Court
Court
Plaintiff,
Civil Action No. 25-cv-1907
v.
Defendant in rem.
Plaintiff, the United States of America, through the U.S. Attorney for the District of
Columbia, brings this verified complaint for forfeiture in a civil action in rem against 225,364,961
1. Criminals abroad, along with their associates and conspirators, stole funds from
over 430 suspected victims. After stealing those funds, the criminal actors laundered them through
a convoluted web of cryptocurrency accounts and addresses to evade detection and to hide the fact
that the funds came from victims. The United States Secret Service (“USSS”) and the Federal
Bureau of Investigation (“FBI”) used blockchain analysis and other investigative techniques to
identify, freeze, and seize the Defendant Property, which constitutes proceeds traceable to those
thefts and property involved in, and traceable to, this money laundering scheme.
2. The United States of America seeks to lawfully forfeit the Defendant Property to
punish and deter criminal activity by depriving criminals of property used in or acquired through
1
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 2 of 75
illegal activities; to promote and enhance cooperation among federal and foreign law enforcement
agencies; and most importantly, to recover assets that may be used to compensate victims. 1
3. This Court has original jurisdiction of this civil action by virtue of 28 U.S.C. § 1345
because it has been commenced by the United States and by virtue of 28 U.S.C. § 1355(a) because
it is an action for the recovery and enforcement of a forfeiture under an Act of Congress.
4. This Court has in rem jurisdiction over the Defendant Property under 28 U.S.C.
§ 1355(b).
5. Venue is proper in this judicial district under 18 U.S.C. § 3238 and 28 U.S.C.
6. The United States files this in rem forfeiture action to seek forfeiture of Defendant
Property as constituting proceeds of wire fraud and wire fraud conspiracy offenses, committed in
violation of 18 U.S.C. §§ 1343, 1349, 2, and 3, and as involved in money laundering and money
7. Procedures for this action are mandated by Rule G of the supplemental Rules for
Admiralty or Maritime Claims and Asset Forfeiture Actions and, to the extent applicable, 18
U.S.C. §§ 981 and 983 and the Federal Rules of Civil Procedure.
1
U.S. Department of Justice, Asset Forfeiture Program, https://www.justice.gov/afp. (Last
accessed Jun. 17, 2025).
2
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 3 of 75
from proceeds traceable to wire fraud, conspiracy to commit wire fraud, or any offense constituting
1961(1)(B).
10. Title 18 U.S.C. § 1343 provides that whoever, having devised or intending to devise
any scheme or artifice to defraud, or for obtaining money or property by means of false or
of wire, radio, television communication in interstate or foreign commerce, any writings, signs,
signals, pictures, or sounds for the purpose of executing such scheme or artifice, commits the
11. Title 18 U.S.C. § 1349 provides that whoever attempts or conspires to commit a
violation of 18 U.S.C. § 1343 shall be subject to the same penalties as those prescribed for the
offense, the commission of which was the object of the attempt or conspiracy.
12. Title 18 U.S.C. § 1956(a)(1)(B)(i) provides in relevant part that whoever, knowing
that the property involved in a financial transaction represents the proceeds of some form of
unlawful activity, conducts or attempts to conduct such a financial transaction which in fact
involves the proceeds of specified unlawful activity— . . . knowing that the transaction is designed
in whole or in part . . . to conceal or disguise the nature, the location, the source, the ownership, or
the control of the proceeds of specified unlawful activity” is guilty of concealment money
laundering.
3
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 4 of 75
13. Title 18 U.S.C. § 1956(h) provides that any person who conspires to commit any
offense of 1956 or 1957 is subject to the same penalties as those prescribed for the offense the
conduct in Section 1956 if the conduct is by a United States citizen, or by a non-United States
citizen and the conduct occurs in part in the United States and the transaction or series of related
PROPERTY INFORMATION
The above virtual currency addresses are hereinafter collectively referred to as “SUBJECT
4
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 5 of 75
Property.”
16. The Defendant Property is currently in the custody of the United States Marshals
17. Virtual Currency: Virtual currencies are digital representations of value that, like
traditional coin and paper currency, function as a medium of exchange (i.e., they can be digitally
traded or transferred and can be used for payment or investment purposes). Virtual currencies are
a type of digital asset separate and distinct from digital representations of traditional currencies,
securities, and other traditional financial assets. The exchange value of a particular virtual currency
generally is based on agreement or trust among its community of users. Some virtual currencies
have equivalent values in real currency or can act as a substitute for real currency, while others are
specific to particular virtual domains (e.g., online gaming communities) and generally cannot be
exchanged for real currency. Cryptocurrencies, like Bitcoin (or BTC) and Ether (or ETH), are
types of virtual currencies, which rely on cryptography for security. Cryptocurrencies typically
lack a central administrator to issue the currency and maintain payment ledgers. Instead,
5
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 6 of 75
computers referred to as “nodes.” Each node runs software that maintains an immutable and
historical record of every transaction utilizing that blockchain’s technology. Many digital assets,
including virtual currencies, publicly record all of their transactions on a blockchain, including all
of the known balances for each virtual currency address on the blockchain. Blockchains consist of
blocks of cryptographically signed transactions, and blocks are added to the previous block after
validation and after undergoing a consensus decision to expose and resist tampering or
manipulation of the data. There are many different blockchains used by many different virtual
currencies. For example, Bitcoin in its native state exists of the Bitcoin blockchain, while Ether
determine which virtual currency addresses are sending and receiving particular virtual currency.
This analysis can be invaluable to criminal investigations for many reasons, including that it may
enable law enforcement to uncover transactions involving illicit funds and to identify the person(s)
behind those transactions. To conduct blockchain analysis, law enforcement officers use reputable,
free open source blockchain explorers, as well as commercial tools and services. These commercial
investigations, law enforcement has found the information associated with these tools to be
reliable.
that designates the virtual location on a blockchain where virtual currency can be sent and received.
6
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 7 of 75
refers to a wallet address used in a virtual currency transaction that acts as a temporary stopping
point between the original sender and the final recipient, often employed to obscure the true source
or destination of funds by adding an extra layer of complexity to the transaction trail. Essentially,
criminal actors use intermediary addresses as “middleman” addresses to obfuscate the flow of
funds. The funds are transferred through the middleman/intermediary address for no legitimate
purpose. This is especially obvious because each transfer requires fees, meaning it costs the
22. Virtual Currency Exchange: A virtual currency exchange (“VCE”), also called a
cryptocurrency exchange, is a platform used to buy and sell virtual currencies. VCEs allow users
to exchange their virtual currency for other virtual currencies or fiat currency, and vice versa. Many
VCEs also store their customers’ virtual currency addresses in hosted wallets. VCEs can be
centralized (i.e., an entity or organization that facilitates virtual currency trading between parties
on a large scale and often resembles traditional asset exchanges like the exchange of stocks) or
decentralized (i.e., a peer-to-peer marketplace where transactions occur directly between parties).
transfer funds through a VCE’s own addresses, often removing the link between the source of
funds and the destination. Pass-through accounts often receive, then promptly transfer the funds
without exchange activity, which is an unnecessary step that incurs transaction fees without a
legitimate purpose. This effectively turns the VCE into a money laundering mixer.
7
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 8 of 75
24. Virtual Currency Wallet: A virtual currency wallet (e.g., a hardware wallet,
software wallet, or paper wallet) stores a user’s public and private keys, allowing a user to send
and receive virtual currency stored on the blockchain. Multiple virtual currency addresses can be
wallet, is a virtual currency wallet through which the user has complete control over storing and
securing their private keys and virtual currency. Unhosted wallets do not require a third party’s
involvement (e.g., a virtual currency exchange) to facilitate a transaction involving the wallet.
marketplace where users can trade virtual currencies directly with other traders without centralized
intermediaries. Users generally retain control over their virtual currency rather than entrusting a
central authority to host funds in a centralized or “hosted” wallet. DEXs are operated by self-
executing agreements written in code, known as “smart contracts,” which automate the trading
process. DEXs will algorithmically track the prices of various virtual currencies and often leverage
locked reserves of virtual currencies (or other digital assets). These locked reserves are known as
“liquidity pools,” and they are often used to facilitate trades. DEXs are built on blockchains that
support smart contracts, including Ethereum, and often levy fees for their services.
8
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 9 of 75
27. Transaction Fee: A transaction fee is a fee paid by the party sending virtual
currency on a blockchain to reward miners and/or validators for verifying and validating
transactions. Transaction fees vary by blockchain and can fluctuate based on factors such as
blockchain network traffic and transaction sizes. Senders of virtual currency can increase the
transaction fees that they pay to have their transactions confirmed faster by miners and/or
validators. Transaction fees are generally paid in a blockchain’s native token (e.g., Bitcoin on the
Bitcoin blockchain). On the Ethereum network, these transaction fees are called “gas fees.” Gas
fees are transaction costs paid in Ether, or its fraction, gwei. These fees serve as a form of
remuneration for validators who maintain and secure the network. Gas fees fluctuate based on
supply, demand, and network capacity, and may increase during periods of network congestion.
28. Stablecoins: Stablecoins are a type of virtual currency whose value is pegged to a
commodity’s price, such as gold, or to a fiat currency, such as the U.S. dollar, or to a different
virtual currency. For example, Tether (also known as USDT) is a stablecoin pegged to the U.S.
dollar. Stablecoins achieve their price stability via collateralization (backing) or through
algorithmic mechanisms of buying and selling the reference asset or its derivatives.
29. Smart Contracts: Smart contracts allow developers to create markets, store
registries of debts, and move funds in accordance with the instructions provided in the contract’s
code, without any type of middleman or counterparty controlling a desired or politically motivated
outcome, all while using the Ethereum blockchain protocol to maintain transparency. Smart
contract technology is one of Ethereum’s distinguishing characteristics and an important tool for
companies or individuals executing trades on the Ethereum blockchain. When engaged, smart
contracts automatically execute according to the terms of the contract written into lines of code. A
transaction contemplated by a smart contract occurs on the Ethereum blockchain and is both
9
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 10 of 75
30. USDT and Tether Limited: Tether Limited (“Tether”) is a company that manages
the smart contracts and the treasury (i.e., the funds held in reserve) for USDT tokens.
type of internet-based cryptocurrency investment scam. The phrase is translated from Chinese
shāzhūpán and refers to a scam in which the victim is “fattened up prior to slaughter.” These scams
are also referred to as cryptocurrency investment fraud. 2 These types of scams typically involved
four stages. First, a perpetrator cold contacts a victim via text, social media, or some other
communication platform. Oftentimes, the perpetrator will pretend to have contacted the wrong
number but continue communicating with their newfound “friend.” Second, the perpetrator will
establish a relationship with the victim by continuing to message them over days, weeks, or
months. Third, the scammer will concoct a narrative to induce the victim to send them a series of
purported investments, often in the form of cryptocurrency. These payments are often made
through fraudulent investment platforms introduced by the scammer, which the victim believes to
be legitimate. Fourth, after the victim stops sending additional payments, or begins to question the
scammer about legitimacy of their “investments,” the perpetrator cuts off all contact.
32. Confidence schemes are schemes where perpetrators gain trust or confidence from
victims to deceive them into parting with their money. One of the most well-known forms of
confidence schemes is the “romance scam,” which typically features a perpetrator befriending a
2
Federal Bureau of Investigation, Cryptocurrency Investment Fraud, https://www.fbi.gov/how-
we-can-help-you/victim-services/national-crimes-and-victim-resources/cryptocurrency-
investment-fraud?__cf_chl_rt_tk=KP0jo5lKxpcHNmC2W9IgFvxzVp58YptXkC36h1AH84I-
1749423762-1.0.1.1-PrqYwbOk3o56Boyjv4_oSFvOb0GH2RnyJMQVGilzVSs (Last accessed
Jun. 17, 2025).
10
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 11 of 75
victim through the guise of a romantic relationship, often solely existing online, in an effort to
schemes blended with fraudulent websites, mobile apps, or dApps3 and the opaqueness of
cryptocurrency.
