Canadian Crypto Exchange Shuts Down to Protect Customers

In Vancouver, Canada, another cryptocurrency exchange has closed down. This is not the first Canadian based Exchange to encounter problems, with some users losing everything last year when another exchange lost access to private keys.

This came when Quadriga, Canada’s biggest exchange was unable to gain access to over 145 million USD of Bitcoin and other digital assets. Following the death of CEO Gerald Cotten.

This time, Einstein Exchange has been forced to close after multiple customer complaints detailing access problems to assets as worrying normality. 

The British Columbia Securities Commission (BCSC) has been the body that decided the closure was necessary. Customer worries over asset management and potential money laundering within the company led to this decision. 

It was reported that an employee of Einstein came forward with claims of concern that the exchange had been involved with illegal activities and that they should be stopped. 

The BCSC went on to say that all Canadians should be cautious when buying or selling crypto assets. Not one exchange has been authorized in the province and customers must be aware of the risks involved. 

Following Einstein, a second exchange ezBtc is under pressure, with it also receiving complaints and customer dissatisfaction surrounding asset management and access. 

The BCSC again gave advice, claiming users should hire lawyers to ensure they can retrieve their digital assets. 

With regular claims about asset access, Canada’s crypto exchanges continue to face huge problems. 

Image via Shutterstock

US Government Creates Cyber Fraud Task Force to Put an End to Crypto Crime

The US Secret Service is hoping to put an end to the increasing money-laundering cases that have erupted with the rise of COVID-19, by creating a special division, dubbed the Cyber Fraud Task Force (CFTF). 

COVID-19 and its New Wave of Cybercrime 

With COVID-19 disrupting the economy worldwide, cybercriminals have been capitalizing on the chaos created by the pandemic in order to conduct their fraudulent activities. The number of ongoing illicit activities — from finance-related thefts to private data being sold illegally on the dark web — has certainly increased, with technology being increasingly pervasive.  

US Secret Service Presents CFTF

The US Secret Service decided to merge two of its departments in March 2020, in order to better address traditional and cyber-related financial crimes.  It combined the Electronic Crimes Task Forces (ECTFs) and Financial Crimes Task Forces (FCTFs) to create a single division, CFTF. The US Secret Service is hoping that in the future, they can expand this part of their security network and implement this system across the globe, in its many offices — 160 to be exact — located in various parts of the world. 

Cyber Fraud Investigators vs. Traditional Fraud Investigators 

The CFTF will combine the expertise of both ECTFs and FCTFs to put an end to cyber-enabled financial theft, which ranges from Business Email Compromises (BECs) scams to data breaches. In order to be effective at tracking illicit online activities and to put an end to it, CFTF investigators need to be able to analyze a computer network, trace an IP address and coordinate with internet service providers to detect suspicious activity. This is a very different task than that required of traditional fraud investigators, who have to identify counterfeit fiat money, track fraudulent wire transfers, and work in collaboration with traditional financial institutions if they wished to terminate money fraud activities conducted the traditional way. 

Crypto is New and Exciting, But Use With Caution 

Earlier this year, the US Financial Crimes Enforcement Network (FinCEN) has urged social media and messaging companies that are using cryptocurrencies to be extremely vigilant regarding illegal transactions. Deputy Director of FinCEN Jamal El-Hindi spoke up regarding this subject matter, weighing the challenges faced by the financial industry when it came to transparency:  

“Our Anti-Money Laundering (AML) principles generally revolve around promoting appropriate transparency of transactions for the benefit of both the financial institutions processing them and FinCEN’s law enforcement stakeholders.  But the complexity of the transactions and relationships in your space present a challenge to transparency […] we have to recognize that the culture of any highly competitive industry may discourage sharing customer information for the purpose of anti-money laundering or other financial crime prevention.” 

As online transactions are on the rise and more common due to the ongoing COVID-19 pandemic, government officials are resorting to more innovative strategies to improve online regulation pertaining to cybercrime.

Cybersecurity Firm Kaspersky Warns of New Ransomware Devised by Notorious North Korean Ransomware Group

Multinational cybersecurity provider Kaspersky has announced that the notorious North Korean crypto criminal group, Lazarus, is planning on releasing a new ransomware. 

Kaspersky Investigates 

The new threat, dubbed VHD, is designated to target internal networks of companies in the economic sector. In regards to why the ransomware group often resorted to working in solo ops, Kaspersky researchers presented their hypothesis:

“We can only speculate about the reason why they are now running solo ops: maybe they find it difficult to interact with the cybercrime underworld, or maybe they felt they could no longer afford to share their profits with third parties.”

