🚀 CloudSEK has raised $19M Series B1 Round – Powering the Future of Predictive Cybersecurity
Back
Adversary Intelligence
Table of Content

Executive Summary

CloudSEK researchers have identified ZHGUI Cryptocurrency Ltd. as a coordinated mirror exchange and TRC20-based fraud ecosystem targeting Southeast Asian retail investors, with a strong focus on Malaysia’s Mandarin-speaking population and overseas Chinese users

While ZHGUI markets itself as a U.S.-registered, fully compliant digital-asset exchange and cites a self-submitted FinCEN MSB registration, technical evidence contradicts this narrative. Infrastructure analysis reveals a constellation of cloned domains with identical UIs, Cloudflare-fronted delivery, AWS-backed management consoles, Udesk-style verification endpoints, and a public whitepaper authored using Chinese-language WPS software in China Standard Time, which collectively indicate a China-aligned operation hidden behind U.S. regulatory theatre.

Victim acquisition follows a social-engineering and grooming-driven playbook, primarily executed through WhatsApp investment groups and finance-themed social communities. Operators posing as “investment mentors” guide users through onboarding, KYC-style data collection, and small “test deposits” that appear profitable on fabricated dashboards. Once trust is established and larger deposits are made, withdrawals are blocked under the guise of tax reviews, compliance checks, or system errors. Public reporting from Malaysian media and community testimonies confirms multi-million ringgit losses, while OSINT on chat groups and admin accounts links this activity to a structured recruitment network operating at scale across the region.

On-chain analysis of TRON addresses associated with the ZHGUI ecosystem, including an internal “RazorPay Wallet on ZHGUI Exchange”, shows large USDT (TRC20) inflows and systematic onward transfers to intermediate “ZHGUI Wallet – R” routing addresses, internal “CHAIN” wallets, and multiple deposit addresses at major centralised exchanges such as Binance, OKX, HTX, KuCoin, and Bybit. This pattern demonstrates a mature laundering pipeline: aggregation of suspected victim funds, internal layering, and off-ramping through exchange infrastructure. In light of these findings, CloudSEK assesses ZHGUI as an ongoing cross-border financial-fraud threat and recommends platform-level disruption, financial-sector alerts, CEX reporting, continuous domain and wallet monitoring, and coordinated law-enforcement engagement. CloudSEK’s threat intelligence systems are actively tracking emerging domains, social infrastructure, and wallet activity associated with ZHGUI to support early detection and regulatory action.

About ZHGUI

ZHGUI is a fraudulent online investment ecosystem masquerading as a global cryptocurrency exchange. While it presents itself as a fully licensed digital-asset trading platform with international regulatory compliance, technical and OSINT evidence shows that ZHGUI functions as a mirror-exchange scam network designed to steal user funds and personal identity information.

The operation utilises multiple cloned domains, invitation-only onboarding, fabricated trading dashboards, and social media recruitment funnels to deceive victims into depositing money while displaying fake profits. It also exploits a self-submitted U.S. FinCEN MSB registration entry - a listing that is not government-verified nor proof of legitimacy — to create a false perception of regulatory authorisation.

ZHGUI’s infrastructure, support channels, and whitepaper metadata indicate China-based operational ties. At the same time, victim reports and group-chat evidence confirm active targeting of investors in Malaysia and broader Southeast Asia, particularly Mandarin-speaking communities. The platform’s primary objective is to simulate legitimate crypto trading, block withdrawals, harvest personal/KYC data, and disappear funds, positioning ZHGUI as an organised transnational financial fraud network rather than a genuine exchange.

ZHGUI Fraud Ecosystem: Technical & Operational Summary

1. Resilient Mirror Infrastructure: Deploys 10+ cloned domains (e.g., zhguihc.com, zhguize.com) behind Cloudflare CDNs and AWS-hosted backend sockets to simulate a robust US exchange while masking origin IPs.

2. Exploited Regulatory Loopholes: Leverages a self-submitted, unverified FinCEN MSB registration (No. 31000270792163) to manufacture "compliance" without actual government oversight or background checks.

3. Digital Fingerprints of Origin: Whitepaper metadata exposes the operation's true China-based nexus, containing "WPS Presentation" software tags and creation timestamps aligned with China Standard Time (+08:00).

