Sunday, December 22, 2024
12 C
Los Angeles

FATF Monitoring: Countries Addressing Strategic Deficiencies

Jurisdictions under Increased Monitoring by the FATF Countries...

Former Peruvian President Alejandro Toledo Sentenced to 20+ Years in Odebrecht Bribery Scandal

Former Peruvian President Alejandro Toledo has been...

Ex-Mexican Security Chief Sentenced for Bribery and Aiding Sinaloa Cartel’s Drug Trafficking

Genaro Garcia Luna, Mexico's former Secretary of...

HSI Arizona investigation leads to takedown of cryptocurrency mixer that processed over $3 billion in unlawful transactions

CryptoHSI Arizona investigation leads to takedown of cryptocurrency mixer that processed over $3 billion in unlawful transactions

PHOENIX — On March 15, Homeland Security Investigations (HSI) and other law enforcement agencies participated in the coordinated, large-scale international takedown of ChipMixer, a darknet cryptocurrency “mixing” service. ChipMixer was responsible for laundering more than $3 billion in cryptocurrency between 2017 and the present involving ransomware, darknet marketplaces, fraud, cryptocurrency heists and other hacking schemes.

The operation involved court-authorized seizures of two internet domains directing users to ChipMixer and one Github account, as well as the German Federal Criminal Police’s seizure of the ChipMixer back-end servers and more than $46 million in cryptocurrency.

“Together, with our international partners at HSI The Hague, we are firmly committed to identifying and investigating cybercriminals who pose a serious threat to our economic security by laundering billions of dollars’ worth of cryptocurrency under the misguided anonymity of the darknet,” said HSI Arizona Special Agent in Charge Scott Brown. “HSI Arizona could not be prouder to work alongside every agent involved in this complex international case. We thank all our domestic and international partners for their support.”

Coinciding with the ChipMixer takedown efforts, Minh Quốc Nguyễn, 49, of Hanoi, Vietnam, was charged today in Philadelphia with money laundering, operating an unlicensed money transmitting business and identity theft connected to ChipMixer’s operation.

“This morning, working with partners at home and abroad, the Department of Justice disabled a prolific cryptocurrency mixer, which has fueled ransomware attacks, state-sponsored crypto-heists and darknet purchases across the globe,” said Deputy Attorney General Lisa Monaco. “Today’s coordinated operation reinforces our consistent message: We will use all of our authorities to protect victims and take the fight to our adversaries. Cybercrime seeks to exploit boundaries, but the Department of Justice’s network of alliances transcends borders and enables disruption of the criminal activity that jeopardizes our global cybersecurity.”

“Today’s announcement demonstrates the FBI’s commitment to dismantling technical infrastructure that enables cyber criminals and nation-state actors to illegally launder cryptocurrency funds,” said FBI Deputy Director Paul Abbate. “We will not allow cybercriminals to hide behind keyboards nor evade the consequences of their illegal actions. Countering cybercrime requires the ultimate level of collaboration between and among all law enforcement partners. The FBI will continue to elevate those partnerships and leverage all available tools to identify, apprehend and hold accountable these bad actors and put an end to their illicit activity.”

According to court documents, ChipMixer — one of the most widely used mixers to launder criminally-derived funds — allowed customers to deposit bitcoin, which ChipMixer then mixed with other ChipMixer users’ bitcoin, commingling the funds in a way that made it difficult for law enforcement and regulators to trace the transactions. ChipMixer offered numerous features to enhance its criminal customers’ anonymity. The service had a clearnet web domain but operated primarily as a Tor hidden service, concealing the operating location of its servers to prevent seizure by law enforcement. ChipMixer serviced many customers in the United States but did not register with the U.S. Department of the Treasury’s Financial Crimes Enforcement Network or collect identifying information about its customers.

