logo
Crypto Tycoon's Daughter Narrowly Escapes Kidnappers in Paris

Crypto Tycoon's Daughter Narrowly Escapes Kidnappers in Paris

Yahoo15-05-2025
The daughter, son-in-law, and grandson of French crypto mogul Pierre Noizat were the victims of a botched kidnapping attempt in Paris earlier this week.
The trio were walking near Square de la Roquette in the French capital early Tuesday morning when a van bearing a Chronopost logo — something like the French UPS — pulled up next to them.
Three masked individuals then jumped out, and a brief struggle ensued as they attempted to drag the mother and son into the back of the van. The woman's husband intervened and was hit with "blunt objects," according to The Telegraph.
During the struggle, the woman appears to disarm one of the attackers and throw a handgun aside (it would later turn out to be an airsoft gun.) The would-be kidnappers fled in the vehicle, before abandoning it on a nearby street.
The victims were treated for minor injuries, according to the Telegraph.
https://twitter.com/coinpapercom/status/1922525731340329184
It's a horrifying attack, but unfortunately par for the course for the cryptocurrency industry. Criminals have been some of crypto's biggest adopters throughout its short history, drawn to the decentralized currency as a way to move huge sums of money quietly, without ever alerting a centralized bank or financial authorities.
Had the kidnappers succeeded, the ensuing ransom could have been virtually untraceable.
A longtime crypto magnate, Pierre Noizat is the co-founder of Paymium, one of the world's first cryptocurrency exchanges. Though his exact fortune isn't known, at the time of writing, his business processed over $132 million in Bitcoin in the last week alone — making him and his family an attractive target, to say the least.
While rich executives have long been targeted by criminals — there's literally a cottage industry called Kidnap, Ransom, and Extortion Insurance — crypto bigwigs and their associates are becoming prized trophies in violent crime circles.
In November of last year, Dean Skurka, CEO of crypto platform WonderFi, was nabbed off the streets of Toronto and held for a $1 million ransom. That same month, three teenagers kidnapped one of the executives behind Tokenize 2025, a Las Vegas-based crypto event, driving him out to the desert where they demanded his crypto passwords at gunpoint. Though the group has since been identified, they made out with an estimated $4 million worth of crypto and NFTs.
Similar incidents involving high-net-worth crypto traders have been reported in Pakistan, Spain, Australia, and Bali. Back in France, this is the fourth high-profile kidnapping case involving crypto whales recorded in recent months.
One particularly stunning incident involved David Balland, the co-founder of Ledger, along with his wife, who were abducted from their home back in January. The couple was freed following a massive raid by French national police, but not before Balland had his finger cut off and mailed to his co-founder as part of his kidnappers' $11.2 million ransom attempt.
On Wednesday, the French interior minister announced a meeting with high-value cryptocurrency magnates to "work with them on their security, and so that they can become aware of the risks."
Whether it will stymie the huge upswing in crypto kidnappings is anyone's guess. Financial analysts have found that more millionaires than ever are placing their fortunes on the blockchain — meaning crypto-conscious criminals are spoiled for choice.
More on Crypto: OnlyFans Star Amouranth Says She Was Robbed at Gunpoint for Her Crypto
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

America's wealthiest neighborhood is probably not where you'd expect it to be
America's wealthiest neighborhood is probably not where you'd expect it to be