4. Real-Time Deception Engine: Fake trading dashboards utilise WebSocket (socket.io) connections on subdomains like rtqs.zhguiwe.com to push simulated market data and create the illusion of live liquidity.

5. Automated Laundering Pipeline: Launders victim funds via TRON (TRC20) using labelled "RazorPay" aggregation wallets (e.g., TETzN...) that route assets through internal relays before off-ramping to Binance and OKX.

6. Weaponised Support Portals: Embeds Udesk customer service integrations (e.g., udesk.zhgui.com) to harvest sensitive PII and KYC documents under the guise of identity verification.

7. Mobile Ecosystem Infiltration: Bypassed Apple’s app review process to publish a fraudulent trading app, "ZHGUI GE" (ID: 6747241718), expanding the attack vector beyond web browsers.

8. Social Engineering Funnels: Orchestrates victim acquisition via "pig-butchering" scripts in closed WhatsApp/Telegram groups, targeting Mandarin speakers in Southeast Asia with fake "investment mentors".

9. SEO & Reputation Manipulation: Executes a "reputation laundering" campaign using paid press releases on financial sites (e.g., TechBullion) to saturate search results with fabricated narratives of institutional legitimacy.

10. "Tax Review" Kill Switch: Scripts the final theft phase by blocking withdrawals under a fake "tax review" status, while backend management consoles (52.77.125.17) continue to track victim deposits.

Detailed Technical Analysis

Domain & IP Infrastructure

A cluster of 10+ domains was identified, all reflecting identical or nearly identical front-end structures, visual assets, and back-end script calls. These domains are active mirrors of each other and appear to redirect or replicate the scam login and investment pages.

IOC Table
S No. IP Address Domain Registrar
1 188.114.96.3 zhguihc.com Amazon Registrar, Inc.
2 172.67.191.67 zhguize.com Amazon Registrar, Inc.
3 104.21.84.186 zhgui.com Amazon Registrar, Inc.
4 172.67.145.192 zhguiro.com Amazon Registrar, Inc.
5 18.164.237.46 zhguiwd.com Amazon Registrar, Inc.
6 18.164.246.64 zhguiyv.com Amazon Registrar, Inc.
7 18.66.63.105 zhguitn.com Amazon Registrar, Inc.
8 104.21.48.1 zhguivx.com Amazon Registrar, Inc.
9 18.164.246.111 zhguimj.com Amazon Registrar, Inc.
10 188.114.96.3 zhguioe.com Amazon Registrar, Inc.
11 104.21.84.95 zhguiqt.com Amazon Registrar, Inc.
12 172.67.149.149 zhguisp.com Amazon Registrar, Inc.
13 - zhguicx.com Amazon Registrar, Inc.

All of the above domains serve identical login portals designed to collect user credentials, crypto wallet information, and KYC verification details. The use of Cloudflare CDN IPs suggests an attempt to obfuscate real hosting origins, while some AWS IPs indicate backend management and socket communication servers.

OSINT Research

Additional mirror sites identified through favicon hash correlation :

##Hash Value: 1ca2e500f792fdce9128e8f26fd0a5c10b3f06f1047ce5217e5789db9b33681b##

  • https://www.knightkron.com
  • https://www.sydmonet.com

Both domains replicate identical ZHGUI interfaces, further confirming the reuse of template-based infrastructure.

Backend IPs & Management Consoles

Two non-Cloudflare IPs were discovered serving as internal management consoles, potentially used by operators for backend access or administrative control:

  1. https://52.77.125.17/home/login – Presents an internal “Management Console” login page with the same favicon as ZHGUI sites.
  2. https://udesk.zhgui.com/ - Exposes an end-user login page with Chinese-language error messages and the same JavaScript resources.
  3. https://52.74.11.35/ – Exposes an end-user login page with Chinese-language error messages and the same JavaScript resources.

These IPs likely represent the core servers used for backend database access and credential collection.

Socket & Real-Time Communication Servers

  1. rtqs.zhguiwe.com (18.66.112.81)
  2. rtqs.zhguibn.com (18.244.18.3)

The above subdomains were identified as hosting WebSocket services likely used to update “fake trading dashboards” in real time, simulating active cryptocurrency transactions to create an illusion of authenticity for victims.

