Lurking in 600 Fraud Groups, He Aims to Intercept the Money of the Black Market

marsbitОпубликовано 2026-01-06Обновлено 2026-01-06

Введение

Amid the rapid growth of stablecoins, which reached a $300 billion market cap in 2025, Professor Zhou Yajin, founder of blockchain security firm BlockSec, is combating crypto-enabled crime like Southeast Asian telecom scams. With a background in mobile security and academia, Zhou shifted BlockSec from smart contract auditing to real-time attack interception and anti-money laundering (AML) solutions. His team infiltrated over 600 Telegram groups used by criminal networks, uncovering sophisticated human trafficking operations where victims are lured into scam compounds. These groups use "labor guarantee platforms" similar to e-commerce systems, with transactions settled in USDT on the Tron blockchain due to its low fees and ease of use. Through automated monitoring, BlockSec tracked $12 million in illegal transactions linked to a single platform, finding that 34.9% of funds flowed to OKX hot wallets. BlockSec also developed a mempool surveillance system to intercept hacks within Ethereum’s 12-second block time window, using higher gas fees to front-run and block malicious transactions—successfully rescuing 2,909 ETH in one instance. Zhou emphasizes that security must become seamless and invisible as crypto evolves from a "wild west" to a regulated financial frontier.

In the history of commerce, wherever wealth surges and accumulates, there is a tug-of-war between law and order.

Looking back from the end of 2025, the issuance scale of global stablecoins has firmly surpassed the $300 billion mark, nearly tripling from last year, with monthly trading volume reaching an astonishing 4 to 5 trillion dollars. Stablecoins, as a type of crypto asset, have shed the label of "geek toys" and have become the primary gateway for traditional finance to enter the digital world.

However, beneath the prosperity lies a shadow. According to the latest industry report, the scale of funds received by illegal addresses globally in 2025 is projected to exceed $51.3 billion. When hundreds of billions of dollars can cross borders in seconds, traditional regulatory methods often can't keep up with this flow speed, making it difficult to distinguish between legitimate business and criminal proceeds in real-time.

In this world where rules are not yet fully formed, Professor Zhou Yajin is a special entrepreneur.

Zhou Yajin's career path is a typical example of an elite scholar deeply colliding with industry. In 2010, he went to the United States to pursue his Ph.D., delving into the field of mobile security for five years. Later, he and his advisor, Professor Jiang Xuxian, joined Qihoo 360, completing the first step from the laboratory to the industry front line. In 2018, he chose to return to Zhejiang University to take up a teaching post. Three years later, he plunged back into the industry wave, founding the blockchain security company BlockSec.

Over the past four years, Zhou Yajin has led BlockSec through a shift in business focus. Starting from initial smart contract code auditing, they gradually extended into deeper areas such as security monitoring, fund tracing, and anti-money laundering (AML) compliance.

Zhou Yajin and his team have long been deeply involved in specialized research on on-chain data. They even used technical means to "lurk" in black market groups like Southeast Asian telecom fraud, mastering a vast amount of little-known underlying survival landscapes. Through his perspective, we might see the most real interest games in this new digital world.

The following is Zhou Yajin's account, edited and compiled by the Beating Editorial Department after an exclusive interview.

Kite is the first Layer 1 blockchain for AI agent payments. This underlying infrastructure enables autonomous AI agents to operate in an environment with verifiable identity, programmable governance, and native stablecoin settlement.

Kite was founded by senior experts in AI and data infrastructure from Databricks, Uber, and UC Berkeley. It has completed a $35 million financing round, with investors including PayPal, General Catalyst, Coinbase Ventures, 8VC, and several top investment foundations.

From Code Auditing to the Anti-Money Laundering Battlefield

I pursued my Ph.D. in the United States from 2010 to 2015, under the guidance of Professor Jiang Xuxian. At that time, we worked on mobile security, particularly Android malware detection, which was relatively early globally. After graduating in 2015, I followed my advisor to Qihoo 360 to industrialize our research results.

