Feds charge 12 more suspects in RICO case over crypto crime spree

Avatar

Twelve more suspects have been charged for their alleged involvement in a spree of cryptocurrency thefts and the subsequent laundering of virtual currency worth hundreds of millions of dollars.

The charges include RICO conspiracy, which is used to combat organized crime, as well as conspiracy to commit wire fraud, money laundering and obstruction of justice. 

Two additional suspects in the case — 20-year-old Malone Lam and Jeandiel Serrano, 21 — were arrested in September 2024 and charged in connection with the theft of about $245 million from a victim in Washington, D.C through a social engineering attack.  

According to the Department of Justice, the group grew out of relationships that began on online gaming platforms. Beginning around October 2023, they obtained information from stolen databases to identify potential victims with large cryptocurrency holdings. 

Some of the suspects allegedly “cold-called victims and used social engineering to convince them their accounts were the subject of cyberattacks and the enterprise callers were attempting to help secure their accounts,” according to the DOJ. 

The schemes netted them huge sums of money, prosecutors allege, including one theft worth $14 million and another worth $2.9 million. In one case in July 2024, Lam broke into a victim’s iCloud account in order to monitor their location. Nineteen-year-old Marlon Ferro then broke into the target’s New Mexico home to steal hardware connected to their crypto accounts, the indictment said. 

Then in August 2024, Lam and four unnamed suspects went after a creditor for the crypto lender Genesis, according to ZachXBT, a virtual currency investigator who says he helped law enforcement research the case. 

Purporting to be customer support agents from cryptocurrency exchange Gemini informing the victim their account had been hacked, they instructed them to reset their multifactor authorization and to transfer funds to a compromised wallet. They also convinced the victim to use AnyDesk to share their screen, thereby leaking their private keys. 

A video posted by ZachXBT purportedly shows their live reaction to stealing the funds, with someone yelling “We got it!” repeatedly. 

“Do you know how much money that is?” someone asks. “Holy sh–”  

With their riches, members of the group lived a lavish lifestyle, renting out mansions in Florida and California using fake documents, flying on private jets to the Hamptons and buying up exotic cars, prosecutors said. During a three-week period, they allegedly spent $4 million at Los Angeles nightclubs.

Four of the suspects — Kunal Mehta, Hamza Doost, Joel Cortez and Evan Tangeman — were charged for their alleged roles in laundering the funds. 

At one point, Conor Flansburg — an alleged database hacker and organizer for the group — asked Lam rhetorically: “[H]ow are we all so much better than everyone… [H]ow have we surpassed all the kids that have been around for 8 years, in a few months[?]”  

On September 18, 2024, Lam was informed by an off-duty law enforcement officer that the cops were closing in on him, according to the indictment. Before police arrived at his Miami house to arrest him, he walked out back to a boat dock on Biscayne Bay and dropped his cellphone into the water.  

CybercrimeGovernmentNewsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

James Reddick

has worked as a journalist around the world, including in Lebanon and in Cambodia, where he was Deputy Managing Editor of The Phnom Penh Post. He is also a radio and podcast producer for outlets like Snap Judgment.

 

Total
0
Shares
Previous Post

Russian hospital faces multi-day shutdown as pro-Ukraine group claims cyberattack

Next Post

Hack of SEC social media account earns 14-month prison sentence for Alabama man

Related Posts

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

Austrian privacy non-profit noyb (none of your business) has sent Meta's Irish headquarters a cease-and-desist letter, threatening the company with a class action lawsuit if it proceeds with its plans to train users' data for training its artificial intelligence (AI) models without an explicit opt-in. The move comes weeks after the social media behemoth announced its plans to train its AI models
Avatar
Read More

Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation

Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the same question: what is the business getting in return? CISOs respond with reports on controls and vulnerability counts – but executives want to understand risk in terms of financial exposure, operational impact, and avoiding loss. The
Avatar
Read More

⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More

Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry point. But what happens when the hunters become the hunted? Or when old malware resurfaces with new tricks? Step behind the curtain with us this week as we explore breaches born from routine oversights—and the unexpected
Avatar
Read More