Udesk Integration – Suspicious SIM Verification Portal

A highly suspicious URL was found embedded within the site’s JavaScript file:

##URL: https://1884145.s5.udesk.cn/im_client/?web_plugin_id=350&language=en-us&im_user_key=66666##

Further investigation revealed a connected endpoint:

##URL: https://1884145.udeskglobal.com/sim##

A SIM verification login page, possibly used as a fake verification or communication support portal.

This suggests the scam operators might be leveraging Udesk-like cloned support pages to harvest user identity or KYC data under the pretence of customer service verification.

Direct Communication Attempt

As part of controlled testing, an investigative email was sent to support@zhgui.org.

In response, the sender received an invitation code required for account creation on the ZHGUI exchange portal, confirming the active nature of the support system and validating that operational infrastructure remains online despite ongoing domain takedowns. This establishes that,

  • The support channel is monitored.
  • The ZHGUI backend systems (registration and onboarding) are operational.
  • The domain is used for social engineering and account activation workflows.
Response from support@zhgui.org: Providing Account Invitation Code

Crypto Transaction Investigation

On-Chain Transaction Analysis – ZHGUI “RazorPay Wallet” (TRON)

As part of the investigation, on-chain analysis was performed on the TRON address TETzNbCvMYs4Ki6Jh3g8YiXFjQoyyMYba9, internally labelled as “RazorPay Wallet on ZHGUI Exchange”. This wallet functions as an internal aggregation and routing hub for USDT (TRC-20) flows associated with ZHGUI’s merchant-style payment layer.

Role of the RazorPay Wallet (TETzNbCvMYs4Ki6Jh3g8YiXFjQoyyMYba9)

  • The wallet receives large inbound USDT transfers from multiple centralised exchange hot wallets and addresses, including labels such as Binance, HTX, KuCoin, and other exchange-tagged wallets (e.g., TEYe9k... – Binance, TFTWNg... – HTX Hot Wallet, TK4ykR... – Binance Hot Wallet, TUpHuDk... – KuCoin Hot Wallet, etc.).
  • These inbound transactions are typically in high-value denominations (for example: 3,202 USDT, 1,999 USDT, 6,171.43 USDT, 998 USDT, 1,299 USDT, 8,543.69 USDT, 3,190.62 USDT, 1,198.5 USDT, 358.1 USDT, etc.), indicating that this wallet is used as a funds collection/treasury node rather than a normal retail user wallet.
  • From TETzNbCvMYs4Ki6Jh3g8YiXFjQoyyMYba9, funds are repeatedly forwarded to the address TNKCBRt7o4iFCRR75KmTbupqU7qgYjWqnc, labelled “ZHGUI Wallet – R”, which behaves as the next-stage internal routing wallet inside the ZHGUI ecosystem.

ZHGUI Wallet – R (TNKCBRt7o4iFCRR75KmTbupqU7qgYjWqnc) and Downstream Laundering Pattern

  • The ZHGUI Wallet – R (TNKCBRt7o4iFCRR75KmTbupqU7qgYjWqnc) exhibits a clear fan-out pattern: it sends TRX and USDT to multiple destinations, including:
    • Internal chain wallets (e.g., TNuhwiX31DLxVgabMn52Ft36EGoUKyyHXx, labelled simply as “CHAIN”), with large USDT amounts such as 27,481.73 USDT, 50,000 USDT, and 30,000 USDT.
    • Multiple exchange deposit addresses, such as:
      • Binance deposit addresses (TAcmFE..., TMyhbR..., TMwKeH..., TRuKV8..., TJvsam... etc.) with recurring deposits in the range of 10–4,501 USDT and several large top-ups (e.g., 1,450 USDT, 2,500 USDT, 2,000 USDT, 4,501 USDT, 1,502 USDT, etc.).
      • OKX, HTX, Bybit and other CEX deposit addresses (TX2SVZ..., TFEADt..., TVeGvAQ..., TUgcc6...), including sizable payments such as 1,500 USDT, 500 USDT, 939 USDT, 214 USDT, 100 USDT, etc.