Phishing For Crypto And Sensitive Data 

The infamous North Korean ransomware group Lazarus have been reported to have multiple tricks up their sleeves. In fact, according to cybersecurity Cyfirma,  Lazarus is preparing a huge phishing campaign, that is meant to target at least 6 nations and over 5 million businesses and individual investors.  

The report of the devious scheme was released in June. For the time being, there are no signs of the phishing campaign unfolding yet, as it appears that the North Korean ransomware group have not yet deployed the mass phishing campaign.

However, as the hacking group have kept their digital heists alive in 2020, Cyfirma thought it best to warn major companies for prevention purposes.  

Lazarus’ Notoriety Precedes Them 

In the past, the North Korean ransomware group, operating under “Lazarus,” have made quite an impression on cybersecurity firms, having accumulated over $571 million in stolen cryptocurrencies since 2017. Lazarus group is notorious for hitting up cryptocurrency exchanges and have kept up their act of ransoming victims for cryptocurrencies, amid the coronavirus pandemic. 

2019 Digital Heist 

Last year, as reported by Chainalysis, Lazarus pulled off a digital heist that amounted to $7 million in various cryptocurrencies.  

The ransomware group hit up DragonEx crypto exchange, a Singapore-based money exchange. In order to pull off their crypto scam, Lazarus created a fake trading bot website that was offered to employees of the DragonEx exchange.

The North Korean criminal organization used a sophisticated phishing attack, where a real website and social media pertaining to it were linked to a fake company called “WFC Proof.” The non-existent company was said to have created Worldbit-bot, a trading robot, that was then offered to DragonEx employees.

Finally, the malicious software was installed on a computer that contained the private key of the DragonEx hot wallet, which enabled the North Korean-based group to steal cryptocurrencies from the Singapore exchange.

Lazarus Group: Anonymous or Not?

Lazarus’ malicious cyberattacks date all the way back to 2017. Though cybersecurity has not managed to completely arrest and stop the hacking group, identities associated with the North Korean hacking ring have been uncovered.  

Earlier this year, two Chinese citizens by the name of Tian YinYin and Li Jiadong were identified by the US treasury for their connection with Lazarus group. They were sanctioned in March by US authorities for their alleged involvement in laundering stolen cryptocurrencies from a 2018 cyberattack against a cryptocurrency exchange. 

While blockchain is still promoted as being cryptographically secured and the underlying technology for cryptocurrencies, exchanges that hold them are still prone to cyber-attacks, just as traditional markets are not immune to heists and money laundering schemes.  

Korea: Training Military or Cybercriminals?

Preventing financial theft has been an ongoing issue for the longest of times.

With a series of money-related attacks leading to a subsequent UN investigation last year, there is an ongoing hypothetical circulating around the law enforcement industry that the Democratic People’s Republic of Korea (DPRK) may be heavily involved in coordinating cyberattacks, as they have reportedly been training cybercriminals to target and launder stolen funds from financial institutions.

Australian Female Hacker Sentenced to 2 Years of Prison for $400K Ripple (XRP) Crypto Heist

Australia recorded one of its first cases of cryptocurrency theft charges recently. 

First Australian to Be Charged with Crypto Theft

Australian 25-year-old Kathryn Nguyen has been arrested and sentenced to a maximum of 2 years and 3 months in prison for stealing more than 100,000 Ripple (XRP) tokens in January 2018. Along with an accomplice, Nguyen hacked a 56-year-old man’s cryptocurrency account, managing to swap the two-factor authentication of the victim onto her phone.

  

To store the large sum of stolen crypto, she then proceeded to transfer the assets to an overseas Chinese exchange, and traded XRP for Bitcoin. The stolen cryptocurrency was also shuffled into different digital wallets to cover the act. Nguyen and her accomplice carried out the digital heist at a time where XRP crypto was booming, and Ripple coins were worth $4 each. This translated to $400,000 in XRP for the Australian native, a hefty cryptocurrency sum.  

Judge Empathizes with Hacker’s Case

To carry out the arrest, Australian law enforcers raided Nguyen’s home and seized computers, phones and money. When overlooking the case, judge Chris Craigie found it difficult to condemn the female and send her to prison for cryptocurrency fraud. According to News Corp, Craigie said that it was “a difficult and troubling decision to send Nguyen in prison and that her references reflected a generous and hardworking personality,” adding that she appeared to have acted out of character while engaging in crypto theft. It may seem as if the judge empathizes with the crypto offender’s case.  