34. Law enforcement and independent investigations have determined that these
schemes are perpetrated primarily in Southeast Asia, often via forced labor. Victims are trafficked
into countries that include Myanmar, Philippines, Laos and Cambodia and are forced to conduct
these scams via text messages, dating websites, and other online platforms inside scam compounds
in these countries.4
romance scams, were reported to have cost U.S. victims over $600 million dollars in losses. This
represented a $125 million dollar increase from 2019, and $238 million dollars from 2018, for a
total of $1.43 billion dollars in losses attributed to confidence schemes from 2018–2020.
Separately, during this same time-period, investment scams were reported to have cost U.S.
36. Since the emergence of cryptocurrency-based confidence scams, those same scam
3
dApps are decentralized applications on blockchain networks, and typically are run on smart
contracts.
4
Cezary Podkul and Cindy Liu, Human Trafficking’s Newest Abuse: Forcing Victims into
Cyberscamming, https://www.propublica.org/article/human-traffickers-force-victims-into-
cyberscamming, (Sept. 13, 2022).
5
Federal Bureau of Investigation Internet Crime Complaint Center, Internet Crime Report 2020,
https://www.ic3.gov/AnnualReport/Reports/2020_ic3report.pdf, (Mar. 17, 2021).
11
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 12 of 75
categories have seen their losses multiply at significant levels, reaching a reported loss of over
$5.22 billion dollars in 2023 alone for confidence schemes and investments scams combined. 6 And
in 2024, that same loss increased to approximately $7 billion dollars. 7 In 2024 alone,
approximately $5.8 billion in losses from cryptocurrency investment fraud was reported to the
37. One of the primary attributes of this type of scheme, which has helped further its
success, is the use of smartphone applications. 97% of Americans own a cellphone of some kind
38. Among the seemingly endless list of smartphone applications (“apps”) are mobile
banking or investment apps, which are typically associated with an individual’s bank or investment
account. These apps typically display an account owner’s balance and transaction history, among
other information. Notably, as of 2022, nearly 80% of Americans regularly use mobile banking
apps or websites. 10
apps, such as the balance, history, and interest, can be assumed by the user to be accurate.
6
Federal Bureau of Investigation Internet Computer Complaint Center, Internet Crime Report
2023, https://www.ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf, (Apr. 4, 2024).
7
Federal Bureau of Investigation Internet Computer Complaint Center, Internet Crime Report
2024, https://www.ic3.gov/AnnualReport/Reports/2024_IC3Report.pdf, (Apr. 23, 2025).
8
Id.
9
Eugenie Park, Kaitlyn Radde, Michelle Faverio, Olivia Sidoti, Risa Gelles-Watnick, Sara Atske
and Wyatt Dawson, Mobile Fact Sheet, https://www.pewresearch.org/internet/fact-sheet/mobile/
(Nov. 13, 2024).
10
American Bankers Association, National Survey: Record Number of Bank Customers Use
Mobile Apps More Than Any Other Channel to Manage Their Accounts,
https://www.aba.com/about-us/press-room/press-releases/consumer-survey-banking-methods-
2024#:~:text=The%20national%20survey%20found%20that,in%20the%20past%2012%20mont
hs. (Nov. 22, 2024).
12
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 13 of 75
Furthermore, transactions performed on said legitimate app, reflected in the account history within
the app, can generally be presumed to have occurred despite having no paper records like a receipt
or statement one might receive if conducting the same transaction inside a brick-and-mortar
institution.
40. This trust in mobile banking and investment apps is at the center of these schemes.
Following the initial victimization through the confidence scheme, perpetrators convince victims
to download what appear to be legitimate mobile banking or investment apps to track their
cryptocurrency investments. In reality, they are not connected to any real account or legitimate
financial institution. Instead, the apps are created and controlled by the perpetrators, who are able
to create the facade of balances and transactions that are otherwise non-existent.
41. This fabricated activity, which on the surface would appear no different than that
of a legitimate mobile banking or investment app, is made to appear as though investments into
non-existent, perpetrator-controlled platforms are realizing substantial gains. This helps the
perpetrators convince victims into investing additional funds into the scheme.
scam, unwittingly, only to see those funds triple in value, as displayed on the perpetrator-controlled
app. After this point, some victims attempt to invest more assets, which may include IRAs,
43. Some victims report being able to successfully withdraw funds which establishes
trust and credibility with the perpetrators. This stage in the fraud scheme is designed to give the
victims more confidence to invest their remaining assets. In these scenarios, what actually happens
is that victims likely withdraw funds deducted from their “investments” (rather than purported
gains), or originating from other victims and not a legitimate investment opportunity. This
13
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 14 of 75
withdrawal ability deviates from more traditional confidence schemes and allows the scheme to
the center of the investments. Cryptocurrency is well-known as a highly volatile asset, with price
swings fluctuating the value of some cryptocurrencies, like Bitcoin, thousands of dollars in any
given day. Cryptocurrency can also be highly technical, with terminology and attributes unique to
different cryptocurrencies and blockchains. This has allowed for perpetrators to help convincingly
explain convoluted investments to victims that otherwise would not consider purchasing or
investing in cryptocurrency.
STATEMENT OF FACTS
Summary
45. OKX, a virtual currency exchange, contacted law enforcement officers regarding a
large network of virtual currency accounts (the “144 OKX Accounts”) they analyzed and believed
were involved in receiving and transferring vast amounts of cryptocurrency scam proceeds—all
434 suspected fraud victims whose funds were likely laundered using this network. Law
their virtual currency while under the belief that they were sending funds to legitimate exchange
platforms (hereinafter, the “93 Initial Deposit Addresses”). Using the Last-in-First-Out (“LIFO”)
14
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 15 of 75
tracing methodology,11 victim funds from the 93 Initial Deposit Addresses with confirmed,
identified victims’ funds were sent to 22 of the 144 OKX Accounts after being cycled through a
large set of “intermediary addresses,” which law enforcement assesses were used by scammers for
laundering purposes. Many of the intermediary addresses were themselves linked to even more
cryptocurrency confidence scam victim reports containing multimillion dollar loss amounts.
47. Once victim funds were deposited to the 22 OKX accounts referenced above (the
“22 OKX Accounts”), they were then laundered through many of the remaining 122 OKX
accounts. 12 All 144 OKX Accounts are believed to be controlled by a group of cryptocurrency
confidence scam actors and/or their money laundering co-conspirators. That assessment is based
and connections to ITECHNO 13), and a list of overlapping identical IP addresses used by many of
the 144 OKX Accounts, all of which have IPs tracing back to the Philippines.
48. Once the money launderers sent victim funds through the network of 144 OKX
Accounts, they then laundered the funds even further through a group of 35 additional intermediary
addresses, also likely controlled by the scammers and/or launderers. Funds traced through these
ADDRESSES. On or about May 1, 2025, the Honorable United States Magistrate Judge Moxila
A. Upadhyaya in the District of Columbia issued a seizure warrant for the approximately
11
The LIFO method assumes that the first output back-traced was funded by the last input up to
the amount of the original transaction deposited into one of the 144 OKX Accounts.
12
Some of the 22 OKX accounts sent victim funds directly to intermediary addresses without first
being laundered through the 122 remaining OKX accounts.
13
See infra ¶¶ 61-63.
15
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 16 of 75
49. This laundering involved hundreds of thousands of transactions. Due to the massive
volume of transactions across a large network of addresses, this complaint describes the phases of
laundering (including some specifics about relevant transactions) rather than detailing every single
transaction.
50. In November 2023, the USSS San Francisco Field Office initiated an investigation
into virtual currency accounts used to help launder funds derived from cryptocurrency confidence
schemes. USSS received a report from Tether (which was working with OKX, a Seychelles-based
virtual currency exchange) alleging that they identified approximately $250 million dollars in
USDT traceable to cryptocurrency confidence scams that transferred through certain OKX
accounts—which are included in the 144 OKX Accounts, as defined and further described below.
51. During the course of this investigation, law enforcement identified approximately
434 suspected cryptocurrency confidence scam victims, including 60 confirmed victims, whose
funds can be traced to 22 of the 144 OKX Accounts, which the perpetrators controlled. Victim
funds were not directly sent to the identified 144 OKX Accounts. Instead, the funds dissipated
among various intermediary addresses before arriving in the 22 OKX Accounts, which were then
generally cycled through the remaining 122 OKX accounts controlled by the same actors. 14 This
is a common technique for laundering virtual currency fraud proceeds; the additional layering of
transactions and continuous mixing of funds is a deliberate strategy to further obfuscate the true
source of funds.
14
The intermediary addresses themselves are exposed to, or have transacted with, even more fraud
victim proceeds than were traceable to the OKX accounts.
16
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 17 of 75
52. This group of OKX Accounts then collectively transferred and consolidated funds
OKX Accounts
53. Among the details provided by OKX and Tether in their initial report to USSS was
the existence of the 144 OKX Accounts that appeared to be involved in linked activity, sharing
elements such as exact IP addresses used by the accounts, transaction counterparties, and
photographic traits in know-your-customer (“KYC”) information. This indicates that the 144 OKX
Accounts are all likely controlled by the same organized entity and interconnected for laundering
purposes. As stated earlier and further described below, 22 of the 144 OKX Accounts are
confirmed to have received cryptocurrency confidence scam victims’ virtual currency, while the
other accounts are believed to have been used to further launder the currency within the group’s
54. Specifically, nearly all of the 144 OKX Accounts were accessed via IP addresses
in the Philippines, and all were associated with email addresses using a specific and easily
identifiable naming convention—iCloud emails that featured seemingly random letters followed
17
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 18 of 75
55. The 144 OKX Accounts were all opened using Vietnamese identification
documents and KYC photos that, based on the background and identifiable items such as cameras
and artwork, appear to be taken in the same location. This an indicator that the accounts are
controlled by individuals working in a “scam compound,” or a location operating for the sole
56. Additionally, the 144 OKX Accounts all received and sent funds to the same
addresses. According to the Financial Action Task Force (FATF),16 frequent transfers to or from
the same transaction counterparties by more than one person from the same IP address is a red flag
transactions that complicate tracing but keep the funds within a set universe of virtual currency
addresses.
57. Virtual currency transactions involving accounts that send and receive funds from
the same counterparties using overlapping IP addresses can indicate concealment money
laundering by obscuring the origin and destination of funds through multiple transactions without
a legitimate business purpose. This indicates that the 144 OKX Accounts often transacted with the
15
A scam compound is a location where workers, often victims of human trafficking themselves,
work in conjunction to defraud victims and launder victim funds.
16
FATF is “the global money laundering and terrorist financing watchdog. It sets international
standards that aim to prevent these illegal activities and the harm they cause to society.” The
Financial Action Task Force, Our Topics, https://www.fatf-gafi.org/ (Last accessed Jun. 17, 2025).
17
According to a report released by FATF in September 2020 on Virtual Assets (VA) Red Flag
Indicators of Money Laundering (ML) and Terrorist Financing (TF), one of the red flag indicators
related to transaction patterns includes making frequent transfers in a certain period of time to the
same virtual asset (VA) account by more than one person; from the same IP address by one or
more persons; or concerning large amounts.
The Financial Action Task Force, FATF REPORT Virtual Assets Red Flag Indicators of Money
Laundering and Terrorist Financing https://www.fatf-gafi.org/content/dam/fatf-
gafi/reports/Virtual-Assets-Red-Flag-Indicators.pdf.coredownload.pdf (Sept. 2020).
18
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 19 of 75
same intermediary addresses used to launder stolen funds. This pattern suggests a single control
point attempting to mask the true source and ownership of the money, which is often seen in
layering and circular transactions designed to complicate virtual currency tracing. The lack of
geographic diversity and economic justification of these transactions, which accumulate fees,
combined with the questionable KYC information, further points to efforts to conceal the illicit
58. Rather than a “selfie” style photo, which is more common for KYC photos, the
KYC photos for the 144 OKX Accounts appear to be taken by a separate individual. Examples
59. In other instances, the KYC photos reveal that the account owners appear to be
located in the same facility, which may be a call center or scam compound. And in several cases,
they are seated next to each other. This is indicative of “mule” accounts established to help
facilitate the receipt and laundering of fraud funds. An example of KYC photos that appear to be
taken in the same location is depicted below. Specifically, two separate account owners are seated
next to each other with the same painting in the background. The two accounts associated with
19
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 20 of 75
these photos, which are among the 144 OKX Accounts, were used to receive large volumes of
funds believed to be associated with cryptocurrency confidence schemes, among potentially other
types of crimes.