  • The same ZHGUI Wallet – R also sends repeated TRX dust amounts (e.g., 5–150 TRX) to an address labelled “CHAIN – 2” (TUGhQrS7vJDk5fWhZgoW4SYdv6GTH4u7XW). These are consistent with:
    • Gas provisioning (ensuring downstream wallets have TRX for network fees), or
    • Operational micro-payments are linked to another internal routing layer.

Observed Behaviour and Fraud/Laundering Indicators

  • The chain shows a structured pipeline:
    CEX Hot Wallets → RazorPay Wallet on ZHGUI (TETzN…) → ZHGUI Wallet – R (TNKCBR…) → CHAIN wallets / CEX deposit addresses
  • Inbound funds from exchanges into TETzN... likely represent:
    • Replenishment of internal liquidity used to credit victim dashboards, or
    • Recycling of prior victim-sourced funds returning from off-chain conversion/consolidation.
  • Outbound flows from TNKCBR... into multiple CEX deposit addresses and “CHAIN” wallets, in high-value, rounded amounts, are consistent with:
    • Consolidation and off-ramping of proceeds through centralised exchanges (Binance, OKX, HTX, KuCoin, Bybit), and Further internal layering, using intermediate “CHAIN” wallets to break direct links between victim wallets and final cash-out points.
  • The repeated pattern of receiving from one internal label and sending to another labelled exchange/chain address over several months (June–November 2025) strongly supports the view that these wallets are part of a purpose-built laundering infrastructure, not normal trading activity.

Snapshot of transaction nodes

Assessment

The on-chain flows centred on TETzNbCvMYs4Ki6Jh3g8YiXFjQoyyMYba9 and TNKCBRt7o4iFCRR75KmTbupqU7qgYjWqnc demonstrate that ZHGUI maintains a dedicated TRON-based treasury and laundering pipeline, which:

  • Aggregates funds (likely from victim deposits and internal conversions) into a RazorPay-labelled wallet,
  • Routes them through an internal relay (ZHGUI Wallet – R),
  • Then disperses them across multiple centralised exchange deposit addresses and chain wallets in sizable USDT batches.

This behaviour is fully aligned with professional scam and money-laundering operations, characterised by structured layering, controlled aggregation, and systematic off-ramping through major exchanges. These addresses should be treated as high-risk / suspected fraud wallets and added to the IOC set for monitoring, blocking, and exchange-based investigation/escalation.

Discovery of Falsified MSB Registration

During the analysis of artefacts and documents related to the ZHGUI ecosystem, investigators recovered a white paper referencing an official Money Services Business (MSB) registration. Upon verification through the Financial Crimes Enforcement Network (FinCEN) public MSB registry, a registration entry was indeed found, registered on October 22, 2025, under the entity name ZHGUI Cryptocurrency Ltd.

However, a detailed examination of the transcript and associated notes from FinCEN’s website revealed that the listing is self-submitted, unverified and explicitly warns that inclusion on the registry does not imply authenticity or government approval.

The entity details are as follows:

##MSB Registration Number: 31000270792163

Registration Type: Initial Registration

Legal Name: ZHGUI Cryptocurrency Ltd

Street Address: 950 17th St, Denver, COLORADO, 80202

Authorised Signature Date: 04/30/2024

Received Date: 04/30/2024

MSB Activities: 

Dealer in foreign exchange, Issuer of money orders, Money transmitter, Seller of money orders

States of Activities: All U.S. States and Territories

Number of Branches: 0##

This information has been strategically used to deceive users into believing ZHGUI is a legitimate, U.S.-regulated cryptocurrency exchange.

The registration, while present in the FinCEN database, was not verified or endorsed by the agency, aligning with the pattern of fraudulent legitimacy often used in crypto scam networks.

##NOTE: FinCEN explicitly states that registration data is “self-reported” and may include false or misleading claims used in scams.##

##URL: https://msb.fincen.gov/msb.registration.letter.php?ID=28612373##

Falsified MSB Registration Entry for ZHGUI Cryptocurrency Ltd on FinCEN Registry (Self-Submitted)

Whitepaper Metadata Analysis

A document titled “ZHGUI-Whitepaper-EN.pdf”, available publicly at their website, was analysed for embedded metadata using the exiftool utility.