As alleged in the complaint, ChipMixer attracted a significant criminal clientele and became indispensable in obfuscating and laundering funds from multiple criminal schemes. Between August 2017 and March 2023, ChipMixer processed:

$17 million in bitcoin for criminals connected to approximately 37 ransomware strains, including Sodinokibi, Mamba and Suncrypt
Over $700 million in bitcoin associated with wallets designated as stolen funds, including those related to heists by North Korean cyber actors from Axie Infinity’s Ronin Bridge and Harmony’s Horizon Bridge in 2022 and 2020, respectively
More than $200 million in bitcoin associated either directly or through intermediaries with darknet markets, including more than $60 million in bitcoin processed on behalf of customers of Hydra Market, the largest and longest running darknet market in the world until its April 2022 shutdown by U.S. and German law enforcement
More than $35 million in bitcoin associated either directly or through intermediaries with “fraud shops,” which criminals use to buy and sell stolen credit cards, hacked account credentials and data stolen through network intrusions
Bitcoin used by the Russian General Staff Main Intelligence Directorate, 85th Main Special Service Center, military unit 26165 aka APT 28 to purchase infrastructure for the Drovorub malware, which was first disclosed in a joint cybersecurity advisory released by the FBI and National Security Agency in August 2020

Beginning in or around August 2017, as alleged in the complaint, Nguyễn created and operated the online infrastructure ChipMixer used and promoted its services online. Nguyễn registered domain names, procured hosting services and paid for the services used to run ChipMixer through identity theft, pseudonyms and anonymous email providers. In online posts, Nguyễn publicly derided efforts to curtail money laundering, posting in reference to anti-money laundering (AML) and know-your-customer (KYC) legal requirements that “AML/KYC is a sellout to the banks and governments,” advising customers, “Please do not use AML/KYC exchanges.” He also explained how to use ChipMixer to evade reporting requirements.

“ChipMixer facilitated the laundering of cryptocurrency, specifically bitcoin, on a vast international scale, abetting nefarious actors and criminals of all kinds in evading detection,” said U.S. Attorney for the Eastern District of Pennsylvania Jacqueline C. Romero. “Platforms like ChipMixer, which are designed to conceal the sources and destinations of staggering amounts of criminal proceeds, undermine the public’s confidence in cryptocurrencies and blockchain technology. We thank all our partners at home and abroad for their hard work in this case. Together, we cannot and will not allow criminals’ exploitation of technology to threaten our national and economic security.”

“Criminals have long sought to launder the proceeds of their illegal activity through various means,” said FBI Philadelphia Special Agent in Charge Jacqueline Maguire. “Technology has changed the game, though, with a site like ChipMixer and facilitator like Nguyễn enabling bad actors to do so on a grand scale with ease. In response, the FBI continues to evolve in the ways we ‘follow the money’ of illegal enterprise, employing all the tools and techniques at our disposal and drawing on our strong partnerships at home and around the globe. As a result, there’s now one less option for criminals worldwide to launder their dirty money.”

Nguyễn is charged with operating an unlicensed money transmitting business, money laundering and identity theft. If convicted, he faces a maximum penalty of 40 years in prison.

HSI Arizona, HSI The Hague and the FBI investigated the case.

The U.S. Attorney’s Office for the Eastern District of Pennsylvania is prosecuting the case.

German law enforcement authorities took separate actions today under their own authorities. The FBI’s legal attaché in Germany, the HSI office in The Hague, the HSI Cyber Crimes Center, the Justice Department’s Office of International Affairs and National Cryptocurrency Enforcement Team, Europol, the Polish Cyber Police and Zurich State Police assisted with this case.

A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

HSI is the principal investigative arm of the U.S. Department of Homeland Security (DHS), responsible for investigating transnational crime and threats, specifically those criminal organizations that exploit the global infrastructure through which international trade, travel, and finance move. HSI’s workforce of more than 8,700 employees consists of more than 6,000 special agents assigned to 237 cities throughout the United States, and 93 overseas locations in 56 countries. HSI’s international presence represents DHS’s largest investigative law enforcement presence abroad and one of the largest international footprints in U.S. law enforcement.

Story from www.ice.gov

Disclaimer: The views expressed in this article are independent views solely of the author(s) expressed in their private capacity.

Check out our other content

Ad


Check out other tags:

Most Popular Articles