60. In at least two of the 144 OKX Accounts, accounts were listed under the same
individual, utilizing the same ID card with identical identifiers but two separate KYC photos.
20
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 21 of 75
61. Additionally, in at least two instances, OKX Accounts were associated with KYC photos
depicting individuals holding or wearing a lanyard with the business name “ITECHNO Specialist Inc,”
62. Law enforcement has determined that ITECHNO Specialist Inc was a call center located
in Manila, Philippines. 19 Law enforcement located several job postings seeking applicants, including the
18
The “E” in ITECHNO is printed in a darker color that blends in with the lanyard.
19
It is currently unclear whether ITECHNO is still in existence or has changed its name and location.
21
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 22 of 75
63. The advertisement depicted above seeks Mandarin speaking customer service
representatives. It goes on to further state, “Powerful enterprise. We are recruiting a large number of
customer service staff, both men and women…” and “…traveling to the Philippines from other countries,
the company will bear the entire cost. Travel expenses are fully deductible after 3 months of
employment.” This description is consistent with the forced-labor call centers known to facilitate
cryptocurrency confidence schemes. 20 This also helps explain why each of the 144 OKX Accounts,
including the 22 OKX Accounts receiving funds traceable to known victims, was opened with
Vietnamese KYC documents but used IP addresses in the Philippines. The use of Vietnamese KYC
documents for the 144 OKX accounts connecting through Philippine-based IP addresses are consistent
64. An analysis of the IP addresses associated with logins to the 144 OKX Accounts revealed
overlap in IP addresses, further linking them to the custody and control of a coordinated group.
Specifically, 132 of the 144 OKX Accounts were accessed by at least one IP address that accessed two
or more other OKX accounts within the group of the 144 OKX Accounts. In several instances, a single
20
See supra note 4.
22
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 23 of 75
IP address was linked to as many as five separate OKX Accounts (out of the 144 OKX Accounts), such
as 175.176.40.136. Nearly all of these IP addresses resolved to domain hosting providers in the
Philippines. According to the previously mentioned FATF Red Flag Indicators of Money Laundering
report, a red flag indicator related to anonymity includes a large number of seemingly unrelated accounts
controlled from the same IP address. 21 In this instance, several accounts using the same IP addresses,
receiving fraud proceeds from the same schemes, opened with overlapping or suspicious Vietnamese
KYC information, demonstrate that the 144 OKX Accounts are interconnected in the money laundering
scheme.
65. Law enforcement analyzed the transactional activity associated with the 144 OKX
Accounts and observed over 263,000 deposit transactions that cumulatively totaled about three billion
dollars in transactions. Notably, 98% of these transactions were conducted between November 2022 and
November 2023. Within that one-year period, the 144 OKX Accounts involved in laundering victim
funds engaged in approximately 257,740 transactions, involving virtual currency worth approximately
$2,940,000,000. This creates an average of over 700 transactions moving more than $8 million per day
66. The combination of factors including the common Vietnamese KYC information used to
open these accounts that are almost exclusively accessed from the Philippines, the common transaction
counterparties, the shared and overlapping IP addresses, the suspicious and connected KYC photographs,
the ITECHNO job posting, the sheer amount of transactions—approximately 263,000 over their lifespan,
21
According to the previously mentioned FATF VA Red Flag Indicators of ML and TF report, a red flag
indicator related to anonymity includes a large number of seemingly unrelated virtual asset wallets
controlled from the same IP-address (or MAC-address), which may involve the use of shell wallets
registered to different users to conceal their relation to each other.
The Financial Action Task Force, FATF REPORT Virtual Assets Red Flag Indicators of Money
Laundering and Terrorist Financing https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Virtual-
Assets-Red-Flag-Indicators.pdf.coredownload.pdf (Sept. 2020).
23
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 24 of 75
and funds passing through the related 144 OKX Accounts—approximately $2,940,000,000—indicate
Victim Identification
67. In reviewing and tracing virtual currency in and out of these accounts, law enforcement
utilized the LIFO method of accounting, which assumes that the first output back-traced was funded by
the last input up to the amount of the original transaction deposited into one of the 144 OKX Accounts.
68. Among the deposit transactions, law enforcement was able to identify over 1,200
transactions where, based on interviews in this investigation, individuals believed to be scam victims sent
funds from virtual currency exchanges to addresses identified as part of the LIFO tracing. These
confidence scams, as identified based on interviews described below) located primarily in the U.S., but
also from the UK, Australia, and Germany. The victims ultimately sent over $19 million dollars to virtual
currency addresses at the direction of scammers. After being laundered through intermediary addresses,
portions of that $19 million arrived in the 22 OKX Accounts identified above.
69. Despite the large transaction count (i.e., 1,200 transactions), the funds (approximately $19
million) were initially sent by victims to only 93 different virtual currency addresses, which can be typical
of cryptocurrency confidence schemes where suspect-controlled scam addresses are used to receive funds
from multiple victims. These 93 different virtual currency addresses represent the addresses scammers
provided the victims, either directly or through scam websites, as the deposit address for their virtual
currency “investments”.
70. These 93 Initial Deposit Addresses were further analyzed and determined to have
collectively received over $62 million dollars. Suspected victim transactions to the 93 Initial Deposit
Addresses are believed to have started as early as on or about March 17, 2022. Addresses used in the
24
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 25 of 75
initial receipt of cryptocurrency confidence scam proceeds are likely to be utilized solely for the purpose
of receiving such funds, and likely all approximately $62 million dollars’ worth of virtual currency
deposited into those 93 Initial Deposit Addresses represents proceeds from additional cryptocurrency
confidence victims. In part, this is because those operating such fraud schemes do so full-time and
therefore do not have any significant alternative source of legitimate virtual currency income to send to
such deposit addresses. Moreover, combining legitimate with illegitimate income could create
operational risks for the operators of such fraud schemes as legitimate accounts might be subject to
scrutiny by those not involved in the offense conduct, such as accountants and staff at legitimate banks
and virtual currency exchanges. Furthermore, in the course of their investigation, law enforcement has
not found a witness who deposited funds into the 93 Initial Deposit Addresses for legitimate purposes.
71. USSS performed outreach to the individuals identified as senders to the Initial Deposit
Addresses identified by the back-tracing. As explained above, of the approximately 434 individuals
below, law enforcement successfully contacted 60 individuals 22 and learned that in all but one instance,
the individual reported being the victim of a cryptocurrency confidence scam. In addition to the 60
individuals interviewed, law enforcement also located 42 victim reports on complaint databases,
including the FBI’s Internet Crime Complaint Center (“IC3”) and Federal Trade Commission’s (“FTC”)
Consumer Sentinel systems, detailing cryptocurrency confidence scams that referenced some of the 93
22
Law enforcement received no response or was unable to reach the remaining victims. Victims of
cryptocurrency confidence scams are often reluctant to respond to outreach for fear that they are being
victimized once again. Indeed, in some scams, the perpetrators attempt to re-victimize existing victims
by posing as government authorities and then seeking financial payments/fees purportedly (but
fraudulently) represented as needed to secure the return of previously stolen funds.
23
Some of these victim reports were submitted by victims counted among the 60 confirmed, interviewed
victims.
25
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 26 of 75
72. Based on these determinations and the totality of the circumstances, the evidence suggests
all of the remaining funds that passed through the 93 Initial Deposit Addresses are funds tied to
73. The investigative team was able to back-trace victim funds from the 22 OKX Accounts
(among the 144 OKX Accounts) using LIFO. This is believed to represent a sampling of the overall
74. Further analysis of the remaining 122 OKX accounts determined that they received funds
directly and indirectly from many of the same addresses that directly transacted with the 22 OKX
Accounts.
75. Law enforcement determined that 71 of the 144 OKX Accounts received over
approximately $61 million dollars from the same addresses identified in the LIFO back-tracing as having
76. Additionally, another 19 OKX accounts similarly received funds that passed through the
same addresses identified in the LIFO back-tracing through numerous additional intermediary addresses.
24
The extraordinarily large volume of transactions involved in this case complicates cryptocurrency
tracing efforts, however, USSS deployed a strategic tracing session and methodology involving over a
dozen USSS personnel from throughout the country that helped identify large volumes of victims and
fraud traceable to the 144 OKX Accounts during a week-long law enforcement operation in Northern
California.
25
For the purpose of the chart on this page, “Final LIFO Addresses” references the counterparty addresses
directly sending known victim funds to the 22 OKX Accounts.
26
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 27 of 75
77. Actors involved in the laundering of proceeds from scams such as cryptocurrency
confidence schemes do not typically commingle clean funds with stolen funds outside of the purpose of
further laundering the cryptocurrency confidence scam funds. Therefore, the funds received from the
same intermediary addresses likely consist of the proceeds of cryptocurrency confidence scams, or
similar scams, and are commingled for the purpose of concealing, disguising, and laundering the funds.
78. Law enforcement observed that many of the 144 OKX Accounts, which are not all
referenced in the above illustration, did not in fact receive funds directly traceable through LIFO analysis
to cryptocurrency confidence scam victims in the same manner detailed above. Rather, they received
79. For example, two OKX accounts, which are part of the 22 OKX Accounts that law
enforcement identified as receiving proceeds traceable to cryptocurrency confidence scams, sent their
funds to numerous intermediary addresses that ultimately redeposited those funds into 38 of the 144 OKX
Accounts not already referenced in the illustration above. These are transactions that serve no legitimate
business purpose because each transaction incurs fees. These two OKX accounts represent one example
of the cyclical activity observed within the 144 OKX Accounts that appears to have been conducted to
obfuscate the true source of funds. The activity referenced above is illustrated below; values are
approximate:
27
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 28 of 75
80. For each of the 22 OKX Accounts with traceable scam proceeds, law enforcement
observed numerous instances where funds were sent from the victim’s initial account at a virtual currency
exchange to a suspect address (the 93 Initial Deposit Addresses). The funds were then sent through
numerous transactions in rapid succession in what appears to be an effort to obfuscate the nature, source,
control, and/or ownership of those proceeds, before they were ultimately deposited at one of the 22 OKX
accounts.
81. Sending virtual currency to several addresses in rapid succession can be evidence of
concealment money laundering as it suggests an attempt to obfuscate the origin and flow of funds through
a process known as “layering.” This technique involves quickly moving funds through multiple addresses
to create a complex web of transactions, making it difficult for investigators to trace the money back to
its source. The rapid, fragmented distribution of funds can mask the overall transaction patterns and
hinder the identification of the original illicit activity, thereby concealing the true ownership and origin
of the money. Transferring virtual currency between several addresses in rapid succession is likely not
for a legitimate business purpose because each transaction accumulates fees, and the owner therefore
approximately 434 suspected victims of cryptocurrency confidence scams involving common money
laundering transactions. These victims sent approximately $19 million dollars to addresses (i.e., the 93
28
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 29 of 75
Initial Deposit Addresses) whose funds were ultimately received by the 22 OKX Accounts. These 93
Initial Deposit Addresses received over $62 million dollars. Initial deposit addresses that scammers
provide to victims are typically exclusively used to receive and transfer victim proceeds rather than also
being used for licit transactions. This is because when many victims realize they have been scammed,
many report to law enforcement. Victims often provide the deposit address(es) where they sent their
virtual currency, which exposes these addresses to law enforcement scrutiny and invites potential for
freezes and seizures. Therefore, the funds sent to and from the 93 Initial Deposit Addresses likely
originate from additional, unidentified victims of cryptocurrency confidence or related scams. These
victim totals are believed to represent just a portion of the true magnitude of the scheme.
83. The victim funds were funneled through hundreds of intermediary addresses, starting with
the 93 Initial Deposit Addresses, then moving through intermediary addresses to the 22 OKX Accounts,
then through many of the remaining 122 OKX accounts (among the 144 OKX Accounts), and eventually
84. Because of the sheer volume of transactions and complex web of intermediary addresses,
tracing a single victim deposit all the way through to the SUBJECT VIRTUAL CURRENCY
ADDRESSES is incredibly time consuming for even a team of investigators. With hundreds of high-
frequency transactions designed to complicate tracing efforts, it is also difficult to determine which
outgoing transaction involves each specific input of fraud victim funds. Nonetheless, below are a few
examples of the tracing from start to finish, showing the strategy employed to obfuscate and conceal
transactions by intermingling traced victim funds with additional funds of unknown origins.