##URL: https://doc.zhgui.com/ZHGUI-Whitepaper-EN.pdf##

##File Size: 8.9 MB

Page Count: 24

PDF Version: 1.7

Create Date: 2025:06:19 16:18:31+08:00

Modify Date: 2025:06:19 16:18:31+08:00

Creator: WPS 演示

File Modification Date/Time: 2025:10:22 15:19:40+05:30##

  • The file was created using WPS 演示, which translates to “WPS Presentation” - a Chinese-language version of WPS Office.
  • The creation timezone (+08:00) aligns with China Standard Time, indicating probable origin within Mainland China.
  • No identifiable author, title, or corporate metadata were embedded, consistent with manual export behaviour from non-corporate tools.

Modus Operandi - ZHGUI/Mirror-app Crypto Scam Network

Operational stages (step-by-step)

  1. Targeting & Recruitment
  • Actors seed closed and public social channels (WhatsApp groups, Telegram, LinkedIn, X, Facebook ads/posts) with promotional materials, bogus success stories, and paid PR to build credibility.
  • Initial contact commonly originates in messaging groups; victims are convinced to join an “investment opportunity” and given a registration link (e.g., zhgui*.com / zhguiqz.com). WikiFX documents exactly this WhatsApp group recruitment and large loss pattern.
  1. Onboarding & Trust-Building
    • Victims directed to polished login/registration portals (many mirror domains). Sites show fake trading UIs, dashboards, and “proof” such as a whitepaper and a claimed MSB registration.
    • Automated invite codes and monitored support email addresses (support@zhgui.org) enable rapid onboarding and give the illusion of responsiveness.
    • Operators push fake initial profits on the dashboard to encourage larger deposits and continued engagement.
  2. Credential & PII Harvest
    • Login portals collect user credentials and wallet keys; registration flows request KYC details (passport/ID scans, phone numbers).
    • Cloned/embedded “support verification” (Udesk-style) endpoints are used to request SIM verification or additional PII under the pretext of compliance — these cloned pages harvest verification codes and identity data.
    • Whitepaper and file metadata (WPS 演示 + +08:00 timestamp) point to authoring/export from Chinese toolchain — useful operational clue for attribution and vetting.
  3. Deposit Flow & Fake Profit Simulation
    • Victims are instructed to deposit funds via UPI, bank transfers, or cryptocurrency (commonly USDT).
    • Deposited balances are reflected immediately on the fake trading dashboard, with artificially inflated “profit” metrics shown to reinforce trust and motivate additional deposits.
    • Any attempt to withdraw is delayed or blocked with excuses such as “account review,” “tax issues,” or “minimum balance requirements,” ensuring continued victim engagement while preventing actual payout.
  4. Cashboard System / TRON–USDT Layering
    • Once victim funds enter the system, operators route deposits through multiple TRON (TRC-20) USDT wallets to obscure the cash flow.
    • Funds are split into smaller transactions and moved across chains or through sequences of newly created wallets to break traceability.
    • Automated scripts appear to handle wallet hopping and distribution, using low TRON fees to maximise obfuscation.
    • Final cash-outs occur through centralised exchanges (often using stolen KYC identities), OTC brokers, or crypto-to-cash mules.
    • This step is now confirmed as part of the operation’s laundering pipeline.

Other Attributions

Victim Reports

Further investigation uncovered multiple verified victim cases and public reporting linking significant financial losses to the ZHGUI platform in Southeast Asia. The earliest documented case, published by China Press Malaysia on 16 October 2025, details a Malaysian investor who lost approximately 340,000 MYR (~USD 70,000) after being lured into the ZHGUI platform via online investment channels. The victim was recruited through a financial-discussion community and guided to register on the platform under the belief it was a genuine, compliant cryptocurrency exchange.

##Source: https://perak.chinapress.com.my/20251016/又是虚拟币投资圈套-华男3个月没了34万!/##

A second major case surfaced shortly after via regional financial-fraud reporting, documenting losses of approximately 3,000,000 MYR (~USD 630,000). In this instance, the victim was introduced to ZHGUI through WhatsApp investment groups, where individuals posing as financial mentors provided trade “signals,” fake performance screenshots, and personalised guidance to escalate deposits. This aligns with ZHGUI’s social-engineering strategy focused on high-touch grooming, staged profit dashboards, and trust-based onboarding funnels.

