12 月 ETH 价格预测 · 发帖挑战 📈
12 月降息预期升温,ETH 热点回暖,借此窗口期发起行情预测互动!
欢迎 Gate 社区用户 —— 判趋势 · 猜行情 · 赢奖励 💰
奖励 🎁:预测命中的用户中抽取 5 位,每位 10 USDT
时间 📅:预测截止 12 月 11 日 12:00(UTC+8)
参与方式 ✍️:
在 Gate 广场发布 ETH 行情预测帖,写明价格区间(如 $3,200–$3,400,区间需<$200),并添加话题 #ETH12月行情预测
发帖示例 👇
示例①:
#ETH12月行情预测
预测区间:$3,150-$3,250
行情偏震荡上行,若降息如期落地 + ETF 情绪配合,冲击前高可期 🚀
示例②:
#ETH12月行情预测
预测区间:$3,300-$3,480
资金回流 + L2 降费利好中期趋势,向上试探 $3,400 的概率更高 📊
评选规则 📍
以 12 月 11 日 12:00(UTC+8)ETH 实时价格为参考
价格落入预测区间 → 视为命中
若命中人数>5 → 从命中者中随机抽取 5 位 🏆
Binance Freezes $4.4 Million in Crypto Related to North Korean Hackers
On the 25th of May, Binance announced the seizure of approximately $4.4 million in cryptocurrency belonging to fronts for North Korean organizations operating in the country and abroad.
Due to sanctions against the rogue nation, agents working for it have often turned to illicit methods of raising funds, including theft of crypto.
Illicit Research Funding Blocked
The funds seized today were to be remitted to the Pyongyang University of Automation, responsible for the training of the infamous North Korean hackers, according to the U.S. Department of Treasury, and the North Korean Technical Reconnaissance Bureau, which employs said bad actors.
Most of the cybercriminals trained at the Pyongyang University of Automation are part of the 110th Research Center, the unit in charge of running the Lazarus Group and similar groups.
In order to fund these entities, North Korean IT professionals – often based in Russia and China – seek employment in companies around the world, turning over their salaries to the North Korean government. However, the latest batch of funding was stopped due to the efforts of the U.S. Government and Binance.
Brian Nelson, a spokesperson for the U.S. Treasury, thanked their “partners in the private sector” for the help offered.
Commitment to a Safer World
Binance has previously come under fire for allegedly not doing enough to prevent cybercriminals and radical groups from receiving funding from sympathizers worldwide.
The firm, though, has responded to the allegations, stating that the team does everything in its power to stop these actions.
Indeed, cybersecurity is a numbers game – the fact that a few bad actors manage to squeeze through the net says nothing about the much larger number of bad actors stopped. This is amplified by the fact that companies do not publicly announce which bad actors they stopped and how did they do it, as this would help others evade detection.