85. S.H. in Elkhart, KS. Among the list of victims whose funds are traceable to one or more
of the 22 OKX Accounts was S.H., formerly the CEO of Heartland Tri-State Bank in Elkhart, Kansas
who embezzled bank funds to invest on a virtual currency platform that turned out to be part of a
29
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 30 of 75
cryptocurrency confidence scam. In February 2024, S.H. was charged in the District of Kansas with bank
embezzlement for the theft of approximately $47.1 million dollars from the bank’s assets, and was later
sentenced to 293 months in prison after pleading guilty.26 According to a report released by the Federal
Reserve Board (“FRB”), Hanes embezzled nearly $50 million dollars in order to conduct wire transfers
as part of a cryptocurrency confidence scheme. 27 That is, Hanes was both perpetrator (embezzling funds
from the bank) and victim (to invest those funds in virtual currency as directed by subjects perpetrating
a cryptocurrency confidence scheme against him whereby they defrauded him of those embezzled funds).
86. S.H.’s funds were back-traced beginning at one of the 22 OKX Accounts whose deposit
address begins with 0x4c2f. This account received 11 deposits on or about August 14, 2023, totaling
approximately 197,597 USDT. 28 These funds were back-traced using the LIFO method through 17
transactions, or “hops,” to Kraken, a U.S.-based virtual currency exchange. Records reviewed from
Kraken identified S.H. as sending 3,116,350 USDT from his Kraken account on or about June 28, 2023,
to one of the 93 Initial Deposit Address (beginning with 0x03f9). An illustration of this flow of funds is
provided below:
26
United States Attorney’s Office District of Kansas, Former CEO of Failed Bank Sentenced to Prison,
https://www.justice.gov/usao-ks/pr/former-ceo-failed-bank-sentenced-prison, (Aug. 19, 2024).
27
Board of Governors of the Federal Reserve System, Material Loss Review of Heartland Tri-State Bank,
https://oig.federalreserve.gov/reports/board-material-loss-review-heartland-tri-state-bank-feb2024.pdf
(Feb. 7, 2024).
28
1 USDT is the equivalent to 1 US Dollar.
30
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 31 of 75
87. This transaction from S.H. to the 0x03f9 initial deposit address is consistent with FRB’s
report of the Heartland Tri-State Bank failure, which detailed a $3.3 million dollar wire transfer on June
27, 2023, from Heartland Tri-State Bank’s assets. As depicted above, Hanes’s initial virtual currency
deposit into the fraud scheme was $3.3 million dollars. It was transferred through 16 wallet addresses
before it arrived at the OKX exchange in one of the 22 OKX Accounts receiving illicit criminal proceeds.
Through exchange fees, laundering techniques, and peel chain-type movement, 29 the final amount of
victim funds to arrive at the 0x4c2f OKX address was less than the initial $3.3 million. This address is
connected to the SUBJECT VIRTUAL CURRENCY ADDRESSES because its associated OKX
account sent approximately $6 million in virtual currency to three intermediary addresses, one of which
29
A peel chain is a technique used to launder a large amount of virtual currency through a lengthy series
of minor transactions. It occurs when virtual currency sitting at one address is sent through a series of
transactions in which a slightly smaller amount of virtual currency is transferred to a new address each
time. In each transaction, some quantity of virtual currency “peels off” the chain to another address
(frequently, to be deposited into a virtual currency exchange), and the remaining balance is transferred
to the next address in the peel chain.
31
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 32 of 75
then transferred its funds to two of the SUBJECT VIRTUAL CURRENCY ADDRESSES, USDT
88. M.S. in La Vernia, TX. Another OKX account (i.e., one of the 22 OKX Accounts), whose
deposit address begins with 0x2bef, was back-traced using the LIFO method to a victim in La Vernia,
Texas. This OKX account received twelve deposits on or about May 22, 2023, totaling approximately
116,334 USDT. These funds were back-traced using the LIFO method through eleven transactions, or
hops, to Coinbase, another U.S.-based virtual currency exchange. Records reviewed from Coinbase
identified the sender as M.S. Law enforcement interviewed M.S. and determined that M.S. was a
cryptocurrency confidence scam victim who sent funds to one of the 93 Initial Deposit Addresses
89. Notably, the 0x414f address is a significant cryptocurrency confidence scam address,
having received nearly $3.6 million dollars in cryptocurrency. Law enforcement identified 39 individuals
who sent funds to this address. USSS has interviewed many of these individuals (counted among the
approximately 60 total victims interviewed), and the interviews along with IC3 and FTC complaints show
that this address has been used extensively for cryptocurrency confidence schemes.
90. Additional Victim Examples. Additional victims who reported transferring virtual
91. On February 29, 2024, a USSS Special Agent interviewed M.L., a victim who resides in
Phoenix, AZ. M.L. stated that in or around May 2023, he met an unknown woman on LinkedIn. M.L.
stated that he was quickly instructed by the female to continue conversation via encrypted mobile
30
0x414f61e4057ea79279e4970cfdad198ebe70092b
31
This list is not an exhaustive compilation of victim interviews conducted and represents a sampling of
the victims interviewed thus far.
32
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 33 of 75
applications WhatsApp and Telegram. M.L. said that he was subsequently introduced to virtual currency
investment by the female and promised significant investment returns on his money. Typically,
cryptocurrency confidence scams guarantee an unrealistic return on investment. M.L. stated that the
female sent him a link to “FX6,” and he was instructed to click on the link and access the “investment
platform.” M.L. sent funds to 0x414f believing that he was investing in a legitimate platform. M.L. stated
that he was able to withdraw $500 from his investment platform into his bank account. However, M.L.
stated that he was unable to withdraw additional funds from the platform and was subsequently locked
92. On or about March 18, 2024, USSS Special Agents interviewed D.M., who resides in
Alexandria, VA. D.M. reported that in approximately May 2023, he received a text message from an
unknown number. D.M. stated that an unknown subject identified herself as “Anne.” D.M reported that
Anne asked him to communicate via WhatsApp. D.M. stated that the subject was in the financial industry
and had offered to demonstrate trading virtual currency via “FX6 Pro.” The unknown subject eventually
convinced D.M. to download an app called AI TradeMateFX6Pro from the Apple Store. D.M. invested
$485,000 in virtual currency and reported receiving specific instruction for every transfer he conducted.
D.M. sent funds to 0x414f believing that he was using a legitimate platform. When D.M. attempted to
withdraw his funds from the platform, he was told he needed to pay the “taxes” 32 on his earning. D.M.
reported paying “taxes,” however he was told that he also needed to pay a late fee. D.M. stated that he
32
Cryptocurrency confidence scammers often allow victims to withdraw large sums of money, to boost
their confidence in the investment scheme.
See Ken Dilanian, With ‘pig butchering’ scams on the rise, FBI moves to stop the bleeding,
https://www.nbcnews.com/news/crime-courts/pig-butchering-scams-rise-fbi-moves-stop-bleeding-
rcna137009, (Feb. 5, 2024).
33
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 34 of 75
paid $63,000 for the late fee. D.M. stated that after paying the fee, he was still unable to withdraw his
funds from the platform and he reported losing $548,000 to the scam.
93. According to the FBI’s IC3, on or about March 3, 2024, a report was filed by R.M. R.M.
is a cryptocurrency confidence scam victim, who resides in Ankeny, Iowa. R.M. reported being contacted
by “Yunski Tang” on LinkedIn. R.M. reported that Tang described herself as a young Chinese
professional woman who was working in the U.S. R.M reported that Tang was looking for an experienced
mentor to help her understand American culture and asked R.M to communicate via WhatsApp. R.M.
reported that Tang then introduced him to virtual currency and subsequently convinced him to start
investing in the Bitdu platform. R.M. sent funds to 0x414f believing that he was investing in a legitimate
platform. R.M. observed what he believed to be a large financial gain on his initial transaction. R.M.
reported successfully withdrawing a few thousand dollars from his “investment account.” R.M. stated
that Tang told him that she had an intelligent uncle in San Francisco who knew the market. When R.M.
attempted to withdraw his funds from the platform but was told by Tang that he needed to deposit
investment taxes in the Bitdu Tax account or he would be charged with a federal crime of avoiding taxes.
R.M. reported losing contact with Tang and was unable to access the Bitdu website or the investment
94. T.D. in Laguna Beach, CA. In another instance, USDT deposits to one of the 22 OKX
Accounts, whose deposit address begins with 0x4c2fb, were back-traced using the LIFO method to T.D.,
a victim in Laguna Beach, California. Records reviewed from Kraken identified the victim as T.D., who
transferred nearly $50,000 to one of the Initial Deposit Addresses, which begins with 0x2b7c7. On or
about February 28, 2024, a USSS Special Agent interviewed T.D. T.D. stated that he was unaware that
he was a victim of a virtual currency scam. T.D. stated that a Chinese male, who identified himself as
Jason Liu Qiang, approached him during a real estate open house he was showing. T.D. stated that Qiang
34
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 35 of 75
introduced himself as a virtual currency trader and offered T.D. an opportunity to invest in YoBitPro.lol.
T.D. stated that Qiang quickly suggested that they communicate via WhatsApp. T.D. stated that Qiang
promised significant financial return for his investments and matched the amount of deposit into T.D.’s
platform account. T.D. reported transferring $250,000 into the platform and having over $1,200,000 in
profits. T.D. advised that he never attempted to withdraw any funds from the platform and did not think
it was suspicious. The Special Agent who interviewed T.D. advised T.D. that the investment platform is
a scam and to cease all payments and communication with Qiang. On March 5, 2024, USSS Special
Agents interviewed T.D. at his residence. T.D. advised that he attempted to withdraw his funds from the
investment platform and was asked to pay the “withdrawal taxes bill.” T.D. shared that he paid $50,000
for the fee and was still unable to withdraw the funds. T.D. was advised to not pay any additional fees
95. M.C. in Dallas, TX. Among the 22 OKX Accounts described in paragraphs above was
an account with a deposit address beginning with 0x029b, which was back-traced using the LIFO method
to M.C., a victim in Dallas, Texas. Records received from the virtual currency exchange Crypto.com
identified the victim as M.C., who transferred cryptocurrency worth over $420,000 to one of the 93 Initial
Deposit Addresses, which begins with 37HmBH. On February 29, 2024, a USSS Special Agent
interviewed M.C. M.C. stated that one year ago he was contacted by a female named Sophia via mobile
App “Salams.” M.C. stated that she immediately started to talk about virtual currency investment with
guaranteed financial returns. M.C. was provided a link by Sophia to a website “digfntz.com” to access
the investment platform. M.C. reports investing $1,900,000 into the platform. M.C. states that when he
attempted to withdraw his funds from the platform, he was asked to pay significant withdrawal fees. M.C.
stated that he refused to pay the fees and realized that he was scammed. M.C. stated that his account
35
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 36 of 75
balance with the investment platform was approximately $7,000,000. M.C. stated that he stopped
communicating with Sophia and subsequently lost access to his investment account.