In 2018, I joined Zhejiang University, moving from the industry back to academia. At that time, China was experiencing the small ICO boom around 2017-2018, which brought blockchain into the view of a small group of people. I also started looking into blockchain security. I observed frequent on-chain security incidents at the time. The academic world already had many good solutions, but looking back at the industry, not much was being done well; in fact, very few were paying attention to these issues.

So in 2021, Professor Wu Lei and I co-founded BlockSec.

Initially, everyone's perception of a "blockchain security company" was extremely stereotypical: aren't you just doing audits? Indeed, we started with smart contract auditing. Because we had academic research积累 (accumulation) and an elite team, we quickly gained a foothold in the auditing business. But my perspective in founding the company was that I didn't want it to be just a security service company. Because auditing only addresses pre-launch security, and for post-launch protection, there weren't particularly good solutions in the industry at that time.

So in 2022, while doing audits, we also started developing an on-chain attack monitoring platform. Our product concept at the time was to continuously monitor on-chain transactions. If an attack transaction occurred, it could be automatically blocked. During this process, we found that even with auditing and monitoring, projects could still be attacked. Additionally, there were many consumer-side security incidents like phishing and private key loss, where users lost money, which衍生出 (derived) new demands.

When a project gets hacked or a user gets phished, they need to report it to law enforcement and explain clearly where the money went. So starting in 2022, we developed a fund flow tracking product. This product was completely SaaS-based; users could subscribe and use it directly—we didn't adopt a To B sales model.

The user profile for this product surprised us greatly. Besides law enforcement agencies, media journalists were using it, financial institutions were using it, and even many private detectives taking on side jobs were using it. These users from different backgrounds helped us refine the product during use, attracting more users. Combined with our existing attack detection engines, phishing detection engines, etc., these labels and data gradually沉淀 (precipitated) into our deepest moat.

The turning point occurred around late 2024 to early 2025.

At that time, the issuance volume of stablecoins began to surge wildly. This market was no longer only participated in by Crypto Native people. Many from traditional finance started entering, and the first virtual currency they encountered was stablecoins. These people have a strong sense of compliance. As soon as they entered, they would ask: I want to use stablecoins, so how do I solve the AML (Anti-Money Laundering) and CFT (Countering the Financing of Terrorism) issues?

The market lacked good compliance products, and we恰好 (happened to) have underlying label data accumulated over three years, so we quickly launched an anti-money laundering product. The whole process was quite natural. We evolved from a pure security service provider to a comprehensive "security + compliance" supplier based on market demand changes.

Lurking

To do anti-money laundering, you first need to deeply understand how the black and gray markets actually use money.

From our research perspective, cryptocurrency crimes are typically divided into two categories: one is "crypto-native," such as attacks targeting code vulnerabilities in DeFi protocols, private key theft, or phishing. Without blockchain, these crimes wouldn't exist at all.

The other category is "crypto-driven," such as telecom fraud, ransomware, and human trafficking. The emergence of cryptocurrency极大地提高了 (greatly enhanced) the efficiency and anonymity of their cross-border transfers. In these scenarios, what shocked us the most was the human trafficking within the Southeast Asian telecom fraud industry chain.

Many people feel that telecom fraud is far from them, but look at their recruitment ads—the诱惑力 (enticement) is extremely precise: starting monthly salary of 19,000 RMB, covering air tickets, food, and accommodation, and even earnestly promising "must purchase Shenzhen social security." This诈骗手段 (fraud method) specifically targeting young people aged 18 to 37 has deceived a large number of victims into crossing the border and entering those fraud parks distributed in Myanmar, Cambodia, or Laos.

Today's fraud parks have an organizational structure as strict as正规公司 (legitimate companies), complete with finance, technology, and call operation groups. To maintain this massive operation, they need to constantly replenish "labor." The parks (demand side) and human traffickers (supply side) don't know each other and have no trust in online communication.

Thus, an intermediary环节 (link) specifically designed to provide credit endorsement for illegal transactions was born: the "labor guarantee platforms."

