Mexico’s Amero-Isatek has announced that it will open its first physical cryptocurrency exchange in Nuevo León, Monterrey on June 21. There are also plans to expand to seven additional locations across the country, including Queretáro, Sinaloa, Quintana Roo, Jalisco, South Lower California, and Yucatán.
The company expects to serve 800,000 cryptocurrency users in Central Mexico. The exchange will trade in Amero, Amero-Isatek’s own crypto asset.
Alfonso Jiménez, CEO of Amero-Isatek, added that the company wants to comply with the Bank of Mexico (Banxico) and international regulations, and plans to acquire two licensed Estonian crypto exchanges.
“Whatever happens with the FinTech Law in Mexico, under Banxico’s dispositions, we’ll be able to operate legally worldwide with a financial base from Estonia,” Jiménez said, according to Coindesk.
In other news, John McAfee announced that he will launch his own currency, the McAfee Freedom Coin, this fall.
“The McAfee Freedom Coin is designed to confront the problem of exchange head-on… It is not based on any commodity nor is it connected to the value or behavior of any external item or entity. The value of the coin will always be zero in relation to any other currency yet it’s natural market value is free, completely, to grow,” McAfee wrote.
And cybersecurity firm Guardicore Labs has revealed that hackers have breached over 50,000 global servers with a crypto mining software.
The breach – called the “Nansh0u campaign” – had been spreading to over 700 new victims a day since February, targeting firms in the healthcare, telecoms, media and IT sectors.
“The Nansh0u campaign is not a typical crypto-miner attack. It uses techniques often seen in APTs [advanced persistent threats] such as fake certificates and privilege escalation exploits. While advanced attack tools have normally been the property of highly skilled adversaries, this campaign shows that these tools can now easily fall into the hands of less than top-notch attackers,” Guardicore Labs wrote, according to Coindesk.
Once notified, the hosting provider took down the attack servers and revoked the rootkit certificate.