Advertisement · 728 × 90
#
Hashtag
#OFAC
Advertisement · 728 × 90

Maritime watch:

885 vessels on FleetLeaks sanctions database

EU: 597 | UK: 595 | CA: 610 | AU: 155 | NZ: 210

https://fleetleaks.com/vessels/

#FleetLeaks #Sanctions #OFAC #FinCrime

0 0 0 0
I'm Getting Canceled for Helping Cuba...
I'm Getting Canceled for Helping Cuba... YouTube video by HasanAbi

Hasan Piker explica su estancia en La Habana y destruye los ataques contra él y otros. Hotel, #OFAC, etc

I'm Getting Canceled for Helping #Cuba... www.youtube.com/watch?v=lsux... #Flotilla #Petróleo

0 0 0 1
Preview
Hija de ‘El Mayo’ estuvo bajo custodia, nunca fue detenida: asegura Omar García Harfuch - Hans Digital Zambada Niebla aparece en lista de la OFAC desde 2007; el secretario aclara que durante la realización de un amplio operativo, la mujer quedó bajo custodia por su seguridad y para verificar mandamient...

🛑Hija de ‘El Mayo’ estuvo bajo custodia, nunca fue #detenida: asegura Harfuch 👉Zambada Niebla aparece en lista de la #OFAC desde 2007; el secretario aclara que durante la realización de un amplio operativo, la mujer quedó bajo custodia por su #Seguridad y para verificar mandamientos judiciales

1 0 0 0
Preview
OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has sanctioned six individuals and two entities for their involvement in the Democratic People's Republic of Korea (DPRK) information technology (IT) worker scheme with an aim to defraud U.S. businesses and generate illicit revenue for the regime to fund its weapons of mass destruction (WMD) programs. "The North Korean

iT4iNT SERVER OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs VDS VPS Cloud #OFAC #DPRK #Sanctions #Cybersecurity #WMD

0 0 0 0
Preview
BNR Nieuwsradio BNR.nl houdt ondernemend Nederland op de hoogte via live nieuwsradio, de beste artikelen, app en podcasts.

"Als je de #btw laat doen door Amerikanen graaf je je eigen Digitale Straat van Hormuz: het houdt op als Trump je niet aardig meer vindt" - wat ik had willen zeggen op BNR over de uitbesteding van de btw. Maar, er was genoeg interessants te zeggen zoals over de #OFAC: www.bnr.nl/gemist?date=...

18 8 1 2

Just checked, back to Jan 1 2024. #Zircone had multiple STSs with #shadowfleet tankers, incl. the #Everdine right on the day it got sanctioned by #OFAC and a few other vessels, like the #Mandala before those got sanctioned. Interestingly, since Dec 19, it is stationary in Tallin. #Rina covering it.

3 1 1 0
Issuance of Russia-related General License

Interesting…”Issuance of Russia-related General License.” content.govdelivery.com/accounts/UST...
#Russia #oil #OFAC #readthis

1 2 0 0
Preview
OFAC Sanctions DPRK IT Facilitators in $800M Scheme - Crypto Economy Treasury/OFAC sanctions 6 people and 2 entities tied to DPRK IT worker scams, citing ~$800M raised in 2024; U.S. assets blocked.

⚖️ OFAC sanctions facilitators tied to DPRK

OFAC sanctioned 6 individuals and 2 entities linked to North Korean IT worker schemes that raised nearly $800M in 2024.

#Crypto #Regulation #OFAC #Blockchain #Security

0 0 0 0
Preview
Temporary US sanctions waiver for Russian oil fails to cool crude prices above $100 The US Treasury Department's Office of Foreign Assets Control (OFAC) issued a 30-day general license on March 12 to purchase Russian crude oil and petroleum products loaded on vessels before that day.

The US Treasury Department's Office of Foreign Assets Control (OFAC) issued a 30-day general license on March 12 to purchase Russian crude oil and petroleum products loaded on vessels before that day. Bne IntelliNews #USsanctions #RussianOil #CrudeOil #OilPrices #OFAC

0 0 0 0

Iran drives $104B surge in sanctions-busting crypto flows#A7A5TokenNetwork #Block2 #Chainalysis #ChenZi #CryptoFraud #CryptoSanctionsEvasion #Finance #Garantex #HuioneGroup #Iran #IranCrypto #IslamicRevolutionaryGuardCorps #OFAC #PrinceGroup #Russia #RussiaStablecoins #stablecoins #TornadoCash #USTr

0 0 0 0
Preview
US grants 30-day waiver for India to buy Russian oil - Yes Punjab News US grants 30-day waiver for India to import stranded Russian oil amid Iran war, stressing it’s temporary and limited.