96. These narratives are representative of similar stories told by all 60 victims interviewed by
law enforcement, as well as the IC3 and FTC reports referenced above, including for victims that were
97. Law enforcement personnel tracing the funds into the 22 OKX Accounts observed
multiple instances where different behaviors indicated efforts to obfuscate the source or destination of
funds. This included instances of chain hopping, where funds were sent from one blockchain to another,
sometimes swapping the type of cryptocurrency, like BTC to USDT. This activity breaks the pathway on
the blockchain for the funds and makes them more difficult to trace. Other behaviors include the rapid
movement of funds, with many tracings featuring transactions occurring within minutes of each other
over multiple hops. This pattern of activity was repeatedly noted during the tracing efforts and is an
indication of concealment money laundering. The remaining transactions and activity likely derive from
98. As discussed above, the typical pattern of fraud and laundering involved victims
transferring their “investment” funds into one of the 93 Initial Deposit Addresses. The criminal actors
then laundered the funds through several intermediary addresses before being consolidated into the 22
OKX accounts. In some instances, there were as few as eight intermediary addresses between the 93
Initial Deposit Addresses and one of the 22 OKX Accounts, while in others, there were nearly 100
intermediary addresses. Law enforcement performed additional analysis on the intermediary addresses
and discovered that these intermediary addresses were listed in additional cryptocurrency confidence
scam victim complaints as being involved in hundreds of millions more in victim losses. At times, the
36
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 37 of 75
intermediary addresses were listed as initial deposit addresses for additional cryptocurrency confidence
scam victims. At other times, investigators noticed intermediary addresses were used by scam operators
to launder funds believed to be from additional victims (outside of the victims identified in this
99. Simply put, not only were the 93 Initial Deposit Addresses linked to extensive amounts
of cryptocurrency confidence scam fraud, but so were the intermediary addresses that they sent funds to,
some of which also directly received cryptocurrency confidence scam proceeds from victims. The
presence of numerous victims of similar fraud is a likely indication that the intermediary addresses
involved were also used in the laundering of funds tied to cryptocurrency confidence scams, among
potentially other types of fraud, and that the funds received by the 22 OKX Accounts are either the
proceeds of a specified unlawful activity, to wit, wire fraud, directly traced to victims, or other funds of
unknown specific origins that, based on their transaction history patterns, are also believed to have been
100. The intermediary addresses themselves are listed in IC3 and FTC complaints as addresses
receiving approximately $68 million in cryptocurrency confidence scam victim funds in addition to the
$62 million received by the 93 Initial Deposit Addresses described previously. These are funds that were
then commingled in the laundering process with identified victims’ funds who deposited their virtual
Accounts receiving victim funds (which are part of the 144 OKX Accounts controlled by the same
perpetrators)—the tracing conducted by law enforcement, which shows the amount of fraud proceeds
related to each of those 22 OKX Accounts, as well as how the criminal actors used the intermediary
addresses to launder the funds before depositing them into the 22 OKX Accounts. In summary, the
37
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 38 of 75
identified 22 OKX Accounts received fraud funds not only from the victims identified in this
investigation, but also from additional individuals believed to be victims who deposited their money in
some of the intermediary addresses identified in this investigation. These funds were combined in the 22
OKX accounts, and then further laundered through the other 122 OKX accounts and additional
intermediary addresses before some of the funds eventually were transferred into the SUBJECT
102. Law enforcement back-traced funds from OKX account 374833979540566465 (“6465”)
and identified 14 intermediary addresses between the Initial Deposit Addresses and 6465’s deposit
address. These 14 addresses were used to launder proceeds traceable to additional cryptocurrency
confidence scams. Law enforcement located four IC3 cryptocurrency confidence scam victim reports that
reference three of the 14 intermediary addresses. The victim reports list a combined loss amount of
approximately $958,355.78. The presence of funds from multiple victims of similar fraud schemes within
the same network of addresses is a likely indication that the addresses are involved in the laundering of
fraudulently obtained funds. These addresses, used as intermediary addresses, as well as initial deposit
addresses for IC3 complainants, transferred funds to this 6465, including wire fraud proceeds, as part of
103. The three intermediary addresses referenced in the IC3 reports, which reported just below
$1,000,000 in fraud losses, have cumulatively received nearly $74 million dollars’ worth of virtual
currency. Typically, addresses used to initially receive criminal proceeds in cryptocurrency confidence
33
In paragraphs 102-187, “Initial Deposit Address” and “Initial Deposit Addresses” refer to virtual
currency addresses within the 93 Initial Deposit Addresses that are displayed in the tracing exhibit
accompanying the examples for each of the respective 22 OKX Accounts.
38
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 39 of 75
scams are likely to be utilized solely for the purpose of receiving such funds or otherwise involved in the
laundering of such funds to help further obfuscate the source, control, ownership, and destination of
funds.
105. Law enforcement back-traced funds from OKX account 389805680867066989 “6989”
and identified 20 intermediary addresses between the Initial Deposit Address and 6989’s deposit address.
These 20 addresses were used to launder proceeds traceable to cryptocurrency confidence scams. Law
enforcement located three cryptocurrency confidence scam IC3 reports that reference four of the 20
addresses. According to the IC3 reports, these addresses are tied to approximately $2,411,885 in victim
funds.
106. While the four addresses are associated with nearly $2.5 million in losses, they
cumulatively received over $124 million dollars in cryptocurrency. Typically, addresses used to initially
receive criminal proceeds in cryptocurrency confidence scams are likely to be utilized solely for the
purpose of receiving such funds or meant to be involved in the laundering of such funds to help further
107. This pattern of activity is illustrated in Exhibit 2 showing the series of hops for no
legitimate purpose, and the varied placement of the IC3-reported addresses (denoted in red) in the
laundering chain, used as both initial victim deposit addresses and intermediary addresses for further
concealment.
34
Addresses with victim reports denoted in red.
39
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 40 of 75
and identified 36 intermediary addresses between the Initial Deposit Addresses and 5732’s deposit
address. Law enforcement located 25 cryptocurrency confidence scam IC3 reports that reference six of
the 36 addresses as being involved in cryptocurrency confidence scam losses totaling approximately
$11,714,891.38.
109. These six addresses referenced in IC3 reports have cumulatively received over $240
million dollars in virtual currency. Typically, addresses used to initially receive criminal proceeds in
cryptocurrency confidence scams are likely to be utilized solely for the purpose of receiving such funds
or meant to be involved in the laundering of such funds to help further obfuscate the source, control,
110. This pattern of activity is illustrated in Exhibit 3, showing a series of transactions with
varying numbers of hops for no legitimate purpose between initial victim deposit addresses and the OKX
account, the mixed use of some addresses as both initial victim deposit addresses and intermediate
addresses for additional laundering, and the use of addresses to consolidate funds from multiple different
111. Law enforcement back traced funds from OKX account 373018233093155878 (“5878”)
and identified 34 intermediary addresses between the Initial Deposit Addresses and 5878’s deposit
address. Law enforcement located 10 cryptocurrency confidence scam IC3 reports that reference seven
of these 34 intermediary addresses. The IC3 reports describe these addresses as being linked to
40
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 41 of 75
112. In addition to identifiable losses, the seven addresses located in IC3 reports cumulatively
received over $368 million dollars. Typically, addresses used to initially receive criminal proceeds in
cryptocurrency confidence scams are likely to be utilized solely for the purpose of receiving such funds
or meant to be involved in the laundering of such funds to help further obfuscate the source, control,
113. This pattern of activity is illustrated in Exhibit 4 showing a series of transactions, with
varying number of hops, for no apparent legitimate purpose between initial victim deposit addresses and
5878, the mixed use of some addresses as both initial victim deposit addresses and intermediate addresses
for additional laundering, and use of addresses to consolidate funds from multiple different victims, all
and identified 40 intermediary addresses between the Initial Deposit Addresses and 8937’s deposit
address. Law enforcement located five cryptocurrency confidence scam IC3 reports that reference three
of the 40 intermediary addresses. The IC3 reports link these four addresses to approximately
115. The three addresses listed in the IC3 reports have cumulatively received over $114 million
dollars in total in cryptocurrency. Typically, addresses used to initially receive criminal proceeds in
cryptocurrency confidence scams are likely to be utilized solely for the purpose of receiving such funds
or meant to be involved in the laundering of such funds to help further obfuscate the source and
destination of funds.
116. This pattern of activity is illustrated in Exhibit 5, showing the numerous hops for no
legitimate purpose, the multipurpose role of addresses being used for victim deposits and intermediate
41
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 42 of 75
address laundering, and the distribution and consolidation of funds traced back to reported scam
addresses.
and identified 48 intermediary addresses between the Initial Deposit Addresses and 5505’s deposit
address. Law enforcement located 21 cryptocurrency confidence scam IC3 reports that reference 10 of
the 48 intermediary addresses and the victim reports link these 10 addresses to approximately
118. These 10 addresses mentioned in IC3 reports have cumulatively received nearly $37
million dollars in total in cryptocurrency. Typically, addresses used to initially receive criminal proceeds
in cryptocurrency confidence scams are likely to be utilized solely for the purpose of receiving such funds
or meant to be involved in the laundering of such funds to help further obfuscate the source, control,
119. This pattern of activity is illustrated in Exhibit 6, showing the convoluted web of
transactions serving no apparent legitimate purpose, and funds flowing from and through reported scam
addresses.
and identified nine intermediary addresses between the Initial Deposit Addresses and 3948’s deposit
address. Law enforcement identified an address that sent over $340,000 in USDT directly to one of the
nine intermediary addresses. Law enforcement located one cryptocurrency confidence scam IC3 report
42
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 43 of 75
121. The address listed in the IC3 report, which sends funds to one of the nine intermediary
addresses, has received over $197 million dollars. Typically, addresses used to initially receive criminal
proceeds of confidence scams are likely to be utilized solely for the purpose of receiving such funds or
meant to be involved in the laundering of such funds to help further obfuscate the source, control,
and identified 51 intermediary addresses between the Initial Deposit Addresses and 2927’s deposit
address. Law enforcement located nine cryptocurrency confidence scam IC3 victim reports that reference
six of the 51 intermediary addresses as being linked to approximately $3,923,508.21 in victim losses.
124. These six addresses referenced in cryptocurrency confidence scam IC3 reports have
cumulatively received nearly $445 million dollars in cryptocurrency. Typically, addresses used to
initially receive criminal proceeds of confidence scams are likely to be utilized solely for the purpose of
receiving such funds or meant to be involved in the laundering of such funds to help further obfuscate
125. This pattern of activity is illustrated in Exhibit 8, showing the convoluted web of
transactions serving no apparent legitimate purpose, and funds flowing from and through reported scam
addresses.
126. Law enforcement back-traced funds from OKX account 390147158499794973 (“4973”)
and identified 14 intermediary addresses between the Initial Deposit Address and 4973’s deposit address.
43
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 44 of 75
Law enforcement identified 31 cryptocurrency confidence scam IC3 reports that reference one of the 14
127. The address listed in the IC3 reports has received nearly $3.3 million dollars. Typically,
addresses used to initially receive criminal proceeds in cryptocurrency confidence scams are likely to be
utilized solely for the purpose of receiving such funds or meant to be involved in the laundering of such
funds to help further obfuscate the source, control, ownership, and destination of funds.
128. This pattern of activity is illustrated in Exhibit 9, showing the series of unnecessary hops,
and even circular flow of transactions, connected to the OKX account ending in 4973.
(“7569”) and identified eight intermediary addresses between the Initial Deposit Addresses and 7569’s
deposit address. Law enforcement identified four cryptocurrency confidence scam IC3 reports that
reference one of the eight addresses as being linked to approximately $417,357.16 in victim losses to
130. The address listed in IC3 reports has received nearly $55,000. Typically, addresses used
to initially receive criminal proceeds in cryptocurrency confidence scams are likely to be utilized solely
for the purpose of receiving such funds or meant to be involved in the laundering of such funds to help
132. Law enforcement back-traced funds from OKX account 386106564001588904 and
identified 19 intermediary addresses between the Initial Deposit Addresses and the OKX account’s
deposit address. Law enforcement located two cryptocurrency confidence scam IC3 reports and an FTC
44
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 45 of 75
report that reference two of the 19 addresses as being linked to approximately $170,390.00 in victim
losses.
133. The addresses mentioned in the IC3 and FTC reports have received over $165 million
dollars in cryptocurrency in total. Typically, addresses used to initially receive criminal proceeds in
cryptocurrency confidence scams are likely to be utilized solely for the purpose of receiving such funds
or meant to be involved in the laundering of such funds to help further obfuscate the source, control,
134. This pattern of activity is illustrated in Exhibit 11, showing the series of transactions with
135. Law enforcement back-traced funds from OKX account 384294632080738123 (“8123”)
and identified 19 intermediary addresses between the Initial Deposit Address and 8123’s deposit address.
Law enforcement located two cryptocurrency confidence scam IC3 reports that reference two of the 19
136. The addresses identified in IC3 reports have received nearly $11 million dollars in total.
Typically, addresses used to initially receive criminal proceeds in cryptocurrency confidence scams are
likely to be utilized solely for the purpose of receiving such funds or meant to be involved in the
laundering of such funds to help further obfuscate the source, control, ownership, and destination of
funds.
