Connect with us
DAPA Banner

Crypto World

Senate Democrats urge DOJ, Treasury probe into Binance sanctions compliance

Published

on

Crypto Breaking News

Key insights

  • Lawmakers request a DOJ and Treasury review of Binance’s sanctions and AML controls.
  • Reports allege $1.7B in crypto flowed to Iran-linked entities via the exchange.
  • Senators cite concerns over post-settlement compliance and political ties.

Senate Democrats have asked the U.S. DOJ and Treasury to examine whether Binance has violated U.S. sanctions and the terms of its 2023 settlement with federal authorities. The request raises fresh scrutiny of the exchange’s controls against illicit finance.

The letter came from eleven Democrats on the U.S. Senate Banking, Housing, and Urban Affairs Committee. It urged a comprehensive review of Binance’s compliance systems after media reports linked the platform to transactions involving Iranian entities.

Allegations of Iran-linked transactions

The senators stated that internal compliance findings at Binance suggested about $1.7 billion in digital assets moved through the exchange to Iranian actors. The letter referenced groups tied to terrorism and Iran’s security apparatus. Lawmakers said a vendor connected to Binance allegedly handled a large share of the transfers.

The letter, led by Mark Warner and signed by Ranking Member Elizabeth Warren, also claimed that Iranian users accessed more than 1,500 accounts. It further warned that Russian-linked actors may have used the platform to evade sanctions.

Advertisement

Senators expressed concern that Binance dismissed staff who flagged suspicious activity. They also referred to reports that the exchange lowered the collaboration with the law enforcement. They argued that such actions would be against its federal agreement.

Compliance obligations and prior settlement

In 2023, Binance pleaded guilty to charges tied to sanctions violations and anti-money laundering failures. The exchange agreed to pay more than $4 billion and accepted U.S. oversight. The settlement required stronger know-your-customer checks and sanctions screening.

Under its agreement with the Treasury’s Office of Foreign Assets Control, Binance committed to blocking prohibited transactions. Senators claimed that the reported flows to Iran would undermine those commitments. They asked regulators to confirm whether Binance maintains effective controls.

Political ties and broader risks

The letter also noted Binance’s recent business links involving Donald Trump and his family’s crypto ventures. Lawmakers cited promotion of a Trump-backed stablecoin issued by World Liberty Financial, a major investment tied to the project.

Advertisement

They also referenced Trump’s pardon of Binance founder Changpeng Zhao, who had pleaded guilty upon failing to implement an effective anti-money laundering program and served a four-month prison sentence.

Beyond Iran, senators pointed to Binance’s expansion in parts of the former Soviet Union and partnerships that could expose the platform to sanctions risks involving Russia. They requested responses from federal officials by March 13.

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Friday’s eth.limo Hijack Caused by Social Engineering on EasyDNS

Published

on

Friday’s eth.limo Hijack Caused by Social Engineering on EasyDNS

Ethereum Name Service gateway eth.limo has revealed that the domain hijacking on Friday was caused by a social engineering attack directed against EasyDNS, its domain name service provider. 

According to a postmortem published by eth.limo on Saturday, an attacker impersonated one of its team members to initiate an account recovery process with easyDNS, granting access to the eth.limo account and allowing them to alter domain settings.

“The NS records were changed and directed to Cloudflare… Once we understood that a DNS hijack had taken place, we immediately notified the community as well as Vitalik Buterin and others. We then began contacting EasyDNS in an attempt to respond to the incident,” the company said.

Eth.limo serves as a Web2 bridge, providing access to around 2 million decentralized websites using the .eth domain name. Hijacking the service could allow an attacker to redirect users to malicious websites. Ethereum co-founder Vitalik Buterin warned users Friday to avoid his blog until the incident was resolved.

Advertisement

Mark Jeftovic, CEO of easyDNS, has publicly accepted responsibility for the incident in its own postmortem report. 

“We screwed up and we own it,” said Jeftovic on Saturday. 

“This would mark the first successful social engineering attack against an easyDNS client in our 28-year history. There have been countless attempts.”  

Both companies have pointed to the Domain Name System Security Extension (DNSSEC) in thwarting the hacker’s attempts to do further damage. 

The attacker couldn’t produce valid cryptographic signatures, so Domain Name System resolvers rejected the attacker’s forged DNS responses, causing users to see error messages instead of being redirected to malicious sites. 

Advertisement

“DNSSEC was enabled for their domain when the attackers attempted to flip their nameservers, presumably to effect some manner of phishing or malware injection attack, DNSSEC-aware resolvers, which most are these days, began dropping queries,” Jeftovic said. 

Source: eth.limo

In its postmortem, eth.limo noted that because the attacker lacked the signing keys, they were unable to bypass the safeguards, which likely “reduced the blast radius of the hijack. We are not aware of any user impact at this time. We will provide updates if that changes.”

easyDNS makes changes since the attack

Jeftovic described the social engineering attack as “highly sophisticated,” and said easyDNS is still conducting a post-mortem on how the breach occurred, and has already begun rolling out changes to prevent a recurrence.

Source: easyDNS

“In eth.limo’s case, we will be migrating them to Domainsure, which has a security posture more suited toward enterprise and high-value fintech domains, TLDR there is no mechanism for an account recovery on Domainsure, it’s not a thing,” he added.

“On behalf of everyone here, I apologize to the eth.limo team and the wider Ethereum community. ENS has always had a special place in our heart as the first registrar to enable ENS linking to web2 domains and we’ve been involved in the space since 2017.”

Related: RaveDAO denies manipulation as Binance, Bitget probe RAVE trading activity

Advertisement

The eth.limo incident is the latest in a series of domain hijackings targeting crypto projects. Days earlier, decentralized exchange aggregator CoW Swap lost control of its website after an unknown party hijacked its domain. 

Steakhouse Financial, a DeFi advisory and research firm, similarly disclosed at the end of March that it had lost control of its domain to an attacker.

Magazine: Will the CLARITY Act be good — or bad — for DeFi?