Nguyen’s parole hearing is set for October 2021. Since the cryptocurrency theft in 2018, Ripple’s pricing on the market has dropped, making the value of stolen XRP worth approximately $30,000 at the time of writing. 

Cybercrime Is Relatively New in Australia

When speaking about the case to Information Age, Detective Superintendent of NSW Cybercrime Matthew Craft addressed the issue and said: 

“The problem we have nationally – not just in New South Wales – is that the reporting for cyber related crimes is very low.” 

Officials have had a hard time categorizing and dealing with cybercrime cases with regulatory actions, as digital theft transcends borders. Detective Craft stated that when cyber hackers are located overseas, there is “not much law enforcement can do,” as it is out of their jurisdiction.

Though cybercrime is still relatively new in Australia, the country’s Federal Government has recently flagged ongoing cyber-attack cases affecting Australian institutions in June. Australia Federal Government officials believe that China may be the culprit behind these cyber-attacks. 

In response to these allegations, Chinese government has vehemently denied all claims of being involved in cyberattacks worldwide. 

US Prosecutors Unseal Indictment of $20 Million Dollar Cryptocurrency Ponzi Scheme

US prosecutors have recently indicted a group of investment scammers who have orchestrated a cryptocurrency mining fraud following a Ponzi scheme protocol. 

Ponzi Scheme Promises High Return, Minimal Risk

The five scammers involved were reported to have traveled around countries in Latin America, Asia, Eastern Europe, and around the United States to promote memberships for their company AirBit Club. Through membership subscriptions, the five individuals – Pablo Renato Rodriguez, Gutemberg Dos Santos, Scott Hughes, Cecilia Millan, and Jackie Aguilar – promised new recruits that they would be rewarded financially for their registration to AirBit Club. 

The five cryptocurrency scammers operated with a Ponzi scheme, promising investors high crypto returns with minimal risk. They promoted their company as a “multilevel marketing club in the cryptocurrency industry.” Rodriguez, Dos Santos, Hughes, Millan, and Aguilar promised new AirBit members that the latter would earn returns on cryptocurrency mining and trading, and that passive income could be generated through any membership purchased. 

In truth, it was disclosed in an indictment by US prosecutors that the cryptocurrency mining operation was actually non-existent. Rather, through membership subscriptions to AirBit Club, the five cryptocurrency scammers reaped profits. The investment fraudsters have reportedly money laundered approximately $20 million through their Ponzi scheme. 

How Did Crypto Scam Group Pull Off Their Heist?

Through marketing pitches and recruitment events, the group was able to accumulate that gigantic sum and allegedly spent it on lavish jewelry, expensive cars, and homes.

They are currently charged with “running a multimillion-dollar cryptocurrency investment fraud and money laundering ring.” US States Attorney Audrey Strauss declared: 

“As alleged, the defendants put a modern-day spin on an age-old investment scam, promising extraordinary rates of guaranteed return on phantom investments in cryptocurrencies.  Thanks to HSI, the defendants are in custody and facing serious criminal charges.” 

According to the unsealed indictment, Rodriguez, Dos Santos, and Millan were charged with single counts of conspiracy to commit wire fraud, conspiracy to commit money laundering, and conspiracy to commit bank fraud.  

As for Hughes, who had previously represented Rodriguez and Dos Santos as a practicing attorney for a US Securities and Exchange Commission investigation, the soon-to-be disbarred lawyer is charged with one count of conspiracy to commit money laundering and one count of conspiracy to commit bank fraud. Lastly, Aguilar was charged with conspiracy to commit wire fraud. 

Crypto Scam Videos on the Rise 

Ponzi schemes and crypto scam videos are not uncommon in the crypto world. One of the most common types of cryptocurrency-driven crimes is that in which online impersonators pose as high-profile industry personalities to funnel digital assets into their wallets. 

Last month, co-founder of Apple Steve Wozniak filed a lawsuit against YouTube for allegedly failing to take down fraudulent crypto scamming videos that ran on its channel, and that impersonated Wozniak. The videos were Bitcoin scams that promised a return of cryptocurrency investment.  

Wozniak directed his legal complaint against YouTube, stating that the multibillion-dollar video-sharing company benefitted indirectly from the ads that streamed along with the scam Bitcoin videos running on its platform. The Apple co-founder further asserted that YouTube should have taken down the Bitcoin scam videos. 