137. This pattern of activity is illustrated in Exhibit 12, showing numerous intermediary
addresses sending a series of transactions over a short period of time that appear to just serve laundering
purposes.
45
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 46 of 75
138. Law enforcement back-traced funds from OKX account 382867630484239151 (“9151”)
and identified 29 intermediary addresses between the Initial Deposit Addresses and 9151’s deposit
address. Law enforcement located one cryptocurrency confidence scam IC3 report that references one of
139. The address located on the IC3 report has received over $3 million dollars in
cryptocurrency in total. Typically, addresses used to initially receive criminal proceeds in cryptocurrency
scams are likely to be utilized solely for the purpose of receiving such funds or meant to be involved in
the laundering of such funds to help further obfuscate the source, control, ownership, and destination of
funds.
140. This pattern of activity is illustrated in Exhibit 13, showing the significant number of
transactions between the reported scam address and the OKX account, among other suspicious
transaction behavior.
and identified 35 intermediary addresses between the Initial Deposit Addresses and 3392’s deposit
address. Law enforcement located nine cryptocurrency confidence scam IC3 reports that reference seven
142. The addresses located in IC3 reports have received over $12 million dollars in
cryptocurrency in total. Typically, addresses used to initially receive criminal proceeds in cryptocurrency
confidence scams are likely to be utilized solely for the purpose of receiving such funds or meant to be
involved in the laundering of such funds to help further obfuscate the source, control, ownership, and
destination of funds.
46
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 47 of 75
143. This pattern of activity is illustrated in Exhibit 14, showing the series of laundering
transactions involving the reported scam addresses and various intermediary addresses used for further
and identified 65 intermediary addresses between the Initial Deposit Addresses and the OKX account’s
deposit address. Law enforcement located five cryptocurrency confidence scam IC3 reports that
references four of the 65 intermediary addresses as being liked to approximately $3,446,890.29 in victim
losses.
145. The addresses located in IC3 reports have received over $11 million dollars in
cryptocurrency in total. Typically, addresses used to initially receive criminal proceeds in cryptocurrency
confidence scams are likely to be utilized solely for the purpose of receiving such funds or meant to be
involved in the laundering of such funds to help further obfuscate the source, control, ownership, and
destination of funds.
146. This pattern of activity is illustrated in Exhibit 15, showing the significant distribution and
147. Law enforcement back-traced funds from OKX account 373015529134418962 (“8962”)
and identified 30 intermediary addresses between the Initial Deposit Address and 8962’s deposit address.
Law enforcement located one cryptocurrency confidence scam IC3 report that referenced one of the 30
47
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 48 of 75
148. The address listed in the IC3 report has received over $114 million dollars in total.
Typically, addresses used to initially receive criminal proceeds in cryptocurrency confidence scams are
likely to be utilized solely for the purpose of receiving such funds or meant to be involved in the
laundering of such funds to help further obfuscate the source and destination of funds.
150. Law enforcement back traced funds from OKX account 384001262326313296 (“3296”)
and identified 26 intermediary addresses between the Initial Deposit Addresses and 3296’s deposit
address. Law enforcement located 16 cryptocurrency confidence scam IC3 reports that reference seven
151. The addresses located on IC3 reports have received over $463 million dollars in total.
Typically, addresses used to receive criminal proceeds are likely to be utilized solely for the purpose of
receiving such funds or meant to be involved in the laundering of such funds to help further obfuscate
153. Law enforcement back traced funds from OKX account 436380439096268783 (“8783”)
and identified 97 intermediary addresses between the Initial Deposit Addresses and 8783’s deposit
address. Law enforcement located 19 cryptocurrency confidence scam IC3 reports that reference nine of
154. The addresses located on IC3 reports have received over $241 million dollars in total.
Typically, addresses used to initially receive criminal proceeds in cryptocurrency confidence scams are
48
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 49 of 75
likely to be utilized solely for the purpose of receiving such funds or meant to be involved in the
laundering of such funds to help further obfuscate the source, control, ownership, and destination of
funds.
and identified 21 intermediary addresses between the Initial Deposit Addresses and 3934’s deposit
address. Law enforcement located four cryptocurrency confidence scam IC3 reports that reference three
157. The addresses referenced in IC3 reports have received over $122 million dollars in
cryptocurrency in total. Typically, addresses used to initially receive criminal proceeds in cryptocurrency
confidence scams are likely to be utilized solely for the purpose of receiving such funds or meant to be
involved in the laundering of such funds to help further obfuscate the source, control, ownership, and
destination of funds.
158. This pattern of activity is illustrated in Exhibit 19, showing the numerous transactions
serving no apparent legitimate purpose involving multiple reported scam addresses and numerous
and identified 42 intermediary addresses between the Initial Deposit Addresses and 8999’s deposit
address. Law enforcement located nine cryptocurrency confidence scam IC3 reports that reference four
49
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 50 of 75
160. The addresses identified in IC3 reports have received over $37 million dollars in
cryptocurrency in total. Typically, addresses used to initially receive criminal proceeds in cryptocurrency
confidence cases are likely to be utilized solely for the purpose of receiving such funds or meant to be
involved in the laundering of such funds to help further obfuscate the source, control, ownership, and
destination of funds.
161. This pattern of activity is illustrated in Exhibit 20, showing a large series of transactions
and identified 10 intermediary addresses between the Initial Deposit Address and 1393’s deposit address.
Law enforcement identified a cryptocurrency confidence scam IC3 report that referenced one of the 10
163. The address located on the IC3 report has received over $294,000 dollars in
cryptocurrency in total. Typically, addresses used to initially receive criminal proceeds in cryptocurrency
confidence scams are likely to be utilized solely for the purpose of receiving such funds or meant to be
involved in the laundering of such funds to help further obfuscate the source, control, ownership and
destination of funds.
(“7907”) and identified 29 intermediary addresses between the Initial Deposit Addresses and 7907’s
deposit address. Law enforcement located two cryptocurrency confidence scam IC3 reports that
referenced two of the 29 addresses as being linked to approximately $500.77 in victim losses.
50
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 51 of 75
166. The addresses listed in the IC3 report has received over $111 million dollars in
cryptocurrency in total. Typically, addresses used to initially receive criminal proceeds in cryptocurrency
confidence scams are likely to be utilized solely for the purpose of receiving such funds or meant to be
involved in the laundering of such funds to help further obfuscate the source, control, and ownership and
destination of funds.
167. This pattern of activity is illustrated in Exhibit 22, showing numerous laundering
transactions across intermediary and victim deposit addresses consolidating and further distributing
funds.
168. During the initial investigation into ITECHNO Specialist Inc. and the cryptocurrency
confidence schemes associated with the aforementioned OKX accounts, law enforcement noted a pattern
of activity where funds were thoroughly laundered through exchanges, such as OKX (as detailed above),
before being withdrawn and then left unspent or idle at un-hosted virtual currency addresses.
169. Many of these addresses were being monitored by law enforcement throughout the
investigation. In approximately November 2023, law enforcement was advised of a planned Philippine
law enforcement operation in the Manila area involving a call center containing ITECHNO Specialist
Inc. This law enforcement operation at ITECHNO Specialist Inc. was reportedly halted on-site before
170. Though the law enforcement operation did not occur, it appears to have triggered a
substantial movement of illicit funds from some of the SUBJECT VIRTUAL CURRENCY
ADDRESSES (which had previously been idle). Likely, the threat of a law enforcement action triggered
the owners of these accounts to move funds in an effort to disguise and conceal the location, control, and
51
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 52 of 75
ownership of the funds and this indicated that those controlling the addresses were concerned about law
enforcement intervention.
171. Specifically, USDT Token Group A (one of the SUBJECT VIRTUAL CURRENCY
ADDRESSES), received dozens of deposits for over $155 million dollars’ worth of USDT beginning on
or about December 1, 2022, without a single outgoing transaction until November 15, 2023, around the
172. On or around November 20, 2023, USSS requested that Tether voluntarily freeze
approximately 225 million USDT at the SUBJECT VIRTUAL CURRENCY ADDRESSES as part of
this investigation.
173. Law enforcement’s tracing of crime proceeds in this case identified the presence of
intermediary addresses that were used to consolidate funds withdrawn from OKX, including the 22 OKX
Accounts. Law enforcement grouped the intermediary addresses into two groups, Intermediary Group 1
174. Intermediary Group 1 consists of 53 addresses that directly received over $800 million in
virtual currency from the 144 OKX Accounts, including approximately $120 million from just the 22
OKX Accounts. Intermediary Group 1 sent approximately $665 million in virtual currency to
Intermediary Group 2. Intermediary Group 1 also sent approximately $140 million in virtual currency
million to USDT Token Group A, approximately $41 million to USDT Token Group B, and
175. Intermediary Group 2 consists of 12 addresses that helped consolidate funds from
Intermediary Group 1, and then transferred funds directly to the SUBJECT VIRTUAL CURRENCY
52
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 53 of 75
ADDRESSES, including virtual currency worth approximately $91 million to USDT Token Group A,
approximately $30 million to USDT Token Group B, approximately $103 million to USDT Token Group
C, approximately $3 million to USDT Token Group D, approximately $109 million to USDT Token
Group E, approximately $65 million to USDT Token Group F, and approximately $20,000 to Token
Group G. Token Group G also sent approximately $5.44 million to Intermediary Group 2.
176. The Intermediary Groups, along with the SUBJECT VIRTUAL CURRENCY
ADDRESSES, also transferred hundreds of millions of dollars in virtual currency back and forth between
each other in a manner that appears consistent with the repeated efforts to conceal the nature, location,
source, ownership, and control of crime proceeds, and frustrate law enforcement’s tracing efforts. This
billion in funds over their lifetime. Notably, both of these addresses have served as a primary
consolidation point for approximately $655,16635 worth of funds directly traceable to confirmed and
35
This figure accounts for tracing described in this section, as well as other tracing for two additional
OKX accounts with addresses ending in “ed53” and “fa5d,” referenced within paragraph 207 below.
53
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 54 of 75
likely victims of cryptocurrency confidence scams, including G.B., as detailed below. The consolidation
addresses ending in a6b9 and b9ac sent approximately $62.4 million and $197.2 million in virtual
178. Between on or about March 18, 2023, and on or about March 19, 2023, OKX UID
382863414143418999 (one of the 144 OKX accounts) received deposits totaling approximately 361,000
period, the OKX account conducted an equal number of withdrawals within minutes of the deposits, all
179. Back-tracing of the original 361,000 USDT deposits identified six individuals believed to
be victims of cryptocurrency confidence scams, including four that have confirmed to law enforcement
that their transactions are the result of such scams. These six individuals sent cryptocurrency worth
approximately $632,332.67 to initial deposit addresses identified in the back-tracing, a portion of which
includes seven deposits totaling over $270,000 worth of virtual currency. Following LIFO, approximately
$263,000 36 in virtual currency can be traced to the a6b9 consolidation address. This flow of funds, which
included the use of 42 intermediary addresses prior to depositing into OKX, is illustrated below:
36
During the laundering process, some hops left behind portions of funds, or transferred them to other
addresses, reducing the LIFO traced amount from the original deposited amount.
54
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 55 of 75
180. On or about January 4, 2023, OKX UID 382867630484239151 (one of the 144 OKX
accounts) received deposits totaling nearly 123,000 USDT into deposit address
181. Back-tracing of the original 123,000 USDT deposits identified 25 individuals believed to
be victims of cryptocurrency confidence scams, including two that have confirmed to law enforcement
that their transactions are the result of such scams. These 25 individuals sent approximately $217,182.46
to initial deposit addresses identified in the back-tracing, a portion of which includes four deposits
totaling 28,000 USDT. Following LIFO, all 28,000 USDT can be traced to the a6b9 consolidation
address. This flow of funds, which included the use of 29 intermediary addresses prior to depositing into
182. Between on or about December 27, 2022, and on or about January 4, 2023, OKX UID
382898616072852403 (one of the 144 OKX accounts) received deposits totaling nearly 3.57 million
the OKX account conducted a nearly equal number of withdrawals within minutes of the deposits, all to
deposited to the a6b9 consolidation address, through the b9ac consolidation address.
