gtag('config', 'G-0PFHD683JR');
Crypto News

Myanmar Junta’s social media for social media to defraud encryption

The infiltrators are likely to control the official X of the leader of the Military Council in Myanmar on Saturday, who are enlarged to promote a fraudulent encrypted currency.

This incident can be part of the increasing direction as fraudsters take advantage of high -level political figures to add credibility to the distinctive symbols and deception of reassuring investors.

Another political fraud is targeting the government of Myanmar now

On February 22, the Twitter account that belongs to the leader of the Military Council in Myanmar, Min Aung Hulang, began spreading the so -called national cryptocurrency launch.

The participants described her as “Myanmar I National Crystate”, in an attempt to present it as an official digital origin.

Promotion of the Meeting Military Council Commander of the Mimi coin.
Promotion of the Meeting Military Council Commander of the Mimi coin. source: x/min aung hlaing

Note X encryption users quickly violations. The infiltrators initially shared the addresses of multiple encrypted currency wallets before deleting them.

Soon after, they claimed that the launch was postponed and presented a new portfolio address, which raised more doubts.

“This account was hacked from the Myanmar government. Several CAS dropped and deleted, in addition to announcing an area and then deleted after 3 minutes,” one of the users books On x.

Meanwhile, market observers wondered whether the army -led government could successfully launch an encrypted currency. They pointed out that such an initiative contradicts the principles of decentralization.

One of the users indicated that the state -backed digital assets are often a financial control tool rather than innovation. The analyst also speculated that the countries subject to economic sanctions may explore the cryptocurrency as a way to overcome traditional financial systems.

“Signs of Transformation: More countries that explore the state -backed encryption to avoid sanctions and rapid dependence on geopolitics, it is a test if they are working, and they are expected to follow more isolated systems for innovation but related to sovereignty in exchange for maintaining the financial portal,” CEDRIC Bo I mentioned.

Meanwhile, this attack on the leader of the Myanmar Military Council follows a wider pattern of electronic threats targeting political figures.

Earlier this month, the President of the Central African Republic, Faustin-Artada Tawaraira, presented an official Mimi currency called the car. The distinctive symbol was supposed to highlight the country’s confidence in Blockchain technology.

Although this initiative was legitimate, infiltrators used tactics similar to the deception of users by linking government officials to the form of a fake code.

Just a few days ago, the fraudsters committed suicide in the Kingdom of Saudi Arabia to strengthen a fraudulent encrypted currency.

In another case, the unknown infiltrators took over X’s novel to former Malaysian Prime Minister Mahathir Mohamed to push a fake Mimi currency.

These incidents reveal a disturbing pattern of infiltrators who kidnap social media accounts of political figures to enhance the fraudulent currency plans. By exploiting their identities, fraudsters create a false sense of legitimacy of fake symbols.

Since this fraud becomes more common, users should stay awake and check the sources before engaging with any symbolic promotional offers related to general numbers.

Disintegration

In adherence to the confidence project guidance, beincrypto is committed to unprepared and transparent reporting. This news article aims to provide accurate information in time. However, readers are advised to independently verify facts and consult with a professional before making any decisions based on this content. Please note that the terms, conditions, privacy policy have been updated and the evacuation of responsibility.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button