The operating logic of this system is very similar to Taobao. The park first deposits a amount of USDT as collateral on the guarantee platform; the human trafficker is responsible for luring the victims across the border to a designated "inspection" location. After both parties confirm无误 (without error) in a private Telegram group, the platform releases the collateral to the trafficker. This transaction believes in "money arrives when the person arrives." If either party tries to renege, the platform will freeze or confiscate the collateral according to the rules to compensate the other party.

To attract business, these platforms open many public channels on Telegram to "show muscle." For example, in the channels of Linghang Guarantee or Haowang Guarantee, system bots release real-time transaction screenshots and on-chain transfer records. They even run promotions like正规电商 (legitimate e-commerce), such as代收佣金 (collecting commissions on behalf), or "buy 10 ads get 2 free."

This is also the most direct entry point for us to observe the black market.

From February to August 2025, we developed an automated system to continuously lurk in these groups and gather intelligence. Because the chats in the groups are filled with jargon, we specifically trained a large language model for analysis.

In the black market's jargon, victims are "fish," fraud tactics and victim information are called "material" (料 liao). The material is finely categorized: there's "three black material," "mixed material," "air ticket material," etc. Based on the money laundering环节 (stage), it is also divided into "first-hand material" received directly from the victim, and "second-hand material" that has undergone layering processing.

There is also a job called "手机口" (shouji kou, mobile port). Accomplices within China use audio cables or specific APPs to relay overseas fraud calls to domestic mobile phones for dialing, bypassing carrier anti-fraud interception, earning about 200 USDT per hour. They recruit many small-town youths to do this.

In these black market groups,甚至公然流传着 (even openly circulated) "Anti-Police Tutorials," meticulously teaching everyone how to calmly deal with investigations, such as insisting that the phone was lost, deleting scripts and encrypted communication software in advance. The end of the tutorial writes a very ironic sentence—"Salute to everyone who works hard."

Through half a year of automated monitoring, for one of these guarantee platforms, we identified a total of 634 addresses associated with human trafficking gangs, with累计追踪到的 (cumulatively tracked) illegal transaction amount接近 (approaching) $12 million. At the most active time, 10 people were sold into parks daily through this one guarantee platform. The actual situation might be more severe because other guarantee platforms exist.

When tracking the flow of funds, we found that绝大部分 (the vast majority) of this money is on the Tron chain, primarily using the stablecoin USDT. Because Tron has a low operational threshold and cheap transaction fees, it is very suitable for these criminal gangs with limited technical水平 (level). Although Tron fees have also increased now, they have developed usage habits and find it difficult to switch to other methods.

Analyzing the fund flows of over 120 gangs, we found that more than 34.9% of these illegal proceeds ultimately flowed to OKX's hot wallets, 6.9% to Binance, and 14.4% to hot wallets related to汇旺 (Huiwang).

When you can see clearly how this money comes from and how it flows, anti-money laundering is not an empty phrase. This real data captured from the underlying groups is the core barrier in current security and compliance.

12 Seconds: "Intercepting" Hackers in the Mempool

In the security industry, there has always been a complex: auditing only ensures the code is secure at the moment of launch. But once the project is live, it faces 24/7 scrutiny from global hackers. If auditing is "static defense," can we find a way to do "dynamic interception"?

In 2022, while doing audits, we launched an on-chain attack monitoring platform. The underlying logic of this product is to watch Ethereum's Mempool. You can think of the mempool as a waiting room. All transactions must queue here before being officially packed into a block and recorded in the ledger.

In this waiting room, we not only watch ordinary user transactions but also those scripts with attack signatures. Once a suspected attack transaction is detected, our system immediately starts automatic analysis in a private chain environment: What does it want to do? Is the logic valid? How much money will it steal?

The most thrilling博弈 (game) usually happens within a brief 12 seconds.

After the Ethereum Merge, the block time was fixed at 12 seconds. This means that from the moment a hacker sends an attack instruction to the moment the transaction is actually confirmed and packed, there is an extremely short window. These few seconds are the golden rescue time留给 (left for) white hats.

After confirming the attack, our system automatically generates a "Front-running" transaction. The content of this transaction is almost identical to the hacker's, but the key difference is that we change the recipient address from the hacker's wallet to a pre-set security address.

