Law and Order

US Treasury Seeking ‘Innovative Methods’ to Detect Illicit Crypto Activity

In brief The U.S. Treasury is seeking public comment on innovative technologies like AI, blockchain monitoring, and digital ID verification to detect illicit cryptocurrency use, with responses due October 17. Industry experts believe privacy and compliance can be balanced through zero-knowledge proofs and reusable KYC credentials that verify users without exposing personal data. The Treasury…

Law and Order

Bankers Want Stablecoin Law Changed—Crypto Lobby Says No Way

In brief Crypto lobbyists pushed back against requests made last week by banking associations to weaken or repeal key sections of recently passed stablecoin legislation. The Blockchain Association and the Crypto Council for Innovation told senators that the bankers were trying to protect their own interests “at the expense of broader industry growth, competition, and…

Business

Illinois Governor Signs First-in-Midwest Crypto Consumer Protection Laws

In brief Illinois Governor J.B. Pritzker signed the Digital Assets and Consumer Protection Act (SB1797), giving regulators authority over crypto exchanges and mandating fraud safeguards. Pritzker also signed the Digital Asset Kiosk Act (SB2319), requiring ATM operators to register, cap fees at 18%, limit transactions, and refund scam victims. Illinois now has about 1,482 crypto…

Law and Order

Coinbase, DCG, Kraken, Other Crypto Lobbyists Unveil Tax-Exempt ‘Education’ Nonprofit

In brief Powerful crypto companies including Coinbase, DCG, Kraken and Paradigm are teaming up with top lobbyists to introduce a new nonprofit focused on educating policymakers about decentralized technologies. As a 501(c)(3), the American Innovation Project (AIP) will enjoy key benefits including tax exempt status and limited liability for operators and participants. By law, however,…

Law and Order

How Hackers Are Using Fake Captchas to Spread Lumma Stealer Malware

In brief Hackers are using fake Captchas to distribute Lumma Stealer malware, new research has found. Once installed by an unsuspecting user, the malware searches infected devices for credentials, including crypto wallet data. Lumma Stealer is an example of Malware-as-a-Service, which is effectively run as a “sustainable cybercriminal business,” experts told Decrypt. Bad actors are…