New York Post

timea few seconds ago

  • New York Post

America's wealthiest neighborhood is probably not where you'd expect it to be

Move over, Beverly Hills – there's a new neighborhood taking the crown as America's most expensive. Gables Estates, a small gated community located in Coral Gables, Florida, has now taken Zillow's top spot for the United States' most expensive neighborhood, based on home value data over the last 12 months. Advertisement The neighborhood now tops Beverly Hills, California, long regarded as the pinnacle ZIP code of wealth. 'What makes Gables Estates unique is its privacy, sophistication, and livability, which Beverly Hills doesn't fully offer,' Coral Gables-based CEO and co-founder of Vertical Developments, Fernando de Nunez y Lugones, told Fox News Digital. 'Unlike Beverly Hills, which is known mostly for its name and history, Gables Estates is about the lifestyle and the experience, and that consistently draws ultra-high-net-worth buyers.' Seven of the 10 priciest neighborhoods are located in the Sunshine State, while the remaining three are in California. 'This is a long-term trend, not a blip,' Lugones said. 'I remember reading last year that Coral Gables actually beat Beverly Hills, and it makes sense. Buyers and businesses are relocating here for lifestyle, taxes and the overall environment. South Florida is increasingly becoming known as Wall Street South, and Coral Gables stands out for its walkability, amenities, and culture. Markets may fluctuate, but the appeal of space, security, and community remains strong.' Advertisement Zillow's home value index is 'designed to capture the value of a typical property across the nation or the neighborhood,' its website states, by using metrics such as sales transactions, tax assessments, public records, square footage, and location. 5 Gables Estates, a small gated community located in Coral Gables, Florida, has now taken Zillow's top spot for the United States' most expensive neighborhood, according to reports. LightRocket via Getty Images The greater Miami area has experienced an influx of wealth migrating in the post-COVID era. Between 2017 and 2022, more than $14 billion in income flocked to Florida, with more than $9.2 billion going to Palm Beach, Broward, and Miami-Dade counties. Advertisement Additionally, Henley & Partners World's Wealthiest Cities Report for 2025 found that both West Palm Beach and Miami surpassed New York City as the world's fastest-growing wealth hubs. West Palm saw a 112% increase in millionaire growth over the last decade, while Miami saw a 94% increase. Gables Estates is an exclusive waterfront community that features luxurious mansions, lush landscaping, and a canal system that connects directly to Biscayne Bay. The neighborhood began development in the 1920s, and now includes an estimated 160 to 180 properties. Advertisement 5 'What makes Gables Estates unique is its privacy, sophistication, and livability, which Beverly Hills doesn't fully offer,' Coral Gables-based CEO and co-founder of Vertical Developments, Fernando de Nunez y Lugones, said. Bloomberg via Getty Images 'We expect even more interest from ultra-luxury buyers looking to move to Coral Gables and the broader Miami area. As more buyers settle here, the neighborhood's reputation as a world-class enclave will only continue to grow,' Lugones noted. Its residents enjoy high-level security with 24/7 armed guards on land and water. Entry into the community means paying a $100,000 non-refundable application fee to the larger Gables Estates Club. Zillow notes that home listing prices often exceed $21 million. 'Coral Gables is naturally self-limiting since there's only so much prime land, which helps protect against overexposure,' Lugones pointed out. 'At the same time, its prestige and careful development standards allow it to handle national attention without compromising lifestyle or value. As long as growth remains measured, Coral Gables can sustain its momentum for decades.' 5 Gables Estates is an exclusive waterfront community that features luxurious mansions, lush landscaping, and a canal system that connects directly to Biscayne Bay, according to reports. Universal Images Group via Getty Images 5 Entry into the community means paying a $100,000 non-refundable application fee to the larger Gables Estates Club. Carlos Barrios America's top 10 most expensive and least expensive neighborhoods can be found below: Most expensive neighborhoods in the U.S.: Advertisement 1. Gables Estates, Coral Gables, FL 2. Port Royal, Naples, FL 3. Old Cutler Bay, Coral Gables, FL 4. Beverly Hills Gateway, Beverly Hills, CA Advertisement 5. The Flats, Beverly Hills, CA 5 'We expect even more interest from ultra-luxury buyers looking to move to Coral Gables and the broader Miami area. As more buyers settle here, the neighborhood's reputation as a world-class enclave will only continue to grow,' Lugones noted. REUTERS 6. Shady Canyon, Irvine, CA 7. San Marino Island, Miami Beach, FL Advertisement 8. Bear's Club, Jupiter, FL 9. Palm Island, Miami Beach, FL 10. Rivo Alto Island, Miami Beach, FL Advertisement On Zillow's list, the least expensive neighborhood is Bullard Hill in Jackson, Mississippi, with an average home value of $24,026. Other neighborhoods include two in Shreveport, Louisiana; three in Flint, Michigan; and three in Jackson, Mississippi.

How North Korea's IT army is hacking the global job market
How North Korea's IT army is hacking the global job market