To outrun the hacker, we must obtain packing priority from the miners.

Hackers, pursuing profit maximization, usually set a standard Gas Fee. We, through algorithms, set the Gas Fee very high, even directly giving a portion of this money to the miners. Driven by profit, miners will prioritize packing our transaction. When our transaction executes successfully, the hacker's transaction automatically becomes invalid.

This capability has saved many projects in实战 (actual combat).

The most typical instance was when we successfully intercepted an attack against a certain protocol in the mempool, rescuing 2909 Ethereum for the project方 (party) at once. The hacker had already triggered the vulnerability, and tens of millions of dollars were about to be stolen. Our monitoring system instantly alerted and completed attack simulation, transaction generation, and Gas bidding within seconds. Ultimately, that huge sum was transferred to our security address one step ahead of the hacker.

In the past, if a project was hacked, they could only ask for help on Twitter or negotiate with the hacker for a bounty to return the money. But now, through technical means, we intercept the money强行 (forcibly) just before the hacker succeeds.

Only if you understand the code better than the hacker and run faster than the hacker can you hold the last line of defense in this "Code is law" dark forest.

Epilogue

If the crypto world of the past decade was a "gold rush," then standing at the node of 2025, what we see is a return to "certainty." As the stablecoin scale surges towards $300 billion magnificently, as a new digital financial system moves from "wilderness" to "city-state," technology is no longer just a lever for wealth; it must first become a shield against the dark side of human nature.

The transformation experienced by Zhou Yajin and his team essentially reflects this business logic. From code auditing to dynamic interception, to deep diving and dismantling black industry chains, this is not the孤勇 (lonely courage) of an individual, but a defense mechanism inevitably generated as technology evolves to a certain scale. In this world where code is law, if the stubborn problems of illegal fund flows and security defenses are not solved, then the so-called "financial revolution" will forever remain a game for a minority.

In commercial history, any industry that can go mainstream has experienced the pain of moving from chaos to rule of law. This might be a long and tedious process, but as Zhou Yajin said, the final form of security is "unperceivable."

Only when security becomes like air—ubiquitous yet ignored by everyone—can this once volatile digital wasteland be considered truly civilized.

Связанные с этим вопросы

QWhat is the primary focus of BlockSec's business evolution under Professor Zhou Yajin's leadership?

ABlockSec has evolved from initially providing smart contract code auditing to extending into security monitoring, fund tracing, and anti-money laundering (AML) compliance, becoming a comprehensive 'security + compliance' supplier.

QHow do criminal organizations in Southeast Asia use cryptocurrency, particularly stablecoins, for illegal activities like telecom fraud?

ACriminal organizations use stablecoins like USDT on networks such as Tron for cross-border transfers due to low fees and ease of use. They employ 'labor guarantee platforms' on Telegram to facilitate human trafficking and fraud, with transactions often made in USDT to ensure anonymity and efficiency.

QWhat method does BlockSec use to intercept hacking attacks on blockchain transactions within the critical 12-second window?

ABlockSec monitors Ethereum's mempool for attack transactions, automatically analyzes them in a private chain environment, and generates a front-running transaction with a higher gas fee to redirect funds to a secure address before the hacker's transaction is confirmed, leveraging the 12-second block time window.

QWhat percentage of illegal funds from tracked criminal groups were found to flow into OKX's hot wallets according to BlockSec's analysis?

ABlockSec's analysis found that over 34.9% of illegal funds from tracked criminal groups flowed into OKX's hot wallets.

QWhat is the significance of the 'labor guarantee platforms' in the context of Southeast Asian telecom fraud and human trafficking?

AThese platforms act as intermediaries that provide credit endorsement for illegal transactions between fraud parks (buyers) and human traffickers (sellers). They operate like e-commerce systems, using USDT deposits on Telegram to ensure trust, with funds released upon confirmation of victim delivery, facilitating human trafficking for fraud operations.