183. Back-tracing of the original 3.57 million USDT deposits identified 19 individuals believed
to be victims of cryptocurrency confidence scams, including eight that have confirmed to law
55
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 56 of 75
enforcement that their transactions were the result of such scams. These 19 individuals sent
approximately $754,957.86 in virtual currency to initial deposit addresses identified in the back-tracing,
a portion of which includes 24 deposits totaling over $287,000 USDT. Following LIFO, approximately
$250,000 worth of virtual currency can be traced to the a6b9 consolidation address. This flow of funds,
which included the use of 64 intermediary addresses prior to depositing into OKX, is illustrated in Exhibit
24.
184. On or about May 21, 2023, OKX UID 389726439408283934 (one of the 144 OKX
accounts) received deposits totaling over 106,000 USDT into deposit address
185. Back-tracing of the original 106,000 USDT deposits identified 10 individuals believed to
be victims of cryptocurrency confidence scams, including two that have confirmed to law enforcement
that their transactions are the result of such scams. These 10 individuals sent approximately $377,184.30
to initial deposit addresses identified in the back-tracing, a portion of which includes eight deposits
totaling nearly 78,000 USDT. Following LIFO, approximately $7,700 in virtual currency can be traced
to the b9ac consolidation address. This flow of funds, which included the use of 21 intermediary
56
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 57 of 75
186. Between on or about May 13, 2023, and May 14, 2023, OKX UID 436380439096268783
(one of the 144 OKX accounts) received deposits totaling over 131,000 USDT into deposit address
conducted a nearly equal number of withdrawals within minutes of the deposits, all to address
187. Back-tracing of the original 131,000 USDT deposits identified eight individuals believed
to be victims of cryptocurrency confidence scams, including one that has confirmed to law enforcement
that their transactions are the result of such a scam. These eight individuals sent approximately
$86,195.23 to initial deposit addresses identified in the back-tracing, a portion of which includes one
deposit totaling over 71,000 USDT. Following LIFO, approximately $40,000 in virtual currency can be
traced to the a6b9 consolidation address. This flow of funds, which included the use of 11 intermediary
188. Law enforcement analyzed the source of network gas fees received into the Intermediary
Group 2 addresses and the SUBJECT VIRTUAL CURRENCY ADDRESSES and determined that
they presented strong connections to the 144 OKX Accounts. Blockchain networks, such as the Ethereum
network, where the funds relevant to this affidavit were transacted on, require fees to be paid in that
network’s native virtual currency. In the case of Ethereum, that native asset is ETH. Though this affidavit
primarily discusses the laundering of USDT, the movement of the USDT was facilitated through gas fees
57
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 58 of 75
paid in ETH. The following analysis details the gas payments and their connections between the OKX
189. As illustrated in Exhibit 27, the two primary consolidation addresses, a6b9 and b9ac,
provided the ETH funding, in some cases directly, to the remaining 10 intermediary addresses: 37
190. Law enforcement further back-traced the source of ETH from the 5a6b9 and b9ac
consolidation addresses to three OKX accounts, OKX UID 316574636496327938, OKX UID
OKX UID 430669787564277712 were already identified as being part of the 144 OKX Accounts, while
OKX UID 316574636496327938 has account subscriber characteristics that appear to link the account
to the same scheme. For example, the three OKX accounts maintain the same or similar email naming
convention (i.e., ‘c’ or letters followed by ten numbers (corresponding with their mobile numbers),
@icloud.com), are registered to Vietnamese owners, and at least two of the accounts appear to have KYC
photos potentially taken within the same office. OKX UID 316573777658046610 and OKX UID
316574636496327938 were also created within three minutes of each other, as seen below:
37
Intermediary Group 2 addresses are notated in Orange.
58
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 59 of 75
191. The following analysis details the gas fee payments and their connections between some
of the 144 OKX Accounts and most of the SUBJECT VIRTUAL CURRENCY ADDRESSES. The
results of this analysis indicate that those who control multiple SUBJECT VIRTUAL CURRENCY
ADDRESSES also control at least some of these OKX accounts which were also used for laundering
purposes.
59
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 60 of 75
192. As illustrated in Exhibit 28, the gas payment for USDT Token Group B, E, and F, which
originates from the b9ac address from Intermediary Group 2, can be traced back to OKX UID
316574636496327938 account is not one of the 144 OKX Accounts, this account is also consistent with
the same characteristics previously mentioned, such as being registered to a Vietnamese national in the
Philippines and uses the consistent email naming convention. Additionally, this account is accessed by
at least one IP address that has also accessed two of the 144 OKX Accounts. Specifically, IP
175.176.40.38 was used to access this user’s account, as well as that of OKX UID 405579019917082264
and 373874806833197907.
193. As illustrated in Exhibit 29, the gas payment for USDT Token Group C originates from
the a6b9 address from Intermediary Group 2, which can be traced back to OKX Account with UID
316573777658046610. This account’s registration information is consistent with the same characteristics
previously mentioned, such as being registered to a Vietnamese national in the Philippines and using the
consistent email naming convention. The same email address was also used for another OKX account,
194. As illustrated in Exhibit 30, the gas payment for USDT Token Group G originates from
OKX Account with UID 299286355324882944. This account is also consistent with the same
characteristics previously mentioned, such as being registered to a Vietnamese national in the Philippines
60
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 61 of 75
195. Cumulatively, these five USDT Token Groups with gas fee connections to these three
OKX accounts represent over 85% of the combined balance of funds sought in this complaint. This likely
demonstrates that the owners of the USDT Token Groups are also the owners of the three OKX accounts.
This further solidifies the connection of the 144 OKX accounts to the SUBJECT VIRTUAL
CURRENCY ADDRESSES. It shows that the owners of the three OKX accounts discussed in this
section, two of which were involved in receiving fraud proceeds and engaging in money laundering, paid
transactions fees to move laundered fraud funds from the 144 OKX Accounts into the SUBJECT
196. The launderers’ use of sophisticated money laundering techniques presents numerous
complex challenges to investigators when tracing victim funds from their initial deposit addresses all the
way to the SUBJECT VIRTUAL CURRENCY ADDRESSES. These challenges include the sheer
volume of transactions involved in the network of 144 OKX Accounts (hundreds of thousands), the use
of consolidation addresses used to accumulate hundreds of millions of dollars that redirects the LIFO
order, and the use of countless intermediary addresses that serve to both add additional difficulty to the
tracing efforts and also redirect the LIFO order. Nevertheless, using LIFO, investigators were able to
trace some victim funds in initial deposit addresses to some of the SUBJECT VIRTUAL CURRENCY
ADDRESSES. One such example is illustrated in Exhibit 31. Exhibit 31 condenses transactions in arrows
(describing multiple transactions) and shapes described as intermediary addresses to streamline the
197. The chart above illustrates the following flow of funds undertaken to launder victim funds,
namely:
61
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 62 of 75
198. Law enforcement interviewed Victim G.B., who confirmed that she was the victim of a
cryptocurrency confidence scam. G.B. sent approximately 37,566 USDT to an initial deposit address,
which then sent the entirety of G.B.’s funds within a few minutes to a consolidation address, and then
along to a series of additional addresses, all labeled as “13 Intermediary Addresses” above.
199. Victim G.B.’s funds were traced to the address ending in “f5f8” in the chart above. f5f8
then engaged in multiple circular transactions with several addresses, which serve no apparent legitimate
business or financial purpose and were likely undertaken for laundering purposes.
200. f5f8 sent some of Victim G.B.’s funds to the address ending in “b5ec” as part of an
withdrawal worth approximately 1,329,000 USDT. b5ec was likely used as a consolidation address to
commingle funds from other suspected victims who sent funds from Coinbase and Kraken accounts.38
201. b5ec then distributed funds, including some of Victim G.B.’s, in three nearly equal
amounts of approximately 500,000, 500,000, and 499,980 USDT to three addresses, all within a day.
While one of the receiving addresses sent the funds it received into an address that funded circular
transactions with f5f8, the other two addresses (ending in “45d8” and “8c7d”) sent the 500,000 USDT
they both received to addresses ending in “4547” and “cf24,” respectively, both within an hour of
receiving the 500,000 USDT. There is no logical economic purpose for transacting this way and are
202. Then, “4547” and “cf24” each sent 21 transfers, respectively, to separate OKX accounts,
ending in “ed53” and “fa5d.” These two OKX accounts are among the 22 OKX Accounts described
above. The subjects’ use of these OKX accounts was likely to help break the publicly visible flow of
funds on the blockchain, requiring law enforcement to have to seek records from the exchange to
38
The transaction history from the Coinbase and Kraken accounts listed on the chart above are consistent
with transaction histories for confirmed victims who sent funds into the 144 OKX Accounts money
laundering network. These victims are likely in the United Kingdom.
62
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 63 of 75
determine the connection between deposits and withdrawals. In other words, the use of OKX accounts
and infrastructure served the purpose of concealing or disguising the location, source, ownership, or
203. As with other tracing examples described above, the subjects then moved funds from the
OKX accounts in a large number of transfers (42) to multiple additional addresses (seven). The deposits
into the OKX accounts had corresponding 1:1 withdrawals, further evidencing that the OKX accounts
were used for concealment laundering purposes. One of these addresses, ending in “b9ac,” then deposited
approximately 4,529,900 USDT into USDT Token Group E, which includes approximately 4,466
204. The b9ac address that sent the transaction to USDT Token Group E containing Victim
G.B.’s funds also sent approximately 15,890,000 USDT to another address ending in “2c91,” which then
sent funds back to b9ac through a third address, 80ec, all within the span of two months.39 This type of
movement is common among cryptocurrency launderers to avoid leaving large USDT balances in single
addresses for too long, leaving them susceptible to potential freezes. These circular transactions, coupled
with the large volume of transfers described in the paragraph above, are additional evidence of the
laundering use of the addresses to transfer, conceal, and obfuscate victims’ funds.
205. For each of the SUBJECT VIRTUAL CURRENCY ADDRESSES, law enforcement
traced the flow of funds (as described above) from the 22 OKX Accounts through additional OKX
accounts, to include the other 122 OKX accounts controlled by this group, to one or more of the
39
These transactions are not shown in Exhibit 31.
63
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 64 of 75
206. The blockchain tracing revealed apparent money laundering activity. For example, the
ways in which the criminal actors withdrew funds from the 144 OKX Accounts was indicative, of efforts
to obscure the source of the funds. Those efforts included the use of 35 intermediary addresses (the “35
intermediary addresses”) between some of the 144 OKX Accounts and the SUBJECT VIRTUAL
CURRENCY ADDRESSES to further conceal the fact that the funds came from some of the 144 OKX
Accounts.
207. As illustrated in Exhibit 32,40 USDT Token Group A received funds through 29 of the 35
Token Group A in a funnel-like pattern indicative of concealment money laundering. These suspect-
controlled addresses appear to have been used as pass-through addresses to send victim funds from OKX
described above, consolidation addresses are used to commingle different victims’ funds after launderers
have dispersed them across many separate addresses to disguise the location, control, and ownership of
the funds.
referenced above received over 24,000 transfers directly from 117 of the 144 OKX Accounts for
approximately 370,109,739 USDT between on or about November 15, 2022, and September 19, 2023.
40
The red dot denotes Token Group A. The top dot denotes some of 144 OKX Accounts.
41
These 35 intermediary wallets were identified as being launderer-controlled because they were all used
to help launder funds passing from the 144 OKX Accounts to the SUBJECT VIRTUAL CURRENCY
ADDRESSES, both of which are also believed to be controlled by the same group of cryptocurrency
confidence scam money launderers.
64
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 65 of 75
209. USDT Token Group A maintained a balance of approximately 29,413,681 USDT before
210. Further analysis of the withdrawal activity from the 22 OKX Accounts and the 35
intermediary addresses determined that seven of the intermediary addresses were used to funnel
211. The analysis identified that six of the suspect-controlled intermediary addresses
referenced above received over 2,000 transfers directly from 114 of the 144 OKX Accounts for
212. The flow of funds through the seven suspect-controlled intermediary addresses to USDT
Token Group B is illustrated in Exhibit 33. 42 Note the similar consolidation of funds before they were
213. USDT Token Group B maintained a balance of approximately 30,000,000 USDT before
214. Further withdrawal analysis from the 144 OKX Accounts and the 35 intermediary
addresses between the 144 OKX Accounts and the SUBJECT VIRTUAL CURRENCY ADDRESSES
determined that six of the 35 intermediary addresses were used to funnel approximately102,816,042
42
The red dot denotes Token Group B. The top dot denotes some of 144 OKX Accounts.