US grants 30-day waiver for India to buy Russian oil yespunjab.com?p=224734

#TrumpAdministration #RussianOil #IndiaUSRelations #USTreasury #OFAC #EnergyCrisis #IranWar #GlobalOil #Sanctions #USForeignPolicy #IndiaEnergy #RussiaSanctions #MiddleEastTensions #OilMarket #Geopolitics #BreakingNews

0 0 0 0
Post image

#新邪惡軸心 #NewAxisOfEvil #MadeInCCPChinaHK
2026 #OFAC #treasuryGOV
home.treasury.gov/news/press-r...

0 0 0 0
Post image

#新邪惡軸心 #NewAxisOfEvil #MadeInCCPChinaHK
2026 #OFAC #treasuryGOV
ofac.treasury.gov/recent-actio...

0 0 0 0
Post image

#新邪惡軸心 #NewAxisOfEvil #MadeInCCPChinaHK
2026 #OFAC #treasuryGOV
ofac.treasury.gov/recent-actio...

0 0 0 0

Where a sanctions licence is required, exit, settlement and enforcement become a permissions question.

The regulator controls timing, scope and conditions.

That affects creditor priority, recovery value and deal certainty.

#OFAC

0 0 1 0
🛑El depuesto presidente , Nicolás Maduro, pide a un juez que desestime la acusación en su contra 👇
🛑El depuesto presidente , Nicolás Maduro, pide a un juez que desestime la acusación en su contra 👇 YouTube video by 90 Segundos Noticias

🛑El depuesto presidente , Nicolás Maduro, pide a un juez que desestime la acusación en su contra 👇#Maduro2026 #EstadosUnidos #CorteFederal #OFAC #Venezuela