##Source: https://www.wikifx.me/en/newsdetail/202510231334676397.html##

IOS Application

Technical validation also confirmed a ZHGUI-branded iOS application (“ZHGUI GE”) previously published on the Apple App Store. Though the app has since been removed, its existence demonstrates the actors’ effort to reinforce legitimacy and broaden distribution channels beyond web infrastructure.

##App Store: https://apps.apple.com/us/app/zhguige/id6747241718##

The combination of confirmed monetary losses, active WhatsApp-based recruitment networks, documented operator phone numbers, and historical mobile-app deployment strengthens the assessment that ZHGUI operates as a coordinated, multi-channel financial fraud network leveraging deception, fake legitimacy signals, and social-engineering tactics to target Mandarin-speaking investors across Southeast Asia.

Public Promotional Activities & False Legitimacy Campaign

During the investigation, CloudSEK identified a large network of news articles, blog posts, PR distributions, and paid media placements designed to artificially portray ZHGUI as a trusted, licensed, and globally recognised cryptocurrency exchange. These publications consistently promote ZHGUI using scripted narratives, exaggerated trust claims, and references to self-submitted regulatory documents such as the FinCEN MSB registration

The content across these platforms follows a uniform pattern:

  • Emphasising ZHGUI’s “global strategy”, “regulatory maturity”, “institutional-grade infrastructure”, and “Web3.0 innovation”.
  • Claiming U.S. MSB compliance as proof of legitimacy, despite the registration being self-submitted, unverified, and explicitly non-endorsement-based.
  • Highlighting fictional “founding teams,” “security frameworks,” and “asset-protection layers” that cannot be validated through corporate or technical evidence.

Many of these articles are published on press-release distribution platforms, syndication networks, and low-editorial-review financial blogs, indicating a structured legitimacy laundering campaign intended to improve search-engine presence, mislead potential investors, and mask fraudulent behaviour under corporate-style storytelling.

Identified Promotional Articles / Syndicated PR Links

The following publications were identified as part of the ZHGUI promotional network:

Media Coverage Table

Counter-Evidence & Community Warnings

Amid these promotional narratives, community-driven platforms have published warnings identifying ZHGUI as a scam:

This negative commentary directly contradicts the claims made in the promotional articles and aligns with confirmed victim losses and technical evidence uncovered in our investigation.

These promotional articles were designed to legitimise the ZHGUI brand, frequently referencing the following details:

##Entity: ZHGUI Cryptocurrency Ltd

Contact Person: Irfan Saiful

Email: support@zhgui.org

Website: https://www.zhgui.org

Registered Address: Colorado, USA##

Analysis of publication patterns and metadata suggests that these articles were likely sponsored press releases distributed through automated PR networks, intended to increase visibility and credibility within search engines and social media.

Social Media Presence

The threat actors maintain multiple social media profiles masquerading as legitimate representatives of “ZHGUI Exchange”.

Facebook:

  • Official ( https://www.facebook.com/ZHGUI.Official )– English version with crypto posts
  • China Page ( https://www.facebook.com/ZHGUI.Global/ ) – Mandarin-language counterpart

X (formerly Twitter):

  • Official ( https://x.com/ZHGUI_ ) - Active promotion of Web3 initiatives
  • China ( https://x.com/ZHGUI_global ) - Mandarin version, mirrors English posts

Telegram:

  • @Azure_AI_Future_Wealth818 – Dead username, but connected bot found: https://t.me/lease_choobot 
  • The bot likely served as an automated channel for fake investment updates or onboarding victims to “Wealth AI” programs.

