logo
Malaysian court drops money laundering charges against jailed ex-PM Najib Razak

Malaysian court drops money laundering charges against jailed ex-PM Najib Razak

KUALA LUMPUR: A Malaysian court dropped three money laundering charges against jailed former Prime Minister Najib Razak on Friday, in a case linked to the multibillion-dollar looting of a state fund.
Najib was previously convicted in a graft case tied to the 1Malaysia Development Berhad state fund, or 1MBD, and began serving time in 2022, after losing his final appeal. He also faces other graft trials.
The High Court's decision to drop the charges alleging Najib received 27 million ringgit ($6.3 million) in illegal proceeds to his bank accounts came after procedural delays by the prosecution, which saw the case dragging on for six years, Najib's lawyer Muhammad Shafee Abdullah said. Prosecutors could not give the court a timeline for when they will be ready for the trial, he added.
Prosecutors reserve the right to revive charges against Najib and a discharge does not mean an acquittal, Shafee said. But, Najib was happy and can now focus on the main 1MDB trial, he added.
Najib set up 1MDB shortly after taking power in 2009. Investigators allege that more than $4.5 billion was stolen from the fund and laundered by his associates to finance Hollywood films and extravagant purchases. The scandal upended Najib's government and he was defeated in the 2018 election.
Last November, the High Court also discharged Najib and the former treasury chief in another 1MDB-linked corruption case after repeated delays by the prosecution. The pair can still be charged for the same offence in the future. In 2023, Najib was acquitted on separate charges of tampering with a government audit into 1MDB.
Najib was sentenced to 12 years in jail in his first graft trial but the sentence was halved by the Pardon Boards in 2024. Najib alleged the board had issued a home arrest order for him to complete his sentence at home, but the case is still being heard in court.
Najib awaits his verdict in another key case that ties him directly to the 1MDB scandal, which has prompted investigations in the US and several other countries.
The defense in May closed their case on four charges of abuse of power to obtain over $700 million from 1MDB that went into Najib's bank accounts, and 21 counts of money laundering involving the same amount. Closing arguments are scheduled in October, after which the court will set a date for verdict.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Pro-Israel hackers nab $90 million from Iranian crypto exchange - then burn it all in symbolic blockchain move
Pro-Israel hackers nab $90 million from Iranian crypto exchange - then burn it all in symbolic blockchain move

Time of India

time2 hours ago

  • Time of India

Pro-Israel hackers nab $90 million from Iranian crypto exchange - then burn it all in symbolic blockchain move

An Israeli operatives-linked hacking group known as Predatory Sparrow , also known as Gonjeshke Darande , claimed that it stole over $90 million from Iran's largest crypto exchange, Nobitex , only to destroy the money instead of keeping it, so as to send a political message, as per a report. Israeli-Linked Hackers Strike Iranian Crypto Exchange The attack comes at a time of heightened tensions between Iran and Israel, and the hackers made their motives clear as the group posted on social media platform X, 'These cyberattacks are the result of Nobitex being a key regime tool for financing terrorism and violating sanctions,' quoted Fortune. Hackers didn't keep a single cent Crypto analytics firm Elliptic revealed that instead of cashing out the $90 million of Bitcoin, Dogecoin, and over 100 different cryptocurrencies that Predatory Sparrow raided, the hacking group chose just to destroy, 'burn' in crypto parlance, the funds, as they wanted to send a political message, according to the report. ALSO READ: Circle stock soars again as Senate passes groundbreaking Stablecoin Bill, analysts say it's still a Buy Why the Hack Was Meant to Send a Message As per Fortune, the blockchain addresses, or locations in a database that record how much money someone has, are usually randomly generated, which usually consist of a garbled string of numbers and letters. However, for this operation, Predatory Sparrow sent the hacked funds to addresses that included the phrase 'F***iRGCTerrorists,' where IRGC refers to the Islamic Revolutionary Guard Corps , a branch of the Iranian army, reported Fortune. Live Events The lead crypto threat researcher at Elliptic, Arda Akartuna, explained that 'To generate addresses with so many specific terms inside it would require so much computing power that you're not going to do it within any reasonable lifetime,' as quoted in the report. Akartuna pointed out that, 'So, it seems to have been more of a symbolic hack, as opposed to one where the intention is financial,' quoted Fortune. Nobitex responds While, Nobitex wrote on its X account after the hack, saying, 'The vast majority of assets are stored in cold wallets and were not impacted,' as quoted in the report. FAQs Who carried out the hack on Nobitex? A group called Predatory Sparrow, believed to be linked to Israeli intelligence, claimed responsibility. What did the hackers do with the money? They destroyed it as they 'burned' the funds, instead of profiting from the theft. Economic Times WhatsApp channel )

