DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Alleged Russian Cryptocurrency Money Launderer Extradited to United States

Posted on August 5, 2022 by Dissent

The alleged operator of the illicit cryptocurrency exchange BTC-e was extradited yesterday from Greece to the United States to face charges in the Northern District of California.

“After more than five years of litigation, Russian national Alexander Vinnik was extradited to the United States yesterday to be held accountable for operating BTC-e, a criminal cryptocurrency exchange, which laundered more than $4 billion of criminal proceeds,” said Assistant Attorney General Kenneth A. Polite, Jr. of the Justice Department’s Criminal Division. “This extradition demonstrates the Department’s commitment to investigating and dismantling illicit cyber activity and would not have been possible without the relentless work of the Justice Department’s Office of International Affairs. The Justice Department thanks the Government of Greece, particularly the Ministry of Justice, for all their efforts in securing the defendant’s transfer to the United States.”

Alexander Vinnik, 42, a Russian citizen, was charged in a 21-count superseding indictment in January 2017. Vinnik was taken into custody in Greece in July 2017 at the request of the United States. He made his initial appearance earlier today in federal court in San Francisco before U.S. Magistrate Judge Sallie Kim.

According to the indictment, Vinnik and his co-conspirators allegedly owned, operated, and administrated BTC-e, a significant cybercrime and online money laundering entity that allowed its users to trade in bitcoin with high levels of anonymity and developed a customer base heavily reliant on criminal activity.

The indictment alleges BTC-e facilitated transactions for cybercriminals worldwide and received criminal proceeds from numerous computer intrusions and hacking incidents, ransomware scams, identity theft schemes, corrupt public officials, and narcotics distribution rings, and was used to facilitate crimes ranging from computer hacking, to fraud, identity theft, tax refund fraud schemes, public corruption, and drug trafficking. The investigation has revealed that BTC-e received more than $4 billion worth of bitcoin over the course of its operation.

Despite doing substantial business in the United States, the indictment alleges that BTC-e was not registered as a money services business with the U.S. Department of Treasury, had no anti-money laundering process, no system for appropriate “know your customer” or “KYC” verification, and no anti-money laundering program as required by federal law.

In 2017, FinCEN assessed a civil money penalty against BTC-e for willfully violating U.S. anti-money laundering (AML) laws and against Vinnik for his role in the violations. A civil matter to enforce civil monetary penalties, in the amount of $88,596,314 as to BTC-e and $12 million as to Vinnik, is pending in the Northern District of California.

The indictment charges BTC-e and Vinnik with one count of operation of an unlicensed money service business, and one count of conspiracy to commit money laundering. In addition, the indictment charges Vinnik with 17 counts of money laundering and two counts of engaging in unlawful monetary transactions.

The FBI, IRS Criminal Investigation (Oakland Field Office and Cyber Crime Unit, Washington, D.C.), Homeland Security Investigations, and U.S. Secret Service Criminal Investigative Division are investigating the case.

Trial Attorney C. Alden Pelker of the Justice Department’s Computer Crime and Intellectual Property Section, and Assistant U.S. Attorney Claudia Quiroz of the U.S. Attorney’s Office for the Northern District of California are prosecuting the case.

The Justice Department’s National Cryptocurrency Enforcement Team provided substantial assistance. The extradition request was handled by the Justice Department’s Office of International Affairs.

The Justice Department thanks the Greek Ministry of Justice for its cooperation in securing the defendant’s transfer to the United States.

An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Source: Department of Justice


Related:

  • Maintenance Note
  • CISA Alert: Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094
  • System Status Note
  • System Status Note
  • System Status Note
  • Fraudster's fake data breach claims should remind media to be careful what we report
Category: Uncategorized

Post navigation

← NHS 111 service vendor hit by cyberattack that sounds like ransomware incident
‘They completely ignored us’: More doctors claim stonewalling by Eye Care Leaders during breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • From bad to worse: Doctor Alliance hacked again by same threat actor
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.