

Hackers: I'm blue da ba dee da ba daa πΆπ΅π¦·
π¨ Critical Bluetooth Flaw Threatens Android, iOS, Linux, and macOS Devices! π¨
A significant Bluetooth security flaw, identified as CVE-2023-45866, poses a serious risk to Android, Linux, macOS, and iOS devices. Discovered by security researcher Marc Newlin, the flaw allows threat actors to bypass authentication, connecting to vulnerable devices and injecting keystrokes to execute malicious code.
π How it Works π
Exploiting an "unauthenticated pairing mechanism," attackers trick devices into believing they are connected to a Bluetooth keyboard. This enables the injection of keystrokes, allowing the installation of apps and execution of arbitrary commands.
π» No Specialized Hardware Needed π»
Disturbingly, this attack doesn't require specialised hardware and can be executed from a Linux computer using a regular Bluetooth adapter.
π Widespread Impact π
Devices running Android (since version 4.2.2), iOS, Linux, and macOS are all susceptible. Even Apple's LockDown Mode, designed to safeguard against advanced threats, is not immune.
π‘οΈ Google's Warning π‘οΈ
Google warns that the flaw could result in remote escalation of privilege without additional execution privileges, emphasising the urgency of addressing this issue.
π Stay Informed π
Technical details of the flaw are expected to be released soon. Ensure device security by staying updated and cautious. ππ±

π£ Catch of the Day!! πππ¦
π The Motley Fool: βFool me once, shame on β shame on you. Fool me β you can't get fooled again.β Good olβ George Dubya π Let us tell whoβs not fooling around though; thatβs the CrΓΌe π at Motley Fool. Youβd be a fool (alright, enough already! π) not to check out their Share Tips from time to time so your savings can one day emerge from their cocoon as a beautiful butterfly! π Kidding aside, if you check out their website theyβve actually got a ton of great content with a wide variety of different investment ideas to suit most budgets π€ (LINK)
π΅ Wander: Find your happy place. Cue Happy Gilmore flashback ποΈβ³πποΈ Mmmm Happy Placeβ¦ π So, weβve noticed a lot of you guys are interested in travel. As are we! We stumbled upon this cool company that offers a range of breath-taking spots around the United States and, honestly, the website alone is worth a gander. When all you see about the Land of the free and the home of the brave is news of rioting, looting and school shootings, itβs easy to forget how beautiful some parts of it are. The awe-inspiring locations along with the innovative architecture of the hotels sets Wander apart from your run of the mill American getaway ποΈπ (LINK)
π Digital Ocean: If you build it they will come. Nope, weβre not talking about a baseball field for ghosts βΎπ»πΏ (Great movie, to be fair π). This is the Digital Ocean whoβve got a really cool platform for building and hosting pretty much anything you can think of. If you check out their website youβll find yourself catching the buzz even if you canβt code (guilty π). But if you can and youβre looking for somewhere to test things out or launch something new or simply enhance what youβve got, weβd recommend checking out their services foβ sho π And how can you not love their slogan: Dream it. Build it. Grow it. Right on, brother! πΏ (LINK)

Pirated software companies: YOU GET WHAT YOU F***ING DESERVE πππ
π¨ Alert: Trojan-Proxy Malware Targets macOS Users! π¨
π Unauthorised websites distributing trojanized versions of cracked software have been discovered, infecting Apple macOS users with a new Trojan-Proxy malware.
πΎ Modus Operandi πΎ
Attackers leverage this malware for financial gain, building proxy server networks or executing criminal acts on behalf of victimsβlaunching attacks, purchasing illicit goods like guns and drugs, and more.
π Cross-Platform Danger π
Kaspersky reveals evidence of cross-platform threats, with artefacts for Windows and Android linked to pirated tools.
π Deceptive Delivery π
macOS variants disguise themselves as legitimate multimedia, image editing, data recovery, and productivity tools, primarily targeting users seeking pirated software.
π½ Installation Trickery π½
Unlike authentic counterparts offered as .DMG files, rogue versions use .PKG installers. These include post-install scripts activating malicious behaviour, often inheriting administrator permissions.
π΅οΈββοΈ Stealthy Infiltration π΅οΈββοΈ
Trojan-Proxy conceals itself as the WindowServer process on macOS, a core system component responsible for window management and GUI rendering, making detection challenging.
π Covert Communication π
The malware encrypts DNS requests and responses using DNS-over-HTTPS (DoH) to connect to a command-and-control (C2) server, establishing communication for further instructions.
β οΈ Stay Protected β οΈ
Kaspersky discovered samples as early as April 28, 2023. To safeguard against such threats, users are strongly advised to avoid downloading software from untrusted sources.
π‘οΈ Protect Yourself, Be Informed! π¦ π

ποΈ Extra, Extra! Read all about it!
Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
The GeekAI: A daily 3 min newsletter on what matters in AI, with all the new AI things coming to market its good to stay ahead of the curve.
Libby Copa: The Rebel Newsletter helps writers strengthen their writing and creative practice, navigate the publishing world, and turn their art into an act of rebellion.
Techspresso: Receive a daily summary of the most important AI and Tech news, selected from 50+ media outlets (The Verge, Wired, Tech Crunch etc)
Let us know what you think!
So long and thanks for reading all the phish!
Give us a rating? |