Union slams T.N. govt. decision to move Supreme Court on career advancement scheme for guest lecturers
Union slams T.N. govt. decision to move Supreme Court on career advancement scheme for guest lecturers

The Hindu

time3 hours ago

  • The Hindu

Union slams T.N. govt. decision to move Supreme Court on career advancement scheme for guest lecturers

The Association of University Teachers (AUT) has expressed concern over the actions by the Directorate of Collegiate Education on the implementation of the Career Advancement Scheme (CAS) for faculty of aided colleges. In an official release, AUT general secretary K. Raja said: 'On one hand, the Commissioner of Collegiate Education issued a letter on June 9, instructing all Regional Joint Directors to urgently submit updated CAS-related data of eligible teachers by June 10. This communication clearly signalled the Government's affirmative intention to proceed with the long-overdue CAS promotions with monetary benefits, offering hope and justice to thousands of eligible teachers in aided colleges. 'Surprisingly, in a completely contradictory move, a communication dated June 16 addressed to A. Muraliraj, assistant professor of Mathematics, Urumu Dhanalakshmi College, Tiruchi, reveals that the government has chosen to challenge a favourable High Court judgment in the Supreme Court by filing a Special Leave Petition (SLP) with a motive to deny CAS monetary benefits due to the teachers. This action directly undermines the rightful claims of teachers, seeking career progression and represents a serious breach of trust.' The association demanded immediate withdrawal of the SLP and urged the authorities to honour the High Court verdict. 'The Career Advancement Scheme is a statutory right, not a privilege. Any attempt to delay or deny this right adversely affects the morale, dignity, and academic integrity of the teaching community,' the release said.

China-Russia trust erodes as Beijing's hackers go rogue, launch cyberattacks to steal Ukraine war secrets
China-Russia trust erodes as Beijing's hackers go rogue, launch cyberattacks to steal Ukraine war secrets

Time of India

time3 hours ago

  • Time of India

China-Russia trust erodes as Beijing's hackers go rogue, launch cyberattacks to steal Ukraine war secrets

