Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Canada Police Dismantles TradeOgre Platform That Stolen 56 Million Dollars in Cryptocurrency

Canada Police Dismantles TradeOgre Platform That Stolen 56 Million Dollars in Cryptocurrency

Posted on September 22, 2025September 22, 2025 By CWS

Canada’s legislation enforcement group has achieved a landmark victory within the battle towards illicit finance with the dismantling of TradeOgre, a Tor-based cryptocurrency change that facilitated the theft and laundering of over 56 million {dollars} in digital belongings.

Rising in early 2023, TradeOgre operated completely as a hidden service, leveraging the anonymity of the Tor community to keep away from regulatory oversight and conceal the origin of illicit funds.

By eschewing Know Your Buyer (KYC) protocols, the platform enabled customers to commerce Bitcoin, Monero, Ethereum and a wide range of altcoins fully untraceably.

Initially marketed to privacy-minded merchants as a decentralized market, TradeOgre shortly grew to become the go-to venue for cybercriminals looking for to maneuver ransomware funds, darknet proceeds and stolen funds. Transactions had been executed by way of a customized API interface, accessible solely by way of a .onion deal with.

Royal Canadian Mounted Police recognized anomalous visitors patterns and cluster-analysis indicators pointing to the platform’s involvement in high-value thefts, culminating in a 56-million-dollar seizure on September 18, 2025.

Behind the façade of privateness, TradeOgre’s backend relied on a collection of open-source elements patched with proprietary scripts to automate order matching and deposit processing.

Though the code was by no means publicly launched, investigators recovered fragments of shell and Python scripts used to orchestrate pockets hot-storage and mixing companies, together with configuration recordsdata illustrating multi-hop proxy chaining.

Evading Detection Via Tor and Proxy Chaining

In its persistence ways, TradeOgre employed a layered obfuscation technique. The platform ran on a VM cluster inside bullet-proof internet hosting, every node speaking over Tor circuits and randomized VPN endpoints.

Investigators recovered a fraction of a proxy setup script that demonstrates how TradeOgre maintained its hidden service:

# Proxy chaining for TradeOgre hidden service
sudo apt-get set up tor privoxy
cat /and many others/privoxy/config
listen-address 127.0.0.1:8118
forward-socks5t / 127.0.0.1:9050 .
EOF
systemctl restart privoxy
# Entry API by way of Tor proxy
curl –socks5-hostname 127.0.0.1:9050

This multi-layered strategy hindered attribution and sophisticated typical threat-intelligence monitoring, underscoring the problem of combating darknet-enabled monetary crime.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:Canada, Cryptocurrency, Dismantles, Dollars, Million, Platform, Police, Stolen, TradeOgre

Post navigation

Previous Post: HoundBytes Launches Automated Security Analyst
Next Post: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More

Related Posts

VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection Cyber Security News
Phishing Tactics Exploit Safe Links with Complex URL Rewrites Phishing Tactics Exploit Safe Links with Complex URL Rewrites Cyber Security News
North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams Cyber Security News
OpenClaw AI Platform Exploited to Spread Malware OpenClaw AI Platform Exploited to Spread Malware Cyber Security News
Node.js 25.5.0 Released Update Root Certificates and New Command-Line Flags Node.js 25.5.0 Released Update Root Certificates and New Command-Line Flags Cyber Security News
Astaroth Banking Malware Leveraging GitHub to Host Malware Configurations Astaroth Banking Malware Leveraging GitHub to Host Malware Configurations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark