US imposes sanctions against administrator of closed darknet market Nemesis

5 March 2025 2 minutes Author: Newsman

The US Treasury Department has imposed sanctions on Behrouz Parsarad, who is accused of running the Nemesis darknet marketplace, which was used to sell drugs, fake documents and cybercrime services. This comes a year after the platform was taken down in an international special operation.

According to the US Treasury Department, Parsarad had full control over Nemesis, including its cryptocurrency wallets. The platform was operational since 2021 and had more than 150,000 users before it was shut down in 2024. About 20% of the sellers were based in Germany.

Nemesis was used to sell:

  • Fentanyl and synthetic opioids – $30 million in sales over three years
  • Compromised data and fake documents
  • Cybercrime services – including DDoS attacks, phishing and ransomware

According to the investigation, after the liquidation of Nemesis, Parsarad tried to create a new darknet site, attracting former sellers. The US also froze 49 cryptocurrency addresses that were used for money laundering via the blockchain.

The destruction of Nemesis is part of a global campaign to eliminate darknet markets. In recent years, law enforcement agencies have uncovered such criminal platforms as Genesis, Hydra, Sipultie, Bohemia, Empire, xDedic, Kingdom, Piilopuoti, etc. This is the first time that the Office of Foreign Assets Control (OFAC) of the US Treasury Department has imposed sanctions under the Joint Criminal Opioid and Darknet Enforcement Team program, which is led by the FBI.

Governments of various countries are stepping up the fight against darknet markets, as they are used not only for drug trafficking, but also for cybercrime. The elimination of Nemesis is part of a broader strategy aimed at minimizing criminals’ access to illegal marketplaces and limiting the financing of cybercriminal groups.

Other related articles
News
Read more
Qilin hackers attacked Houston Symphony and stole over 300 GB of data
Qilin attacked the Houston Symphony Orchestra and stole over 300 GB of financial and personal data. The hackers threatened to release the documents on March 5 if the organization did not agree to negotiations. Qilin has previously attacked medical and industrial organizations in the US and Europe. Experts advise to strengthen security to prevent similar attacks.
63
News
Read more
Zero-Day in BigAnt Server allows attackers to execute malicious code via file upload
The zero-day vulnerability CVE-2025-0364 in BigAnt Server allows unauthenticated attacks using SaaS registration and PHP file upload. The vulnerability allows attackers to gain NT AUTHORITY\SYSTEM privileges via Cloud Drive. BigAntSoft has not released a fix, so it is recommended to block SaaS registration and monitor the activity of PHP processes.
64
News
Read more
Eleven11bot botnet attacks telecom companies and gaming platforms
A large-scale botnet consisting of hacked security cameras and DVRs is attacking telecommunications companies and gaming platforms. Researchers have identified over 1,000 active IP addresses, most of which originate from Iran. The DDoS attacks are carried out using brute force via Telnet and SSH, and the main targets are devices with built-in passwords.
68
Found an error?
If you find an error, take a screenshot and send it to the bot.