The post Man pleads guilty in a $263 million stolen crypto laundering appeared on BitcoinEthereumNews.com. A man in California has pleaded guilty to laundering crypto tied to a national social engineering group that stole roughly 4,100 BTC. The 22-year-old man, Evan Tangeman, admitted to participating in a Racketeer Influenced and Corrupt Organization in a plea deal before U.S. District Court Judge Colleen Kollar-Kotelly.  According to the prosecutors in the case, the stolen crypto, 4,100 BTC, was worth approximately $263 million at the time of the theft and has since increased in value to roughly $368.5 million. The federal prosecutors revealed that Tangeman laundered approximately $3.5 million on behalf of the organization. Tangeman used false identities to acquire rental properties for the members of the social engineering group.  Tangeman becomes the ninth defendant to enter a guilty plea Evan Tangeman is the ninth defendant to plead guilty in the investigation into the crypto laundering scheme, which has so far revealed a network of hackers, target identifiers, and residential burglars operating since October 2023. The court filings revealed that the scheme originated as a small group of acquaintances on an online gaming platform, which evolved into a coordinated criminal network operating across California, New York, Florida, Connecticut, and other locations outside America.  According to court documents, the hackers utilized a stolen database to target victims with substantial cryptocurrency holdings. The organization then used callers to contact the identified victims directly by luring them into giving compromising information about their accounts. The prosecutors stated that callers told victims their accounts had been compromised and that they needed to take immediate action to safeguard their assets. The scheme relied heavily on social engineering tricks rather than sophisticated technical exploits.  The hackers were also allegedly involved with a group of individuals who planned and made physical break-ins to target hardware wallets. The residential burglars targeted victims who store digital wallets or… The post Man pleads guilty in a $263 million stolen crypto laundering appeared on BitcoinEthereumNews.com. A man in California has pleaded guilty to laundering crypto tied to a national social engineering group that stole roughly 4,100 BTC. The 22-year-old man, Evan Tangeman, admitted to participating in a Racketeer Influenced and Corrupt Organization in a plea deal before U.S. District Court Judge Colleen Kollar-Kotelly.  According to the prosecutors in the case, the stolen crypto, 4,100 BTC, was worth approximately $263 million at the time of the theft and has since increased in value to roughly $368.5 million. The federal prosecutors revealed that Tangeman laundered approximately $3.5 million on behalf of the organization. Tangeman used false identities to acquire rental properties for the members of the social engineering group.  Tangeman becomes the ninth defendant to enter a guilty plea Evan Tangeman is the ninth defendant to plead guilty in the investigation into the crypto laundering scheme, which has so far revealed a network of hackers, target identifiers, and residential burglars operating since October 2023. The court filings revealed that the scheme originated as a small group of acquaintances on an online gaming platform, which evolved into a coordinated criminal network operating across California, New York, Florida, Connecticut, and other locations outside America.  According to court documents, the hackers utilized a stolen database to target victims with substantial cryptocurrency holdings. The organization then used callers to contact the identified victims directly by luring them into giving compromising information about their accounts. The prosecutors stated that callers told victims their accounts had been compromised and that they needed to take immediate action to safeguard their assets. The scheme relied heavily on social engineering tricks rather than sophisticated technical exploits.  The hackers were also allegedly involved with a group of individuals who planned and made physical break-ins to target hardware wallets. The residential burglars targeted victims who store digital wallets or…

Man pleads guilty in a $263 million stolen crypto laundering

2025/12/09 17:54

A man in California has pleaded guilty to laundering crypto tied to a national social engineering group that stole roughly 4,100 BTC. The 22-year-old man, Evan Tangeman, admitted to participating in a Racketeer Influenced and Corrupt Organization in a plea deal before U.S. District Court Judge Colleen Kollar-Kotelly. 

According to the prosecutors in the case, the stolen crypto, 4,100 BTC, was worth approximately $263 million at the time of the theft and has since increased in value to roughly $368.5 million. The federal prosecutors revealed that Tangeman laundered approximately $3.5 million on behalf of the organization. Tangeman used false identities to acquire rental properties for the members of the social engineering group. 

Tangeman becomes the ninth defendant to enter a guilty plea

Evan Tangeman is the ninth defendant to plead guilty in the investigation into the crypto laundering scheme, which has so far revealed a network of hackers, target identifiers, and residential burglars operating since October 2023. The court filings revealed that the scheme originated as a small group of acquaintances on an online gaming platform, which evolved into a coordinated criminal network operating across California, New York, Florida, Connecticut, and other locations outside America. 

According to court documents, the hackers utilized a stolen database to target victims with substantial cryptocurrency holdings. The organization then used callers to contact the identified victims directly by luring them into giving compromising information about their accounts. The prosecutors stated that callers told victims their accounts had been compromised and that they needed to take immediate action to safeguard their assets. The scheme relied heavily on social engineering tricks rather than sophisticated technical exploits. 