Похожее

$30 Billion DeFi Capital Exodus: LayerZero Stumbles, Chainlink Feasts

Following the major DeFi security incident involving Kelp DAO, a significant migration of funds is underway from the cross-chain protocol LayerZero to Chainlink's CCIP (Cross-Chain Interoperability Protocol). Over $30 billion in Total Value Locked (TVL) from protocols like Kelp DAO, Solv Protocol, Re, and Tydro has moved to Chainlink in the past week, driven by security concerns. LayerZero is facing a severe trust crisis after the attack. Initially denying responsibility, LayerZero Labs has now issued a public apology, acknowledging management oversights. These include a vulnerable "1/1" single-node configuration for its Decentralized Verification Network (DVN) and past misuse of a multi-signature wallet by a team member. The protocol's weekly bridge volume has slumped to near-historic lows of around $470 million. In contrast, Chainlink is experiencing a surge in adoption and activity. Its independent active addresses recently hit multi-month highs, and whales have been accumulating LINK tokens. Beyond DeFi, Chainlink is securing partnerships with traditional finance giants like DTCC, European stock exchange operator SIX Group, and asset manager Amundi. While LayerZero has announced security upgrades—such as migrating to stronger multi-signature configurations and developing a second DVN client—and contributed to a rescue fund, the event underscores that security is becoming a decisive competitive factor as DeFi matures.

marsbit23 мин. назад

$30 Billion DeFi Capital Exodus: LayerZero Stumbles, Chainlink Feasts

marsbit23 мин. назад

The $13 Trillion Repo Market Is Quietly Being Rewritten by Blockchain

The $13 trillion repurchase agreement (repo) market, a crucial artery for global short-term funding, is experiencing a significant transformation through blockchain technology. After years of limited impact in finance, blockchain is finding substantial adoption in repo transactions. Major institutions like JPMorgan Chase, HSBC, and Broadridge are deploying tokenized repo platforms, with daily volumes already reaching tens of billions of dollars. Traditional repo markets operate with fixed hours, rely on intermediaries, and involve manual, time-consuming processes. Tokenized repos, by contrast, use blockchain to create digital tokens representing cash and securities collateral. This enables near-instantaneous settlement, 24/7 trading, automated execution, and enhanced auditability. The key drivers for adoption include maturing technology, more receptive regulators, and growing client recognition of tangible benefits like reduced operational friction and capital efficiency. Analyses, such as one from Broadridge, indicate that moving a portion of repo activity onto blockchain can significantly reduce a bank's required liquidity buffers, potentially freeing up billions in capital. The infrastructure is also seen as foundational for a future of round-the-clock trading for traditional assets. Challenges remain, including the existence of fragmented blockchain networks, the need for stress testing under extreme market conditions, and the loss of operational flexibility compared to manual processes. However, the industry consensus is that these are implementation hurdles. Tokenized repo has moved beyond pilot stages to become one of blockchain's most concrete and impactful applications in traditional finance, marking a pivotal shift in how a core market functions.

marsbit23 мин. назад

The $13 Trillion Repo Market Is Quietly Being Rewritten by Blockchain

marsbit23 мин. назад

From Gas Limit to 'Keyed Nonces', How to Understand the Next Step in Ethereum Scalability?

Ethereum’s scalability efforts are shifting toward a user-centric approach—focusing not only on higher TPS, but on translating technical upgrades into lower costs, smoother operations, and better wallet experiences. Two recent developments highlight this direction: - **Raising the Gas Limit to 200 million**: Following the Fusaka upgrade that increased it to 60 million, a consensus has formed around a potential future increase to 200 million. This would boost Ethereum’s execution capacity, but it is planned alongside other upgrades—such as ePBS, Block-Level Access Lists (BAL), and EIP-8037—to manage state growth and keep node operation viable for average participants. - **Keyed Nonces (EIP-8250)**: This proposal aims to improve how transactions are queued. Instead of a single linear nonce per account, it introduces multiple independent nonce domains. This prevents different types of transactions—such as private payments, session keys, or batch operations—from blocking each other. Vitalik Buterin views this as a foundational step toward better privacy support and more flexible state scalability. Together, these upgrades are part of a broader move to push complexity from wallets, DApps, and relays back into the protocol layer. For everyday users, this means future Ethereum interactions could become less congested, more intuitive, and safer—especially as core improvements in account abstraction, cross-L2 interoperability, and node decentralization continue to progress. Ultimately, Ethereum is evolving to handle not just more transactions, but more varied and complex on-chain use cases while preserving its decentralized foundation.

marsbit46 мин. назад

From Gas Limit to 'Keyed Nonces', How to Understand the Next Step in Ethereum Scalability?

marsbit46 мин. назад

Leaving OpenAI, How Much Has Their Net Worth Increased?

