Russian-Swedish national behind $400 million crypto mixer convicted of money laundering

Avatar

A dual Russian-Swedish national was convicted Tuesday in U.S. federal court for operating a notorious cryptocurrency mixer that moved about $400 million in bitcoin over the course of a decade.

Roman Sterlingov, 35, was arrested in April 2021 in Los Angeles on suspicion that he was behind the Bitcoin Fog mixer, a service used by hackers to obfuscate the origins of cryptocurrency. According to the complaint, Sterlingov took commissions of 2 to 2.5 percent on transactions.

“Over the course of its decade-long operation, stopped only when Sterlingov was arrested and detained, Bitcoin Fog moved well over 1.2 million bitcoin (BTC) – valued at approximately $400 million at the time of the transactions,” the Department of Justice said in a release announcing the conviction.

“The bulk of that cryptocurrency came from darknet marketplaces and was tied to illegal narcotics, computer fraud and abuse activities, and identity theft.”

Sterlingov’s anonymizer service was found to have sent or received at least $78 million in transactions involving darknet markets.

Represented by famous hacker lawyer Tor Ekeland, Sterlingov reportedly admitted to using the service but denied being its operator or founder. His defense alleged that the blockchain analysis underpinning the case was faulty and Ekeland pledged to appeal in a post on X (formerly Twitter).

Ilya Lichtenstein, the convicted hacker behind the heist of the Bitfinex cryptocurrency exchange, testified during the trial that he used the Bitcoin Fog mixer to conceal some of the stolen funds, although he did not correspond directly with Sterlingov.

Sterlingov was found guilty of “money laundering conspiracy, sting money laundering, operating an unlicensed money transmitting business, and violations of the D.C. Money Transmitters Act.” Each of the money laundering convictions carry maximum 20-year sentences. He will be sentenced in July.

Law enforcement has set its sights recently on the infrastructure that enables cybercrime to flourish. In September of this year, the alleged co-founder of the mixer Tornado Cash will face a criminal trial.

The mixer is suspected of facilitating more than $1 billion in transactions for money laundering, including hundreds of millions for North Korea’s Lazarus Group.

CybercrimeIndustryNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

James Reddick

has worked as a journalist around the world, including in Lebanon and in Cambodia, where he was Deputy Managing Editor of The Phnom Penh Post. He is also a radio and podcast producer for outlets like Snap Judgment.

 

Total
0
Shares
Previous Post

LockBit administrator sentenced to almost four years in prison after guilty plea

Next Post

Russia claims US and ‘Western countries’ are trying to hack its presidential election

Related Posts

Necro Android Malware Found in Popular Camera and Browser Apps on Play Store

Altered versions of legitimate Android apps associated with Spotify, WhatsApp, and Minecraft have been used to deliver a new version of a known malware loader called Necro. Kaspersky said some of the malicious apps have also been found on the Google Play Store. They have been cumulatively downloaded 11 million times. They include - Wuta Camera - Nice Shot Always (com.benqu.wuta) - 10+ million
Avatar
Read More

Irish Watchdog Imposes Record €310 Million Fine on LinkedIn for GDPR Violations

The Irish data protection watchdog on Thursday fined LinkedIn €310 million ($335 million) for violating the privacy of its users by conducting behavioral analyses of personal data for targeted advertising. "The inquiry examined LinkedIn's processing of personal data for the purposes of behavioral analysis and targeted advertising of users who have created LinkedIn profiles (members)," the Data
Avatar
Read More

Security Flaw in Styra’s OPA Exposes NTLM Hashes to Remote Attackers

Details have emerged about a now-patched security flaw in Styra's Open Policy Agent (OPA) that, if successfully exploited, could have led to leakage of New Technology LAN Manager (NTLM) hashes. "The vulnerability could have allowed an attacker to leak the NTLM credentials of the OPA server's local user account to a remote server, potentially allowing the attacker to relay the authentication or
Avatar
Read More