The hackers were also allegedly involved with a group of individuals who planned and made physical break-ins to target hardware wallets. The residential burglars targeted victims who store digital wallets or seed phrases in their homes. 

The group’s stolen proceeds have been linked to several expenditures, including nightclub services, luxury handbags, watches, rental properties, private jet rentals, and private security guards. The purchases were distributed across multiple states and internationally to conceal their identity.

Tangeman used a bulk cash converter to convert crypto into cash, which he used to secure rental homes for the group. He used a false name on the lease documents, preventing property owners and authorities from identifying the true occupants. 

The Court unseals a second superseding indictment 

Three additional defenders, including Nicholas Dellecave, Mustafa Ibrahim, and Danish Zulfiqar, have been arrested and charged after Tangeman’s plea deal. The court unsealed the second superseding indictment charging the three additional defendants with participation in the social engineering enterprise. The U.S. government Department of Justice revealed that the case is part of a broad effort to target crypto-related fraud operations that rely on social engineering rather than technical hacking methods. 

Prosecutors have revealed that the hacker group has newly unsealed charges that were not previously included in the trial dates for the newly identified defendants. The court filings revealed that the stolen cryptocurrency transactions, rental agreements, communication logs, and bulk cash conversion activity were used to trace the identities of the defendants. 

So far, Tangeman remains free pending sentencing on April 24, 2026. However, the range of penalties he may face under the federal sentencing guidelines for RICO conspiracy and money laundering is yet to be determined. The Justice Department also revealed that the additional defendants may be charged as the investigation continues. The court has also not revealed whether it has recovered the stolen BTC or any part of it, and whether restitution will be sought as part of the sentencing.

Claim your free seat in an exclusive crypto trading community – limited to 1,000 members.

Source: https://www.cryptopolitan.com/263-million-crypto-laundering/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

BFX Presale Raises $7.5M as Solana Holds $243 and Avalanche Eyes $1B Treasury — Best Cryptos to Buy in 2025

BFX Presale Raises $7.5M as Solana Holds $243 and Avalanche Eyes $1B Treasury — Best Cryptos to Buy in 2025

BFX presale hits $7.5M with tokens at $0.024 and 30% bonus code BLOCK30, while Solana holds $243 and Avalanche builds a $1B treasury to attract institutions.
Share
Blockchainreporter2025/09/18 01:07
OCC Findings Suggest Major U.S. Banks Restricted Access for Digital Asset Firms Amid Debanking Probe

OCC Findings Suggest Major U.S. Banks Restricted Access for Digital Asset Firms Amid Debanking Probe

The post OCC Findings Suggest Major U.S. Banks Restricted Access for Digital Asset Firms Amid Debanking Probe appeared on BitcoinEthereumNews.com. The Office of the Comptroller of the Currency (OCC) has confirmed that nine major U.S. banks engaged in debanking practices from 2020 to 2023, restricting access for digital asset firms and other sectors. This marks the first official acknowledgment of these policies, which limited services based on customer types, affecting crypto businesses significantly. OCC report highlights inappropriate distinctions by banks like JPMorgan Chase and Bank of America, targeting crypto and high-risk sectors. Nine banks reviewed showed similar policies restricting customer access without objective risk assessments. Impacted industries include digital asset firms, with potential referrals to the Attorney General for unlawful practices. Discover how major U.S. banks’ debanking policies hit crypto firms hard, per OCC’s 2025 report. Learn the implications for digital assets and what regulators are doing next—stay informed on banking risks today! What Are the OCC’s Findings on Banks Debanking Crypto Firms? Banks debanking crypto firms involves major financial institutions limiting or denying services to digital asset businesses based on perceived risks, as detailed in a recent Office of the Comptroller of the Currency (OCC) report. From 2020 to 2023, nine of the largest U.S. banks implemented policies that required escalated reviews or outright restrictions for certain customers, including those in the crypto sector. This practice, now publicly confirmed, underscores ongoing tensions between traditional banking and emerging digital asset industries. How Did These Debanking Practices Affect Digital Asset Companies? The OCC’s six-page report, released on Wednesday, revealed that institutions such as JPMorgan Chase, Bank of America, Citigroup, Wells Fargo, U.S. Bancorp, Capital One, PNC Financial Services Group, Toronto-Dominion Bank, and Bank of Montreal made distinctions among customers that were deemed inappropriate. For digital asset firms, this meant heightened scrutiny or complete denial of banking services, hindering operations in an already volatile market. The regulator noted that these policies spanned…
Share
BitcoinEthereumNews2025/12/11 11:01