Axios

timea few seconds ago

  • Axios

How North Korea's IT army is hacking the global job market

Nearly every Fortune 500 company is hiding the same uncomfortable secret: they have hired a North Korean IT worker. Why it matters: Despite how widespread the issue is, few companies are willing to talk publicly about it. Experts say reputational risk, legal uncertainty, and embarrassment all contribute to the silence — which in turn makes the problem harder to solve. Dozens of resumes, LinkedIn profiles, and fraudulent identity documents shared with Axios lay bare the scale and sophisticated of the scams. The big picture: For North Korea, this is a precious revenue stream that evades American sanctions — capitalizing on the wealth of high-paying remote worker roles in the U.S. to route cash back to Pyongyang. In the past two years, companies and their security partners have begun to grasp the scale of the problem — and now, they're sounding the alarm about where it's headed next. "They've been stealing intellectual property and then working on the projects themselves," Michael "Barni" Barnhart, principal investigator at DTEX Systems, told Axios. "They're going to use AI to magnify exponentially what they're already doing — and what they're doing now is bad." Between the lines: It sounds easy to simply weed out North Korean job applicants. But some of the world's biggest firms have found it devilishly difficult. That's because the North Korean operation has become as complex as a multi-national corporation. It involves several North Korean government offices, dozens of China-based front companies and Americans willing to facilitate the fraud. And the undercover North Korean IT workers are often exceptional at their jobs — at least until they start stealing sensitive data or extorting companies that try to fire them. Google Threat Intelligence VP Sandra Joyce recalled the response of one employer when told they likely had a North Korean fraudster on staff: "You guys better be right, because that is my best guy." The groups running the show North Korea has invested years into building up its remote IT labor force, providing training not just for remote job fraud but also corporate espionage and IP theft. Workers are selected and trained at elite institutions such as Kim Chaek University of Technology and the University of Sciences in Pyongsong — some with specializations in software development, AI or cryptography. Research from DTEX shows that the most advanced worker scams are often coordinated with units like APT 45, a notorious government hacking group known for infiltrating companies, running scams and laundering money. Other participants in the scheme include the Lazarus Group, which typically leads the regime's cryptocurrency hacks and has positioned insiders within crypto companies, and Research Center 227, a new AI research unit inside North Korea's intelligence agency. The intrigue: Cybersecurity companies have been discovering and naming new groups running these hacks, with names like Jasper Sleet, Moonstone Sleet and Famous Chollima. The scale Driving the news: Nine security officials who spoke with Axios all said they've yet to meet a Fortune 500 company that hasn't inadvertently hired a North Korean IT worker. Google told reporters at the RSA Conference in May that it had seen North Koreans applying to its jobs. SentinelOne and others have said the same. KnowBe4, a cybersecurity training company, admitted last year that it hired a North Korean IT worker. A smaller cryptocurrency startup told the WSJ that they accidentally had North Korean workers on their payroll for almost two years. In one case, Sam Rubin, senior vice president of Palo Alto Networks' Unit 42 consulting and threat intelligence team, told Axios that within 12 hours of a large client posting a new job, more than 90% of the applicants were suspected to be North Korean workers. "If you hire contract IT workers, this has probably happened to you," Rubin said. The intrigue: Even small-to-mid-sized companies that rely on remote IT talent or outsource their IT needs to a consulting firm have encountered this problem, Adam Meyers, senior vice president of counter adversary operations at CrowdStrike, said. CrowdStrike has investigated more than 320 incidents where North Korean operatives landed jobs as remote software developers, according to the company's annual threat hunting report published earlier this month. How it works Getting a job at a U.S. company — and going undetected — is a team effort that involves several North Korean IT workers, China-based companies and even a handful of Americans. Some of the North Korean workers are even stationed in China and other nearby countries to keep suspicions low. First, the workers identify potential identities they can assume. Those are often stolen from a real person, or even from a dead U.S. citizen. To pull off this deception, they create fake passwords, Social Security cards and utility bills. Many of them use the same recognizable tablecloth in the background of fake ID photos, Meyers said. For instance, in a December indictment of 14 North Koreans, the workers were found using stolen identities to apply to dozens of jobs. Second, the workers find open jobs in software development, technical support and DevOps posted on Upwork, Fiverr, LinkedIn, and third-party staffing platforms. Much of this is streamlined through AI tools that help track and manage their job applications. Many of them will use AI tools to help generate passable resumes and LinkedIn profiles, according to Trevor Hilligoss, senior vice president at SpyCloud Labs. "There's a hierarchy: There's a group of people who are the interviewers, and they're the ones with the really good English specialties," Hilligoss told Axios. "When they get hired, that gets turned over to somebody that's a developer." Those developers will often juggle several jobs and multiple different personas. Zoom in: Job interviews would seem like the obvious time to catch a fraudulent application. But the "applicants" — whether they're using their real faces and voices or AI-enabled personas — are practiced interviewers with the skills necessary to complete technical coding assignments. In multiple cases, hiring managers only realized something was wrong weeks later when employees looked or behaved differently than during the interview, Barnhart said. After landing the job, the developers step in and request that their company laptop be shipped to a U.S. address — often citing a last-minute move or family emergency. That address often belongs to an American accomplice, who typically operates what's known as a "laptop farm." These facilitators are told to install specific remote desktop software onto the laptops so the North Korean worker can operate the laptop from abroad. In July, the FBI said it executed searchers of 21 premises across 14 states that were known or suspected laptop farms, seizing 137 laptops. Then there's the challenge of ensuring the salaries actually reach the North Korean regime. That often requires the facilitators forward the paychecks to front companies across China or funnel it through cryptocurrency exchanges. In a report published in May, researchers at Strider Technologies identified 35 China-based companies linked to helping North Korean operations. Challenges Hiring processes are so siloed that it's difficult for managers to see all the signs of fraud until the North Korean workers start their roles, Kern said. Even if a company suspects something is wrong, the forensic signals can be subtle and scattered. Security teams may detect unusual remote access tools or strange browser behavior. HR might notice recycled references or resumes that reuse the same phone number. But unless those insights are pooled together, it rarely raises alarms. "There's not one giant red flag to point to," said Sarah Kern, a leading North Korea analyst at Sophos' Counter Threat Unit. "It is multiple technical forensic aspects and then such a human aspect of small things to pick up on that aren't necessarily going to be in telemetry data from an endpoint detection standpoint." Yes, but: Even when these workers are detected, they're not easy to fire. Many of them are so talented that managers are reluctant to even believe they could actually be in North Korea, Alexandra Rose, director at Sophos' Counter Threat Unit, told Axios. If these workers are caught, employers then face a litany of problems: Some workers will download sensitive internal data and extort the companies for a hefty sum in a last-ditch effort to bleed the company of whatever money they can. Some workers have filed legal complaints, including workers' compensation claims, Barnhart said. In one case, Barnhart said he had a worker try to claim domestic violence protections as they were being fired just to buy time. "There is a lot of focus on companies that cybersecurity shouldn't just be for the CISO," Rose said. "You want a bit of that security feel throughout the company, and this is the kind of case that really demonstrates why that is." The bottom line: Some companies also hesitate to report these incidents, fearing they could be penalized for unknowingly violating U.S. sanctions — even though law enforcement officials have said they're more interested in cooperation than prosecution. What's next Right now, the operations are predominantly focused on making money for North Korea's regime. Threat level: But the hacking groups involved are evolving into something more sophisticated and dangerous — including by potentially building their own AI models and feeding in sensitive U.S. company data. That's a particular concern in the defense sector. Barnhart says his teams have seen North Korean IT workers increasingly studying information about AI technologies, drone manufacturing and other defense contract work. What to watch: As U.S. companies become more alert, North Korean IT workers are shifting their focus abroad as they seek employment at other companies and set up laptop farms throughout Europe — suggesting the operation is only just now ramping up, instead of slowing down.