WhatsApp

Multiple WhatsApp investment communities were identified as core recruitment hubs used to funnel victims into the platform. These groups promoted ZHGUI through curated trading narratives, fabricated success stories, and invitation-code access. OSINT review and victim-submitted screenshots revealed several Malaysia-based phone numbers associated with group administrators and onboarding handlers:

##Source: https://www.facebook.com/share/p/1KCg4dA3k9/##

WhatsApp group operators linked to ZHGUI activity:

Social Media Table
Phone Number Name on Social Media Groups Social Media Handle
+601170205120 Brandon -
+601169993517 Group admin -
+601168541864 Henry Tay -
+601160636072 Vivi Telegram
+601164337281 Group admin @Henry_Tay1 – Telegram
+601168583994 Group admin -

Additionally, a U.S.-based number was identified in public victim comments, cited as a fake ZHGUI customer support line allegedly operating from Denver:

##ZHGUI customer support: +1 (303) 435-1617##

These WhatsApp funnels were observed operating in names such as A317 Strategy Intelligent Investment and Wealth Guide, and encouraging victims to use invite-only registration links while showing staged “profits” to encourage further deposits.

Online Mentions & Public Awareness

  1. Investment Blog Discussion

##URL: https://klse.i3investor.com/web/blog/detail/ZHGUIscam/2025-07-25-story-h499657939-ZHGUI_Exchange_Reminder_Beware_of_On_Chain_Data_Forgery_Traps_and_Stay_A##

A community blog post explicitly labels ZHGUI as a crypto scam, warning users of “On-Chain Data Forgery” and fake yield platforms.

  1. LinkedIn Promotion Post (Likely Fraudulent)

##URL: https://www.linkedin.com/posts/ivanblinde_web3-defi-innovation-activity-7337856604559634432-IjRC##

A post by “Ivan Blinde” titled “Pioneering the Web3.0 Frontier: How ZHGUI Exchange is Leading the Charge” attempts to build credibility by presenting ZHGUI as a legitimate DeFi innovation platform. The language is promotional, AI-generated, and includes unrelated links to personal pages — an apparent attempt to boost the SEO presence of the scam.

The individual “Ivan Blinde”, who shared and promoted ZHGUI-related content, was found to have a U.S.-based phone number linked to their LinkedIn account:

  • Phone Number: +1 (630) 770-4878
  • Status: Active on WhatsApp and Telegram

This number’s activity across multiple messaging platforms suggests it may be used for direct communication or promotional coordination tied to the ZHGUI project.

Conclusion

  1. ZHGUI is a Coordinated Fraud Ecosystem
    Evidence confirms ZHGUI is not a legitimate exchange but a structured scam operation combining fake crypto-trading dashboards, misleading regulatory claims, and invitation-based onboarding to deceive investors.

  2. Well-Engineered False Legitimacy Framework
    The project uses self-submitted MSB registration, professional UI/UX, published whitepaper, Apple App Store presence, and active social media profiles to create a false perception of compliance and trustworthiness.

  3. Large-Scale Financial Damage Verified
    Multiple verified Malaysian media reports and victim testimonies show substantial losses — including cases of ~340,000 MYR and ~3,000,000 MYR, confirming significant financial impact and a wide victim base.

  4. Sophisticated Social-Engineering Funnel
    ZHGUI primarily recruits victims through WhatsApp “investment strategy” groups and social-media financial communities, leveraging scams disguised as mentorship, VIP investment signals, and exclusive access programs.

  5. Local & International Scam Network Participation
    Malaysia-based WhatsApp admins and operators, along with a reported U.S. support number, illustrate a blend of local facilitators and offshore operational coordinators, pointing to a multinational fraud structure.

  6. Technical Indicators Suggest China-Based Operation
    PDF metadata (WPS 演示), +08:00 time zone, Chinese language resources, and infrastructure patterns strongly align with PRC-linked scam methodologies and toolchains.

  7. Scalable, Resilient Infrastructure
    ZHGUI maintains multiple mirror domains, Cloudflare masking, AWS backend hosting, WebSocket trade simulation services, and Udesk-style OTP/KYC capture portals — enabling rapid evasion, continuity, and victim churn.

  8. High Risk to SEA Mandarin-Speaking Investors
    Targeting behaviour shows a specific focus on Mandarin-speaking investors in Malaysia, though infrastructure and promotion strategies indicate the capability to attack broader Asian and global audiences.

Appendix

Snapshot of Their Complete Tier-1 Transaction 

Reference

Irshad Ahamed
Regional Security Consultant - SEA
Akash Kannan
Research, Pwn & Math
Harsh Parashar

Related Blogs