China hackers target Russia despite alliance, seeking war secrets and battlefield data- China hackers targeting Russia have raised serious concerns as multiple cyberattacks linked to Chinese state-sponsored groups have reportedly breached Russian military and defense systems since the Ukraine war began. Despite public declarations of friendship between Moscow and Beijing, cyber analysts say the Chinese government has been actively spying on Russian technologies, including nuclear submarines, drone systems, and battlefield tactics. The breach highlights a growing undercurrent of distrust and strategic intelligence gathering even among so-called allies. Cyber groups tied to Beijing—like APT27 and APT31—are believed to be behind these stealthy operations, using phishing emails and malware to infiltrate sensitive Russian networks. Why are China hackers targeting Russia amid growing friendship? Despite a publicly strong relationship between China and Russia, cybersecurity experts say China hackers have been quietly breaching Russian systems since May 2022 — just months after Russia launched its full-scale invasion of Ukraine. These hacking attempts have continued steadily, with Chinese-linked groups digging into Russia's defense and military data. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Air conditioners without external unit. (click to see prices) Air Condition | Search Ads Search Now Undo According to cybersecurity researchers from TeamT5, one group named Sanyo impersonated a Russian engineering firm's email to seek data on nuclear submarines. The intention behind these cyber intrusions appears to be collecting information about Russia's battlefield operations, modern warfare tactics, and Western weapon technologies seen in Ukraine. Che Chang, a TeamT5 researcher, stated, 'China likely seeks to gather intelligence on Russia's military operations, defense progress, and geopolitical strategies.' This information could help China boost its own military readiness for future conflicts — particularly in regions like Taiwan, which remains a hotbed of geopolitical tension. Live Events What exactly did China's hackers target in Russia? According to cybersecurity researchers at SentinelLabs and Recorded Future, Chinese Advanced Persistent Threat (APT) groups , including APT27 (Emissary Panda) and APT31 (Zirconium) , have been aggressively targeting: Russian military contractors Government departments involved in defense R&D Email servers and document archives linked to Ukraine war planning The hackers reportedly used spear-phishing campaigns , spoofing Russian Ministry of Health notices to plant malware into classified internal systems. One malware strain, called PlugX , known for remote access and data exfiltration, was flagged in these Russian environments—previously used by China in espionage campaigns across Southeast Asia and the Middle East. What kind of information are Chinese hackers after in Russia? The China hackers targeting Russia campaign has been aimed at extracting sensitive military intelligence, especially battlefield-tested insights. Russian defense firms, including Rostec , were among the major targets. Cyber experts from Palo Alto Networks revealed that Chinese hacking groups have sought data on radar systems, satellite communications, drone warfare, and electronic warfare technology. Another method used by these hackers involved Microsoft Word-based malware files, which exploited software vulnerabilities to breach aviation and defense sectors. One particularly dangerous tool spotted in these attacks was Deed RAT , malware considered 'proprietary' among Chinese state-sponsored groups. According to Russian cybersecurity firm Positive Technologies, this malware has been used to attack Russian aerospace, security, and military sectors. Though Russian authorities have not officially acknowledged these attacks, a leaked classified document from Russia's FSB — the domestic security agency — described China as an 'enemy,' confirming internal concerns about Chinese espionage. While China and Russia continue to cooperate publicly, including military drills and joint diplomatic efforts, cyber experts say Beijing has long pursued a "friend-but-watcher" strategy . This means China often spies on both allies and adversaries to: Gauge battlefield conditions in Ukraine Evaluate Russia's military capabilities and vulnerabilities Shape its own geopolitical strategies, including Taiwan preparations According to Recorded Future, China increased cyber-espionage targeting Russia by 87% since early 2023 , focusing particularly on regions near Ukraine and Crimea . Who are the major Chinese hacking groups involved? Several well-known Chinese hacking groups have been identified by cybersecurity teams as being behind these operations. Mustang Panda , one of China's most active state-backed cyber espionage groups, expanded its activities after the war in Ukraine began. TeamT5 and Sophos researchers found that Mustang Panda targeted Russian government agencies and military officials — particularly near the China-Russia Siberian border. According to Rafe Pilling from Sophos, the group's operations often follow China's political or economic interests. 'Wherever China invests — whether West Africa, Southeast Asia, or Russia — Mustang Panda follows with targeted hacking,' said Pilling. He and U.S. intelligence sources believe Mustang Panda operates under the Chinese Ministry of State Security. The group even drew attention from American law enforcement. In January, the U.S. Justice Department indicted individuals tied to Mustang Panda for infecting thousands of systems worldwide, including government networks and devices used by Chinese dissidents. Another Chinese hacking group, Slime19 , has been consistently attacking Russia's energy, government, and defense infrastructure, according to TeamT5's Chang. Has China broken its cybersecurity pact with Russia? In 2009 and 2015, China and Russia publicly agreed not to hack each other's systems. However, analysts have long viewed those agreements as symbolic, lacking enforcement or trust. The evidence emerging since Russia's invasion of Ukraine proves that those deals hold little practical weight. The FSB document accessed by The New York Times shows that Russian intelligence views China's digital espionage as a serious threat. China, while outwardly cooperative with Russia in forums and bilateral trade, appears unwilling to rely on Moscow for open sharing of battlefield learnings. Instead, cyber intrusions have become the preferred route for collecting war data. 'The war in Ukraine shifted the priorities of both countries,' said Itay Cohen from Palo Alto Networks. 'Even though the public narrative was one of close ties, in reality, espionage increased.' How is Russia reacting to these cyber intrusions? Thus far, the Kremlin has not officially condemned China, possibly to avoid diplomatic fallout. However, anonymous Russian cybersecurity sources have told investigative outlet iStories that internal firewalls have been tightened and communications protocols are under review. The Federal Security Service (FSB) reportedly issued an internal memo warning of 'unusual East Asian-origin threats' in mid-2024. Still, no public attribution has been made. This silence may signal Russia's reluctance to publicly challenge China at a time when it faces intense pressure from NATO and the West. What does this mean for future China-Russia relations? While China remains one of Russia's most crucial trade partners — especially with the West largely isolating Moscow — the depth of China hackers targeting Russia reveals a fragile foundation beneath this alliance. The relationship, often described by Presidents Xi and Putin as a 'no-limits' partnership, is evidently full of limits when it comes to trust. China's hunger for military intelligence, especially regarding real-time warfare experience, is pushing it to take bold steps. For China, Russia's war offers a rare, real-world military case study that it can't afford to ignore — especially with tensions rising in the Taiwan Strait. Cyber intrusions are likely to continue, if not grow. As Russian officials stay silent and Chinese hackers grow more sophisticated, the digital battlefield between these two "allies" is already active — and evolving quickly. FAQs: Q1: Why are China hackers targeting Russia during the Ukraine war? To secretly collect Russian military intelligence and battlefield data. Q2: Who is Mustang Panda in the China hacking campaign? Mustang Panda is a top Chinese state-backed hacking group targeting Russia.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store