Number of Shares and Voting Rights of ADOCIA as of July 31 st, 2025
Number of Shares and Voting Rights of ADOCIA as of July 31 st, 2025

Business Wire

timea few seconds ago

  • Business Wire

Number of Shares and Voting Rights of ADOCIA as of July 31 st, 2025

LYON, France--(BUSINESS WIRE)--Regulatory News: Pursuant to the provisions of article L. 233-8 II of the French 'Code de Commerce' and article 223-16 of the General Regulation of the French stock-market authorities (Autorité des Marchés Financiers, or 'AMF'), ADOCIA SA (Paris:ADOC), a French société anonyme (corporation), 115, avenue Lacassagne, 69003 Lyon, (Euronext Paris: FR0011184241 – ADOC) a clinical-stage biopharmaceutical Company focused on the research and development of innovative therapeutic solutions for the treatment of diabetes and obesity, releases its total number of outstanding shares as well as its voting rights as of July 31 st, 2025. (1) The total number of theoretical voting rights is used as the basis for calculating the crossing of shareholding thresholds. In accordance with Article 223-11 of the AMF General Regulation, this number is calculated on the basis of all shares to which voting rights are attached, including shares whose voting rights have been suspended. (2) The total number of exercisable voting rights is calculated without taking into account the shares with suspended voting rights, in this case, shares held by the Company in the context of a liquidity agreement. It is provided for the information of the public, in accordance with the AMF recommendation of July 17, 2007. About Adocia Adocia is a biotechnology company specializing in the discovery and development of therapeutic solutions in the field of metabolic diseases, primarily diabetes and obesity. The Company has a broad portfolio of drug candidates based on four proprietary technology platforms: 1) The BioChaperone ® technology for the development of new generation insulins and products combining different hormones; 2) AdOral ®, an oral peptide delivery technology; 3) AdoShell ®, an immunoprotective biomaterial for cell transplantation, with an initial application in pancreatic cells transplantation; and 4) AdoGel ®, a long-acting drug delivery platform. Adocia holds more than 25 patent families. Based in Lyon, the company has about 80 employees. Adocia is listed on the regulated market of Euronext™ Paris (Euronext: ADOC; ISIN: FR0011184241).

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store