Connect with us

Crypto

NJ man hired hitman for $20K in Bitcoin to kill a 14-year-old

Published

on

NJ man hired hitman for K in Bitcoin to kill a 14-year-old

A New Jersey man who admitted to paying a hitman $20,000 in cryptocurrency to have a 14-year-old youngster murdered could withstand 10 years behind bars.

John Michael Musbach, 31, pleaded responsible to an indictment charging him with one rely of “knowingly and deliberately utilizing and inflicting one other to make use of a facility of interstate and international commerce, that’s the web, with the intent {that a} homicide be dedicated,” the Division of Justice stated Thursday.

The Haddonfield man is accused of exchanging sexually specific pictures and movies with the then-13-year-old sufferer throughout the summer season of 2015. The sufferer lived in New York on the time.

After the sufferer’s dad and mom realized of the “inappropriate contact,” they notified legislation enforcement, who recognized Musbach within the case.

In March 2016, Musbach was arrested on youngster pornography fees, the DOJ stated.

Advertisement

Prosecutors allege that Musbach determined to have the sufferer killed in order that the sufferer couldn’t testify towards him within the pending legal case.

Musbach repeatedly contacted the administrator of a murder-for-hire web site on the darkish internet, which purported to supply contact killings or different acts of violence in alternate for cryptocurrency, from Might 7, 2016, to Might 20, 2016.

“Musbach requested if a 14-year-old was too younger to focus on, and upon listening to that the age was not an issue, paid roughly 40 bitcoin (roughly $20,000 on the time) for the hit,” prosecutors stated.

He paid about $20,000 value of bitcoin whereas making an attempt to rent a hitman to kill the 14-year-old sufferer.
Getty Pictures

Following his cost, Musbach repeatedly messaged the web site’s administrator to inquire about when the homicide would happen. The administrator then requested a further $5,000, which prompted Musbach to try to cancel the hit and get his $20,000 returned.

The web site’s administrator then revealed to Musbach that the operation was a sham, and threatened to show Musbach over to legislation enforcement.

Advertisement

Musbach faces a most potential penalty of 10 years in jail and a high quality “of the larger of $250,000, twice the gross earnings to Musbach or twice the gross losses to the sufferer of his offense.”

He’s scheduled to be sentenced on June 13.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Crypto

Bitget Launchpool to List DeLorean (DMC), Offering 66 Million Tokens in Rewards – Branded Spotlight Bitcoin News

Published

on

Bitget Launchpool to List DeLorean (DMC), Offering 66 Million Tokens in Rewards – Branded Spotlight Bitcoin News
Bitget, the leading cryptocurrency exchange and Web3 company, has announced the upcoming listing of DeLorean (DMC) on its Launchpool platform, with a total reward pool of 66,176,000 DMC tokens. Participants will have the opportunity to lock BGB or DMC tokens to earn a share of the reward allocation. The locking period will begin on June 24, 2025, at 11:00 UTC and conclude on June 26, 2025, at 11:00 UTC.
Continue Reading

Crypto

CoinMarketCap briefly hacked to drain crypto wallets via fake Web3 popup

Published

on

CoinMarketCap briefly hacked to drain crypto wallets via fake Web3 popup

CoinMarketCap, the popular cryptocurrency price tracking site, suffered a website supply chain attack that exposed site visitors to a wallet drainer campaign to steal visitors’ crypto.

On Friday evening, January 20, CoinMarketCap visitors began seeing Web3 popups asking them to connect their wallets to the site. However, when visitors connected their wallets, a malicious script drained cryptocurrency from them.

The company later confirmed threat actors utilized a vulnerability in the site’s homepage “doodle” image to inject malicious JavaScript into the site.

“On June 20, 2025, our security team identified a vulnerability related to a doodle image displayed on our homepage. This doodle image contained a link that triggered malicious code through an API call, resulting in an unexpected popup for some users when visited our homepage,” reads a statement posted on X.

“Upon discovery, We acted immediately to remove the problematic content, identified the root cause, and comprehensive measures have been implemented to isolate and mitigate the issue.”

Advertisement

“We can confirm all systems are now fully operational, and CoinMarketCap is safe and secure for all users.”

Cybersecurity firm c/side explained that the attack worked by the threat actors somehow modifying the API used by the site to retrieve a doodle image to display on the homepage. This tampered JSON payload now included a malicious script tag that injected a wallet drainer script into CoinMarketCap from an external site named “static.cdnkit[.]io”.

When someone visited the page, the script would execute and display a fake wallet connect popup showing CoinMarketCap branding and mimicking a legitimate Web3 transaction request. However, this script was actually a wallet drainer designed to steal connected wallets’ assets.

“This was a supply chain attack, meaning the breach didn’ target CMC’s own servers but a third-party tool or resource used by CMC,” explains c/side.

“Such attacks are hard to detect because they exploit trusted elements of a platform.”

Advertisement

More details about the attack came later from a threat actor known as Rey, who said that the attackers behind the CoinMarketCap supply chain attack shared a screenshot of the drainer panel on a Telegram channel.

This panel indicated that $43,266 was stolen from 110 victims as part of this supply chain attack, with the threat actors speaking in French on the Telegram channel.

Screenshot of drainer panel shared on Telegram
Screenshot of drainer panel shared on Telegram
Source: Rey

As the popularity of cryptocurrency has boomed, so has the threat from wallet drainers, which are commonly used in attacks.

Unlike traditional phishing, these types of attacks are more often promoted through social media posts, advertisements, spoofed sites, and malicious browser extensions that include malicious wallet-draining scripts.

Reports indicate that wallet drainers stole almost $500 million in 2024 through attacks targeting more than 300,000 wallet addresses.

The problem has become so pervasive that Mozilla recently introduced a new system to detect wallet drainers in browser add-ons uploaded to the Firefox Add-on repository.

Advertisement

Tines Needle

Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore.

In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work — no complex scripts required.

Continue Reading

Crypto

Meta Earth Network 2.0: Pioneering Web3 Innovation With Rewards and Global Events – Press release Bitcoin News

Published

on

Meta Earth Network 2.0: Pioneering Web3 Innovation With Rewards and Global Events – Press release Bitcoin News
In the rapidly evolving Web3 landscape, Meta Earth is carving a bold path with ME Network 2.0, a modular blockchain ecosystem designed to redefine decentralized economies. Launched on May 19, 2025, at block height 6,624,500, this upgrade marks the Odyssey phase, a pivotal moment of technical breakthroughs and community-driven growth. With a robust suite of technical advancements, generous Airdrop rewards, enhanced ME Pass 3.0 features, and a lineup of high-profile 2025 events, Meta Earth is inviting users worldwide to join its transformative journey. Here’s why ME Network 2.0 marks a pivotal shift—and what it means for those looking to participate.
Continue Reading

Trending