CFTC Demands $572 Million in Penalty and Restitution for Bitcoin Scam, Defendant Nowhere to be Found

The United States Commodity Futures Trading Commission (CFTC) has filed a complaint with the New York Southern District Court against Benjamin Reynolds for his involvement in a fraudulent Bitcoin Ponzi scheme operating under a Bitcoin trading and investment company, Control-Finance.

According to the proposed judgment submitted by the CFTC, Benjamin Reynolds will have to pay a total of $572 million as a penalty and restitution fee. Of that sum, $429 million would be allocated towards the penalty and $143 million would be for the restitution fee. Reynolds failed to answer the CFTC’s complaint, which was originally submitted to the US district court of New York in June 2019.

All That Glitters Is Not Gold

The CFTC filed an initial complaint in June 2019, seeking answers concerning the Control-Finance Ponzi scheme. However, the owner of the fraudulent cryptocurrency company, Benjamin Reynolds, failed to appear in court and never responded to the investigative questions raised by US federal agencies.

In its complaint document, the CFTC stated that Reynolds launched a fraudulent scheme known as the Control-Finance “Affiliate Program” on May 1, 2017, and consequently defrauded more than 1000 customers with the pyramid scheme, earning at least 22,858.822 Bitcoins (BTC), which translates to at least $147 million during that time. Currently, the laundered funds are worth more than $270 million.

The managers of the alleged Bitcoin trading company used the Control-Finance website to advertise the cryptocurrency pyramid scheme. Marketing of the Bitcoin scam was done through popular social media platforms such as Facebook, YouTube, Twitter, and more to attract customers and lure Bitcoin investors. The scheme worked through the affiliate program.

Ponzi Scheme Raises Huge Bitcoin Funds

Control-Finance accepted Bitcoin funds from customers and guaranteed trading returns of as much as 45% per month. However, the collected Bitcoin funds were distributed throughout the company to those in charge of asset management services, therefore generating profits from Bitcoin through a Ponzi scheme.

Despite Reynolds promising his clients returns of up to 45% per month for their Bitcoin investments, that promise was never fulfilled. Rather, the company ended up misappropriating clients’ BTC deposits and did not conduct any Bitcoin trades on customers’ behalf. According to the CFCT’S report, customers never earned any trading profits out of their Bitcoin investments at any given time.

Reynolds and his team managed to launder about $150 million in misappropriated Bitcoins through thousands of blockchain transactions. The Bitcoin investment scammers suddenly stopped their operations in September 2017 by removing the Control-Finance website from the internet, shutting down all accounts and payments to customers, and deleting advertising contents from the company’s social media channels.

Apart from the restitution and penalty, Reynolds also faces some other penalties. He will also be permanently prohibited from trading Bitcoin and will be banned from any transactions involving “commodity interests.”

Carving Up Crypto

In the recent few previous years, the emergence of cryptocurrencies into the mainstream finance industry came at a meteorite rate, attracting public attention and financial institutions. Regulators such as the CFTC and others are “playing catch up”, tasked with the role of protecting the public from cryptocurrency scams and maintaining market stability. The CFTC and other regulators such as the SEC (Securities and Exchange Commission) continue to police cryptocurrency markets, including fraudulent trading activities. Fraud in such trading markets harms customers and, if left unchecked, could hinder innovation.  

UK FCA Regulator Proposes Mandatory AML Data Reports from Cryptocurrency Firms

The United Kingdom’s Financial Conduct Authority (FCA) has proposed an obligatory requirement for crypto exchanges in the UK to produce a report on anti-money laundering measures and data.

The UK’s Financial Conduct Authority (FCA) now wants crypto exchanges and crypto wallet custodians operating in the UK to provide more detailed information regarding money laundering risks.

The UK FCA regulator has put forward the proposal which is open to comment until November 23, 2020 and plans to publish a policy statement by the first quarter of 2021.

The FCA policy proposal published on Aug 25, is a plan by the UK financial regulator to impose obligatory AML reporting on digital asset firms and cryptocurrency wallet providers—a blanket-wide obligation for crypto exchanges large and small and “irrespective of their total annual revenue.”

FATF Recommends Extending AML Obligations to Crypto

In July 2016, the FCA introduced an annual financial crime reporting obligation for financial institutions on a range of indicators that reflect the potential money laundering risks of the firm services. The obligation to provide this financial crime information falls under the FCA’s Annual Financial Crime Report (REP-CRIM).

Based on the recommendations of the Financial Action Task Force (FATF)—an international body that sets global standards on combating money laundering and terrorist financing—the FCA now wants to extend the “the application of REP-CRIM to all firms we supervise.”