Former OpenAI employees have collectively accrued near-trillion dollar valuations through ventures and investments, charting AI's future. The article highlights two main paths: founding high-value companies like Anthropic and Perplexity, or applying insider insights as investors. Leopold Aschenbrenner exemplifies the investor path. After being fired from OpenAI, he leveraged firsthand knowledge of AI's massive energy demands to make hugely successful public market bets on nuclear and fuel cell companies, practicing "cross-industry cognitive arbitrage." Other alumni, like the Zero Shot VC fund founders, use their technical foresight for early-stage investing. Their key advantage lies not just in picking winners, but in knowing which technical approaches are likely dead ends—a "veto list" derived from internal OpenAI experience. Angel investing within the network, as seen with Mira Murati and Sam Altman, operates on deep, pre-existing understanding of a founder's capabilities, reducing due diligence to near zero. This creates an ecosystem bound by a shared belief in AGI's imminent arrival, differing from networks like the "PayPal Mafia" which were built on shared past struggles. The shift of these builders to investors signals a profound conviction: their situational awareness of the AI landscape is now so clear that deploying capital based on that judgment is more efficient than building themselves. They are allocating bets on the future they helped shape from the inside.

marsbit57 мин. назад

Leaving OpenAI, How Much Has Their Net Worth Increased?

marsbit57 мин. назад

Торговля

Спот
Фьючерсы

Популярные статьи

Как купить T

Добро пожаловать на HTX.com! Мы сделали приобретение Threshold Network Token (T) простым и удобным. Следуйте нашему пошаговому руководству и отправляйтесь в свое крипто-путешествие.Шаг 1: Создайте аккаунт на HTXИспользуйте свой адрес электронной почты или номер телефона, чтобы зарегистрироваться и бесплатно создать аккаунт на HTX. Пройдите удобную регистрацию и откройте для себя весь функционал.Создать аккаунтШаг 2: Перейдите в Купить криптовалюту и выберите свой способ оплатыКредитная/Дебетовая Карта: Используйте свою карту Visa или Mastercard для мгновенной покупки Threshold Network Token (T).Баланс: Используйте средства с баланса вашего аккаунта HTX для простой торговли.Третьи Лица: Мы добавили популярные способы оплаты, такие как Google Pay и Apple Pay, для повышения удобства.P2P: Торгуйте напрямую с другими пользователями на HTX.Внебиржевая Торговля (OTC): Мы предлагаем индивидуальные услуги и конкурентоспособные обменные курсы для трейдеров.Шаг 3: Хранение Threshold Network Token (T)После приобретения вами Threshold Network Token (T) храните их в своем аккаунте на HTX. В качестве альтернативы вы можете отправить их куда-либо с помощью перевода в блокчейне или использовать для торговли с другими криптовалютами.Шаг 4: Торговля Threshold Network Token (T)С легкостью торгуйте Threshold Network Token (T) на спотовом рынке HTX. Просто зайдите в свой аккаунт, выберите торговую пару, совершайте сделки и следите за ними в режиме реального времени. Мы предлагаем удобный интерфейс как для начинающих, так и для опытных трейдеров.

774 просмотров всегоОпубликовано 2024.03.29Обновлено 2025.03.21

Как купить T

Обсуждения

Добро пожаловать в Сообщество HTX. Здесь вы сможете быть в курсе последних новостей о развитии платформы и получить доступ к профессиональной аналитической информации о рынке. Мнения пользователей о цене на T (T) представлены ниже.

活动图片