65
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 66 of 75
215. The analysis identified that five of the suspect-controlled intermediary addresses
referenced above received nearly 400 transfers directly from 26 of the 144 OKX Accounts for
216. The flow of funds through the six suspect-controlled intermediary addresses to USDT
Token Group C is illustrated in Exhibit 34. 43 Note the consolidation of funds before they were sent to
USDT Token Group C, consistent with the laundering of funds for the other token groups. USDT Token
Group C maintained a balance of approximately 8,737,742 USDT before the tokens were burned and
217. Law enforcement’s analysis of the activity connected to the 35 intermediary addresses
determined that 17 of those addresses were used in the same funnel-like pattern to launder approximately
2,999,900 USDT from some of the 144 OKX Accounts to USDT Token Group D.
received over 19,000 transfers directly from 55 of the 144 OKX Accounts for approximately 244,505,536
USDT.
219. The flow of funds through the 17 suspect-controlled intermediary addresses to USDT
Token Group D is illustrated in Exhibit 35.44 There is a significant consolidation of funds into an
220. USDT Token Group D maintained a balance of approximately 2,903,914 USDT before
43
The red dot denotes Token Group C. The top dot denotes some of 144 OKX Accounts.
44
The red dot denotes Token Group D. The top dot denotes some of 144 OKX Accounts.
66
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 67 of 75
intermediary addresses determined that 25 of 35 intermediary addresses were used in the same funnel-
like pattern to launder approximately 76,891,075 USDT from the 144 OKX Accounts to USDT Token
Group E.
received over 22,000 transfers directly from 57 of the 144 OKX Accounts for approximately 284,082,297
USDT.
223. The flow of funds through the 25 suspect-controlled intermediary addresses to USDT
Token Group E is illustrated in Exhibit 36.45 The disbursed set of funds were consolidated into a handful
of addresses, before being consolidated into one address, which sent its funds to USDT Token Group E:
224. USDT Token Group E maintained a balance of approximately 2,137,276 USDT before
addresses determined that 25 of those addresses were used in the same funnel-like pattern to launder
approximately 64,707,697 USDT from some of the 144 OKX Accounts to USDT Token Group F,
including 17 suspect-controlled addresses that received over 22,000 transfers directly from 56 of the 144
45
The red dot denotes Token Group E. The top dot denotes some of 144 OKX Accounts.
67
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 68 of 75
USDT Token Group F is illustrated in Exhibit 37. 46 USDT Token Groups E and F received their funds
227. USDT Token Group F maintained a balance of approximately 64,707,709 USDT before
intermediary addresses determined that 17 of 35 intermediary addresses were used in the same funnel-
like pattern to launder approximately 59,017,221 USDT from some of the 144 OKX Accounts to USDT
Token Group G, including 15 suspect-controlled addresses that received over 18,000 transfers directly
intermediary addresses to USDT Token Group G is illustrated in Exhibit 38.47 Note the use of two
consolidation intermediary addresses before funds were sent to the USDT Token Group G.
230. USDT Token Group G maintained a balance of approximately 87,464,642 USDT before
that each interacted with the 35 suspect-controlled intermediary addresses that received funds from the
144 OKX Accounts. 24 of the 35 suspect-controlled intermediary addresses, and USDT Token Group G,
46
The red dot denotes Token Group F. The top dot denotes some of 144 OKX Accounts.
47
The red dot denotes Token Group G. The top dot denotes some of 144 OKX Accounts.
68
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 69 of 75
cumulatively received approximately 435,354,370 USDT directly from some of 144 OKX Accounts. 48
The 35 intermediary addresses in between the 144 OKX Accounts and the SUBJECT VIRTUAL
CURRENCY ADDRESSES were involved in a complex pattern of fund transfers that appear designed
to conceal the nature, source, location, ownership, and control of funds. This pattern, in Exhibit 39,
through OKX. 49
Group G, received funds directly from over 130 of the 144 OKX Accounts. In many instances, the
transfers were for similar amounts. For example, over 14,000 transfers were made in amounts between
approximately 9,000 USDT and 11,000 USDT. The sheer volume of transactions makes tracing each
233. In many instances, many of the 144 OKX Accounts were involved in the transfer activity
on the very same day to the same recipient addresses in a pattern indicative of concealment money
laundering.
234. For example, two of the 144 OKX Accounts featured nearly identical transfer activity to
the same recipient address on the same day. Specifically, on or about September 18, 2023, one user
initiated a small value transaction that appears to have been a test transaction, followed by 13 transfers
to one of the 35 suspect-controlled intermediary addresses for a total of approximately 249,896 USDT.
On the same day, another user also initiated an apparent test transaction, followed by 13 transfers to the
48
Many, but not all, of the 144 OKX Accounts transacted with the 35 intermediary addresses.
49
The 144 OKX Accounts are denoted in the graph as the upper center hexagon. The 35 suspect-
controlled intermediary addresses are denoted as grey dots. The SUBJECT VIRTUAL CURRENCY
ADDRESSES (A, B, C, D, E, F, and G) are denoted by red dots.
69
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 70 of 75
approximately 513,266,351 USDT from the 35 suspect-controlled intermediary addresses, which can be
traced back to many of the 144 OKX Accounts. This high value amount and volume of transactions,
236. As previously noted from the FATF Virtual Assets Red Flag Indicators of Money
Laundering and Terrorist Financing report, one of the red flag indicators related to transaction patterns
includes making frequent transfers in a certain period of time to the same virtual asset account by more
than one person; from the same IP address by one or more persons; or concerning large amounts. Other
red flags include the size and frequency of transactions. This includes converting the virtual assets to
multiple virtual assets, incurring additional transaction fees without logical business explanations (e.g.,
portfolio diversification), or withdrawing the virtual assets from a virtual asset service provider (“VASP”)
immediately to an unhosted wallet. This effectively turns the exchange/VASP into a money laundering
mixer. 50
237. Individuals engaged in money laundering often move proceeds of criminal activity
through multiple financial accounts, including virtual currency wallets, frequently at a rapid pace, and
often with no discernable legitimate purpose. Such individuals move proceeds in this fashion to hide the
financial connection between the illegal activity and the ultimate account. The rapid movement of funds
transferred from one address to another on the same blockchain, in the manner described above, has no
economic justification and is instead indicative of efforts to commit concealment money laundering by
obfuscating the flow and true source of funds. This is highlighted by the presence of 35 suspect-controlled
intermediary addresses and over 25,000 transfers between the 144 OKX Accounts and the SUBJECT
50
The Financial Action Task Force, FATF REPORT Virtual Assets Red Flag Indicators of Money
Laundering and Terrorist Financing https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Virtual-
Assets-Red-Flag-Indicators.pdf.coredownload.pdf (Sept. 2020).
70
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 71 of 75
VIRTUAL CURRENCY ADDRESSES. Each transfer incurred fees between approximately $1 and $5
at the time of the transaction, adding up to between $25,000 and $125,000 worth of fees, which would
be cost-ineffective for any legitimate activity. Additionally, the transaction behavior where funds are sent
to many addresses, only to subsequently consolidate into a few addresses in what would visually appear
to depict two funnels with the narrow part at either end has no apparent legitimate purpose and merely
exists to complicate tracing efforts. The blockchain analysis in this case demonstrates such conduct.
Specifically, the movement of the victims’ funds, received into an exchange, broken up, distributed
through a series of virtual currency addresses, and re-consolidated with other funds into the SUBJECT
convoluted, intermingled, and re-consolidated transactions—which incurred transaction fees and served
no apparent legitimate purpose—imply that the purpose of these numerous, fast-repeating, and
intermingled transactions was to conceal the nature, source, location, ownership and control of the
proceeds. As such, the SUBJECT VIRTUAL CURRENCY ADDRESSES facilitated and were
“involved in” the commission of concealment money laundering and are thus subject to forfeiture.
238. Additionally, in light of law enforcement’s determination that the 144 OKX Accounts,
which received traced and suspected cryptocurrency confidence scam proceeds, were opened in the
names and identities of individuals believed to be unrelated to the actual control or ownership of funds,
likely in an effort to conceal the true ownership or connections to known and unknown coconspirators,
the SUBJECT VIRTUAL CURRENCY ADDRESSES were used to commit concealment money
laundering as the ultimate recipient of many of the funds transferred out of the 144 OKX accounts.
239. In or around June 2024, an attorney from an international law firm claimed that their client
owned the funds associated with five of the SUBJECT VIRTUAL CURRENCY ADDRESSES. Over
71
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 72 of 75
the course of six months, counsel never provided answers to simple ownership questions concerning the
full legal name of the company, where their offices are located, or whether the company had a public
facing website. After nearly six months of the investigative team requesting basic information, counsel
240. In or around February 2025, an attorney from another law firm contacted the United States
on behalf of a client claiming that they owned the funds associated with five of the SUBJECT VIRTUAL
CURRENCY ADDRESSES. The attorney stated that their client was an online gaming/gambling
company named Infiniweb Technology, Inc. Open-source research regarding Infiniweb revealed minimal
information about the company, including an article stating that the company “is understood to have close
links with Xionwei Technologies, which is accused of being involved in kidnapping and human
trafficking. The accusations of kidnapping and human trafficking were outlined in a 120-page report from
2023, submitted to the nineteenth congress of the Republic of the Philippines.” 51 Inifiniweb was also
January 15, 2024, posted by the Philippine Amusement and Gaming Corporation. 52 The law firm
representing Infiniweb has not provided the United States with any additional information showing that
the funds associated with the SUBJECT VIRTUAL CURRENCY ADDRESSES are derived from
51
Philippe Auclair, Andy Brown, Jack Kerr, Samindra Kunti, Steve Menary, Meet the hydras: tracing
the illegal gambling operators that sponsor football https://www.playthegame.org/news/meet-the-
hydras-tracing-the-illegal-gambling-operators-that-sponsor-football/ (Jan. 30, 2024).
52
Philippine Amusement and Gaming Corporation, List Of Cancelled Offshore Gaming Licensees,
https://www.pagcor.ph/regulatory/pdf/offshore/list-of-cancelled-offshore-gaming-licensees.pdf (Jan. 15,
2024).
72
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 73 of 75
241. The paragraphs contained in this complaint are herein realleged and incorporated by
reference.
242. The Defendant Property includes property constituting or derived from proceeds traceable
to wire fraud and conspiracy to commit wire fraud, in violation of 18 U.S.C. §§ 1343 and 1349.
243. Accordingly, the Defendant Property is subject to forfeiture to the United States under 18
U.S.C. § 981(a)(1)(C).
244. The paragraphs contained in this complaint are herein realleged and incorporated by
reference.
245. The Defendant Property constitutes property involved in concealment money laundering
transactions committed in violation of Title 18, United States Code, Sections 1956(a)(1)(B)(i) and
conspiracy to engage in money laundering, committed in violation of Title 18, United States Code,
Section 1956(h).
246. Accordingly, the Defendant Property is subject to forfeiture to the United States under 18
U.S.C. § 981(a)(1)(A).
WHEREFORE, the United States of America prays that notice issue on the Defendant Property
as described above; that due notice be given to all parties to appear and show cause why the forfeiture
should not be decreed; that this Honorable Court issue a warrant of arrest in rem according to law; that
judgment be entered declaring that the Defendant Property be forfeited to the United States of America
for disposition according to law; and that the United States of America be granted such other relief as
73
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 74 of 75
Respectfully submitted,
74
Case 1:25-cv-01907-AHA Document 1 Filed 06/18/25 Page 75 of 75
VERIFICATION
I, Meredith Williams, a Special Agent with the Federal Bureau of Investigation, declare under
penalty of perjury, pursuant to 28 U.S. C. § 1746, that the foregoing Verified Complaint for Forfeiture in
rem is based upon reports and information known to me and/or furnished to me by other law enforcement
�xt Y1�<
Meredith Williams,
Special Agent
Federal Bureau oflnvestigation