According to the proposal:

“We (FCA) consider that this approach will result in improving firms’ money laundering systems and controls, reduce actual risks of money laundering, and help improve the overall integrity of the UK financial system. It is also in line and builds on our data strategy, announced earlier this year, to use data and data analytics to transform the way we regulate and reduce the burden on firms.”

Under the new proposed rules, should they come into effect, crypto firms and cryptocurrency wallet custodians must provide information the FCA with information like the number of customers they serve in jurisdictions considered high risk and customers who refuse to comply and exit the services for suspicious reasons. This kind of AML information will be required by the FCA from crypto companies from their next “accounting reference date” after 10 January 2022.

The FCA also defined the term operates as “where the firm carries on its business or has a physical presence” as many cryptocurrency firms and custodians choose to register their business in tax haven territories such as the Cayman Islands.

UK FCA Grants First Crypto Licenses

As reported by Blockchain.News on August 21, the UK’s Financial Conduct Authority (FCA) has granted its first operating licenses for two crypto exchanges—one for Gemini and the other for Archax, officially making Archax the first regulated digital security exchange custodian and in the United Kingdom.

According to the FCA website, Archax and Gemini Europe Services were registered by the financial regulator on Aug. 18 and Aug. 19 respectively, after meeting the compliance standards of the authority.

The FCA implemented mandatory risk assessments for exchanges in January, to assess their compliance with Anti-Money Laundering (AML) and Counter-Terrorism Financing (CTF) regulations.

G7 Bank Sector Higher Money Laundering Risk than Crypto Industry, Reports Mexico Financial Intelligence

According to an official report released by the Financial Intelligence Unit (FIU) of Mexico, the G7 banking sector comprising of major banks Santander, BBVA, Citibanamex, Banorte, HSBC, Scotiabank, and Inbursa—was the most prone to money laundering operations, despite being the most regulated. 

Who is most at risk of money laundering?

Banks connected to exchange activity were also as highly ranked in terms of money laundering schemes. The report, which depicted the results of the second National Risk Assessment (NRA), discussed money laundering and terrorist financing. It detailed that there were four sectors within the financial industry that were most at risk of money laundering illicit activities. 

The four categories were G7 banking, brokerage houses, exchange houses, and multiple banking institutions with commercial operations, as shared by El Economista. Among the four sectors outlined, the one with the highest risk of fraudulent activity was the G7 banking sector, which translated to approximately 80% of the banking sector’s assets. 

The report by the FIU of Mexico also separated risk levels for money laundering and terrorist funding into four categories, depending on the magnitude of fraud – low, medium, medium-high, and high risk. The most regulated finance sector, the “G7 banking group,” ranked among the highest risk for money laundering. 

Crypto scams easier to track than fiat

Though there appears to be increasing skepticism that fintech and crypto industries are always leveraged for money laundering schemes and monetary scams, the two sectors were surpassed by the traditional banking sector in terms of money laundering risk. The 2020 Financial Intelligence Unit of the Ministry of Finance and Public Credit report did not allocate a risk classification for the fintech industry. 

During an ongoing panel hosted by the Association of Certified Financial Crime Specialists in August, Paxful Chief Compliance Officer Lana Schwartzmann mentioned that there are advantages to adopting cryptocurrency in a traditional fiat world. She referenced the infamous Twitter Bitcoin hack and stated that due to the digital trail left by crypto, digital assets fraud is easier to track than fiat. Had it been a traditional money heist, the investigation would not have been resolved as quickly.  

Twitter Bitcoin heist

The Twitter Bitcoin (BTC) hack, which held the media spotlight in July, revolved around the narrative of three men who overtook Twitter by storm and generated over $100,000 worth of Bitcoin funds by hacking the accounts of world-known figures such as Elon Musk, Bill Gates, Kanye West, Joe Biden and more. 

DoJ Charges BitClub Promoter for Role in $722 Million Crypto Fraud Scheme

A Californian man has pleaded guilty for his involvement in perpetrating BitClub Network, a cryptocurrency mining scheme estimated to have generated at least $722 million.

BitClub promoter charged with fraud

Joseph Frank Abel pleaded guilty for conspiracy in fraud, and for offering and selling unregistered securities through BitClub Network. The US Department of Justice (DoJ) also charged Abel for subscribing to a false tax return in 2017, allegedly failing to report $1 million worth of earned cryptocurrency. Along with Abel, four other of his accomplices were indicted for their roles in the BitClub Network.

