ノーマルビュー

Suspect Arrested for Allegedly Throwing Molotov Cocktail at Sam Altman's Home

著者: BeauHD
2026年4月11日 06:00

🤖 AI Summary

サム・アルトマン氏の自宅にモロトフ爆弾が投げられ、OpenAI本社近くで脅しも発生した事件について、サンフランシスコ警視庁は容疑者を逮捕しました(BeauHD)。詳細は以下の通りです:

1. 3時45分頃PTに、アルトマン氏の家付近で不明な人物がモロトフ爆弾を投げ込みましたが、燃え上がらなかったため無傷で済みました。軽微な損傷のみとされています。

2. OpenAI本社のあるミッションベイ地区に近づいた人物が脅しを発したと言われています。

3. 事件を受け、OpenAIの保安チームは従業員に対し、警備強化や不審者対応について注意を呼びかけました。また、木曜日に増加する警察と保安部隊の存在に注意を促しています。

4. 公式声明では、「迅速な警視庁の対応と地域社会からの支援に感謝します」と述べており、容疑者の逮捕と捜査協力が表明されています。
San Francisco police arrested a suspect after a Molotov cocktail was allegedly thrown at Sam Altman's home and threats were later made outside OpenAI's headquarters. "Thankfully, no one was hurt," said OpenAI in a statement to WIRED. "We deeply appreciate how quickly SFPD responded and the support from the city in helping keep our employees safe. The individual is in custody, and we're assisting law enforcement with their investigation." From the report: "At approximately 3:45am PT, an unidentified individual approached Sam's residence and threw an incendiary device toward the property. The device landed nearby and extinguished. There were no injuries and only minimal damage was reported," the message to staff reads. "Shortly afterward, an individual matching the suspect's description was contacted by security outside MB1," the message continues, referring to OpenAI's headquarters in San Francisco's Mission Bay neighborhood. "This person made threatening statements about the building." OpenAI's corporate security team told staff it is cooperating with law enforcement on an investigation, and that employees may notice an increased police and security presence around the office on Friday. The security team said that the company's offices remain open, but employees were advised to "not let anyone tailgate into the building."

Read more of this story at Slashdot.

Germany Doxes 'UNKN,' Head of RU Ransomware Gangs REvil, GandCrab

著者: BeauHD
2026年4月7日 03:00

🤖 AI Summary

ドイツの捜査当局が、ゲイダ CrabとREvilなど初のマルウェア集団を指揮した「UNKN」として知られる暗号化犯罪者の名前と顔を明らかにしました。その人物は31歳のロシア人デニイル・マキシモヴィッチ・シュクインと判明し、ドイツ連邦警察(BKA)は彼を「UNKNOWN」または「UNKN」と呼んでいます。

シュクインは2019年から2021年にかけて、独国内の少なくとも130件以上のコンピュータ攻撃や脅迫に関与し、約2百万ユーロを脅迫金として得たとされます。これらの攻撃は総額で3500万ユーロの経済的な被害を与えました。

BKAはシュクインがGandCrabとREvilという世界最大規模のマルウェア集団の頭脳を務めていたとしており、これらのグループは「ダブルエクストロージョン」という手法を初めて採用しました。これはハッキングされたシステムを開錠するための一時的な金銭要求と、データが公表されることへの別途支払いが含まれます。

シュクインのコインベースアカウントには31万7000ドル以上の不正得票が入っているとBKAは発表しています。彼は現在ロシアのクリナードに住んでいると推測されていますが、移動を禁止するわけではありません。
An anonymous reader quotes a report from KrebsOnSecurity: An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across the country between 2019 and 2021. Shchukin was named as UNKN (a.k.a. UNKNOWN) in an advisory published by the German Federal Criminal Police (the "Bundeskriminalamt" or BKA for short). The BKA said Shchukin and another Russian -- 43-year-old Anatoly Sergeevitsch Kravchuk -- extorted nearly $2 million euros across two dozen cyberattacks that caused more than 35 million euros in total economic damage. Germany's BKA said Shchukin acted as the head of one of the largest worldwide operating ransomware groups GandCrab and REvil, which pioneered the practice of double extortion -- charging victims once for a key needed to unlock hacked systems, and a separate payment in exchange for a promise not to publish stolen data. Shchukin's name appeared in a Feb. 2023 filing (PDF) from the U.S. Justice Department seeking the seizure of various cryptocurrency accounts associated with proceeds from the REvil ransomware gang's activities. The government said the digital wallet tied to Shchukin contained more than $317,000 in ill-gotten cryptocurrency. The BKA believes Shchukin resides in Krasnodar, Russia, where he is from. "Based on the investigations so far, it is assumed that the wanted person is abroad, presumably in Russia," the BKA advised. "Travel behavior cannot be ruled out."

Read more of this story at Slashdot.