youtu.be/i7l-nT0L5p0

1 1 0 0
Preview
Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools First-Ever Action Under the Protecting American Intellectual Property ActWASHINGTON — Today, the Department of the Treasury’s Office of Foreign Assets Control (OFAC) designated Sergey Sergeyevich Zelenyuk (Zelenyuk) and his company, Matrix LLC (doing business as Operation Zero), as well as five associated individuals and entities, for their acquisition and distribution of cyber tools harmful to U.S. national security.  Zelenyuk and Operation Zero trade in “exploits”—pieces of code or techniques that take advantage of vulnerabilities in a computer program to allow users to gain unauthorized access, steal information, or take control of an electronic device—and have offered rewards to anyone who will provide them with exploits for U.S.-built software.  Among the exploits that Operation Zero acquired were at least eight proprietary cyber tools, which were created for the exclusive use of the U.S. government and select allies and which were stolen from a U.S. company.  Operation Zero then sold those stolen tools to at least one unauthorized user.“If you steal U.S. trade secrets, we will hold you accountable,” said Secretary of the Treasury Scott Bessent.  “Treasury will continue to work alongside the rest of the Trump Administration to protect sensitive American intellectual property and safeguard our national security.”This action coincides with an investigation by the Department of Justice and the Federal Bureau of Investigation of Peter Williams, an Australian national and a former employee of the aforementioned U.S. company who pleaded guilty on October 29, 2025, to two counts of theft of trade secrets. Williams stole several proprietary cyber tools from the company between 2022 and 2025 and sold them to Operation Zero in exchange for millions of dollars paid in cryptocurrencies.OFAC is designating Zelenyuk, Operation Zero, and the five associated individuals and entities pursuant to Executive Order (E.O.) 13694, as further amended by E.O. 14306 (“E.O. 13694, as further amended”).  In parallel with this action, the Department of State is sanctioning Zelenyuk, Operation Zero, and an affiliated UAE company, Special Technology Services LLC FZ (STS) pursuant to the Protecting American Intellectual Property Act (PAIPA).  These are the first persons sanctioned under this law, which provides for sanctions against persons who have knowingly engaged in, or benefitted from, significant theft of trade secrets of United States persons, if the theft of such trade secrets is reasonably likely to result in, or has materially contributed to, a significant threat to the national security, foreign policy, or economic health or financial stability of the United States.  Please refer to the Department of State’s press release for more information about this action under PAIPA. ZELENYUK’S ACQUISITION AND SALE OF CYBER TOOLSRussian national Zelenyuk,through his St. Petersburg, Russia-headquartered company Operation Zero, has been active as an exploit broker since 2021.  Operation Zero has offered millions of dollars in bounties to cybersecurity researchers and others for the development or acquisition of exploits targeting commonly used software, including U.S.-built operating systems and encrypted messaging applications.  Operation Zero does not disclose the discovered exploits to the companies developing the affected software, and Operation Zero customers could use the tools to launch ransomware attacks or engage in other malign activities.  In advertisements and other public-facing materials, Zelenyuk and Operation Zero have stated that they will only sell the exploits they acquire to customers from non-NATO countries.  Zelenyuk, through Operation Zero, has sought to sell exploits to foreign intelligence agencies.  Zelenyuk and Operation Zero have also sought to develop other cyber intelligence systems, including spyware and methods to extract personal identifying information and other sensitive data uploaded by users of artificial intelligence applications like large language models.  Operation Zero has sought to recruit hackers to support its activities and develop business relationships with foreign intelligence agencies through use of social media.OFAC is designating Zelenyuk and Operation Zero pursuant to E.O. 13694, as further amended, for being responsible for or complicit in, or having engaged in, directly or indirectly, cyber-enabled activities originating from, or directed by persons located, in whole or substantial part, outside the United States that are reasonably likely to result in, or have materially contributed to, a threat to the national security, foreign policy, or economic health or financial stability of the United States, and that have the purpose of or involve causing a misappropriation of funds or economic resources, intellectual property, proprietary or business confidential information, personal identifiers, or financial information for commercial or competitive advantage or private financial gain.OPERATION ZERO’S AFFILIATESBeyond Zelenyuk and Operation Zero, OFAC is imposing sanctions on individuals and companies associated with them.  Marina Evgenyevna Vasanovich (Vasanovich) is Zelenyuk’s assistant. STS is a UAE-based technology company controlled by Zelenyuk.  OFAC is designating Vasanovich and STS pursuant to E.O. 13694, as further amended, for being owned or controlled by, or having acted or purported to act for or on behalf of, directly or indirectly, Zelenyuk.OFAC is also designating Azizjon Makhmudovich Mamashoyev (Mamashoyev) and Oleg Vyacheslavovich Kucherov (Kucherov).  Kucherov is a Russian national and a suspected member of the Trickbot cybercrime gang. OFAC previously designated members of the Trickbot group in February 2023 and September 2023.  Trickbot, first identified in 2016, is a highly modular malware suite that allows the Trickbot cybercrime gang to conduct a variety of malicious cyber activities, including ransomware attacks against the U.S. government, as well as hospitals and healthcare centers across the United States.  Kucherov and Mamashoyev have previously had work relationships with Operation Zero.  OFAC is designating Mamashoyev and Kucherov pursuant to E.O. 13694, as further amended, for having materially assisted, sponsored, or provided financial, material, or technological support for, or goods and services to or in support of, Zelenyuk,Additionally, OFAC is sanctioning Advance Security Solutions, another exploit brokerage firm that, like Operation Zero, offers bounties for exploits for U.S.-built software. Advance Security Solutions is an offensive cybersecurity company created by Mamashoyev with operations in the UAE and Uzbekistan.  OFAC is designating Advance Security Solutions pursuant to E.O. 13694, as further amended, for being owned or controlled by, or having acted or purported to act for or on behalf of, directly, Mamashoyev.SANCTIONS IMPLICATIONSAs a result of today’s action, all property and interests in property of the designated or blocked persons described above that are in the United States or in the possession or control of U.S. persons are blocked and must be reported to OFAC.  In addition, any entities that are owned, directly or indirectly, individually or in the aggregate, 50 percent or more by one or more blocked persons are also blocked.  Unless authorized by OFAC, or exempt, OFAC’s regulations generally prohibit all transactions by U.S. persons or within (or transiting) the United States that involve any property or interests in property of blocked persons. Violations of U.S. sanctions may result in the imposition of civil or criminal penalties on U.S. and foreign persons.  OFAC may impose civil penalties for sanctions violations on a strict liability basis.  OFAC’s Economic Sanctions Enforcement Guidelines provide more information regarding OFAC’s enforcement of U.S. economic sanctions. In addition, financial institutions and other persons may risk exposure to sanctions for engaging in certain transactions or activities involving designated or otherwise blocked persons.  The prohibitions include the making of any contribution or provision of funds, goods, or services by, to, or for the benefit of any designated or blocked person, or the receipt of any contribution or provision of funds, goods, or services from any such person.  The power and integrity of OFAC sanctions derive not only from OFAC’s ability to designate and add persons to the SDN List, but also from its willingness to remove persons from the SDN List consistent with the law.  The ultimate goal of sanctions is not to punish, but to bring about a positive change in behavior.  For information concerning the process for seeking removal from an OFAC list, including the SDN List, or to submit a request, please refer to OFAC’s guidance on Filing a Petition for Removal from an OFAC List.Click here for more information on the individuals and entities designated or otherwise blocked today.###

Dept of the Treasury’s Office of Foreign Assets Control ( #OFAC ) designated Sergey Sergeyevich Zelenyuk (Zelenyuk) and his company, Matrix LLC (DBA: Operation Zero), as well as 5 assoc. individ. and entities, for acq. & dist. of #cybertools harmful to U.S. #NATSEC

home.treasury.gov/news/press-r...

0 0 0 0