BitClub Network is a fraudulent crypto mining scheme that solicited money from investors in exchange for shares in purported cryptocurrency mining pools. Investors were promised rewards for recruiting new members to the network. The Ponzi scheme was in effect for 5 years, from April 2014 to December 2019 before being shut down. It generated at least $722 million and was advertised digitally by Abel, who was a big-shot promoter for the fraudulent crypto mining network. Based in the US, BitClub Network membership was also marketed throughout Asia, Africa, and Europe.

Through a video conference with the US District Judge Claire C. Cecchi, Abel confessed to soliciting investors and taking their money in exchange for promised shares in BitClub’s crypto mining pools. According to an Internal Revenue Service (IRS) announcement released yesterday, Abel also advised other American investors to use a virtual private network (VPN) to conceal their US-based IP addresses, in an effort to prevent detection from US law enforcement.

The former BitClub promoter is now awaiting his sentencing, set for January 2021. Abel has been fined $250,000 by US regulators and now faces up to five years in prison. As for the tax evasion charge, the fraud count stipulates a maximum penalty of three years of imprisonment and a fine of $100,000.

Ponzi schemes generate billions

Similar cryptocurrency Ponzi schemes that have also been condemned by the DoJ as fraudulent investment scams have generated billions before being shut down. Some of the biggest crypto schemes include OneCoin and BitConnect, which have respectively generated $4 billion and $2.6 billion through money laundering and bank fraud.

Recently, the US Department of Justice sought to reclaim approximately $400 million dollars in a forfeiture money judgment submitted on Monday. Mark Scott, the former attorney for OneCoin founder Ruja Ignatova, was found guilty of money laundering and bank fraud in the multi-billion dollar Ponzi scheme. Currently, law enforcement is asking the US District Court of New York judge to freeze Scott’s assets to recuperate some of the laundered funds. The former lawyer faces disbarment as well.

US Sanctions Crypto Addresses of Russian Hackers Accused of Running Presidential Election Interference

US Department of Treasury has released a Specially Designated Nationals list of Russian hackers and their crypto addresses, under allegations that they have been working to interfere with the 2020 presidential election.

The nationals list includes St. Petersburg natives Anton Nikoaleyvich Andreyev, Artem Mikhaylovich Lifshits, and more. Though this is not the first time the Office of Foreign Assets Control (OFAC), under the US Department of Treasury, has named crypto wallet addresses in their sanctions, it is the first time that digital wallets including such a huge range of digital currencies – Litecoin, ZCash, Ether, and Dash – have been reported for their involvement in funding an election interference conspiracy.

Project Lakhta

Under allegations of wire fraud conspiracy and misconduct, the US Department of Justice filed criminal charges designated at Lifshits, a 27-year-old Russian national. He is accused of having purposely interfered with US elections beforehand, and of doing it again. Artem Lifshits is alleged to have played a major managing role in Project Lakhta, a multimillion-dollar Russian-based operation using propaganda to conduct political and presidential electoral interference.

Through Project Lakhta, the Department of Justice (DoJ) decreed that Lifshits illegally accessed US confidential documents and used the identification credentials of American citizens to open cryptocurrency, Paypal, and bank accounts. Under the criminal complaint filed with the DoJ, US attorney Zachary Terwilliger said:

“Project Lakhta conspirators used the stolen identities of U.S. persons to further their goals of undermining faith in our democratic institutions and for personal gain.”

The criminal complaint was filed hours after the US Treasury released an official sanction list of Russian nationals, along with their respective cryptocurrency wallet addresses. US attorney Terwilliger added during the legal complaint:

“Federal law enforcement will work aggressively to hold accountable cyber criminals located in Russia and other countries, which serve as safe-havens for this type of criminal activity.”

Lifshits is accused of conspiracy to commit wire fraud and for “opening fraudulent accounts at banking and cryptocurrency exchanges” with stolen ID credentials originating from American citizens.

Electoral interference started in 2014

This is not the first time that US law enforcers have cracked down on Russian nationals for running presidential election interference through crypto funding. Russian nationals have been accused of scheming and running political campaign interference since at least 2014 when Project Lakhta first rose to notoriety. The complaint read:

“Since at least May 2014, Project Lakhta’s stated goal in the United States has been to disrupt the democratic process and spread distrust towards candidates for political office and the political system in general.”

The sanction and criminal complaint from the US Department of Justice come at a critical time, with the upcoming presidential election in 2 months.

Exit mobile version