Crooks Behind $27M in 'Refund' Scams Busted By YouTube Pranksters After Being Lured to Fake Funeral

著者: EditorDavid
2026年4月6日 03:34

🤖 AI Summary

記事の概要:

2021年から2023年にかけて、金額が27兆ドルを超える詐欺事件が2,000人の高齢者を対象に行われました。これらの詐欺はテクノロジーサポートや銀行偽装、返金スカムを使いました。42歳の中国出身のジアンドング・チェン被告は、仮想通貨を使った詐欺と洗浄罪で有罪を認めたとの報告です。

YouTubeチャンネル「Trilogy Media」の詐欺師たちは、彼らに1,79万フォロワーがあることを知り、連邦裁判所で行われた虚偽の葬儀に誘拐されました。この動画では、僧侶役の男が詐欺師を手を取りながら祈祷を行いました。その後、詐欺師は「死んだ人」から現金を受け取るよう強制されました。

この事件はYouTubeチャンネルによって録画され、「CONFRONTING SCAMMERS WITH A FAKE FUNERAL (EPIC REACTIONS)」というタイトルで公表されました。動画は2年以上経っても130万回以上視聴され、2万2千件以上のいいねや2,979のコメントが寄せられています。

チェン被告は最多60年間の懲役を含む重刑を受ける見込みです。
One crime ring scammed 2,000 elderly people of more than $27 million between 2021 and 2023 using tech support/bank impersonation/refund scams. "Victims were in their 70s and 80s," reports the U.S. Attorney's office for California's southern district. Victims were first told they'd received a refund (either online or via phone), but then told they'd been "over-refunded" a massive amount, and asked to return that amount. But 42-year-old Jiandong Chen just admitted Thursday in a U.S. federal court that he was involved in the fraud and money laundering via cryptocurrency — pleading guilty to two charges with maximum penalties of 40 years in prison and a $1 million fine, plus 20 years in prison with a maximum fine of $500,000 or twice the amount laundered. "Chen, a Chinese national, is the second defendant charged in a five-defendant indictment." And what tripped him up seems to be that "Certain members of the conspiracy also did in-person pickups of money directly from victims..." And so YouTube enters the story — when the scammers called pranksters with 1,790,000 subscribers to their "Trilogy Media" channel. In an elaborate three-hour video, the team of pranksters lured the scammer to a rented Airbnb where they're staging a fake funeral with a nun. (One of the men acting in the video remembers "we start doing a prayer... I'm holding the scammer's hand in my nun outfit...") They convince the scammer to collect the cash from a dead man — "Is there anything you'd like to say to him?" Then there's demon voices. The scammer's victim resurrects from the dead. Did the cash mule bring holy water? The end result was a video titled "CONFRONTING SCAMMERS WITH A FAKE FUNERAL (EPIC REACTIONS)". But two and a half years later, their "cash mule sting house" video has racked up over 1.3 million views, 22,000 likes, and 2,979 comments. ("This video is longer than Oppenheimer. Thanks for the laughs fellas.") And the scammer is facing 60 years in prison.

Read more of this story at Slashdot.

DOJ Charges Super Micro Co-Founder For Smuggling $2.5 Billion In Nvidia GPUs To China

著者: BeauHD
2026年3月21日 03:00

🤖 AI Summary

Super Micro Computerの共同創業者であるLiaw(ウォーリー)、Chang(スティーブン)およびSun(ウィリー)は、米国の輸出規制法を違反し、25億ドル相当のNvidia GPUサーバーを中国に密輸した罪で起訴されました。彼らは虚偽の文書を使用してアジアの中継会社を通じて注文を隠し、実際のサーバーが中国に向かっている間に動作しないサーバーのダミーコピーを使用して Auditoriumに欺きました。Super Microは調査に対応していますが、株価は約30%下落しました。会社側は「この行為は当社の政策と準拠制御を違反するものであり、すべて適用される米国の輸出入規制法律および条例への完全な準拠に取り組むことを確実にするための堅固なコンプライアンスプログラムを持っている」と声明しました。
Longtime Slashdot reader AmiMoJo shares a report from CNN: The co-founder of Super Micro Computer and two others were charged with diverting $2.5 billion worth of servers with Nvidia's artificial intelligence chips to China, in violation of U.S. laws barring exports to that country without a license. Yih-Shyan Liaw, known as Wally; Ruei-Tsang Chang, known as Steven; and Ting-Wei Sun, known as Willy, were charged with conspiring to violate export control laws, smuggling goods from the U.S. and conspiring to defraud the U.S. Liaw, who co-founded Super Micro Computer and served on its board of directors, was arrested Thursday in California and released on bail. Sun, a contractor, is held awaiting a detention hearing. Chang, who worked in the Taiwan office of Super Micro, remains at large. [...] According to the indictment, the men used a pass-through company based in Southeast Asia to place orders to obscure that the servers would end up in China. The men worked with executives at the pass-through company to provide false documents to the server manufacturer to further the deception, the indictment said. They used a shipping and logistic company to repackage the servers into unmarked boxes to conceal their contents before they were shipped to China. To deceive the manufacturer's auditors, who checked the pass-through company for compliance with export laws, the men allegedly used "dummy" nonworking copies of the servers when the actual servers were on their way to China. Two of the defendants allegedly worked to stage the dummy servers at a warehouse rented by the pass-through company, according to the indictment. Sun took photos and videos of the staged servers to one of the compliance auditors who instead of conducting the audit was "off-site enjoying entertainment paid for" by the pass-through company, according to the indictment. In another instance, prosecutors said surveillance cameras documented individuals using hair dryers to remove labels and add labels and serial number stickers to the boxes and dummy servers. Super Micro said it's fully cooperating with the investigation, but that hasn't prevented its stock from plunging. It's down nearly 30% following the news. The company issued the following statement: "The conduct by these individuals alleged in the indictment is a contravention of the Company's policies and compliance controls, including efforts to circumvent applicable export control laws and regulations. Supermicro maintains a robust compliance program and is committed to full adherence to all applicable U.S. export and re-export control laws and regulations."

Read more of this story at Slashdot.

❌