Security

Cyber-crime

Dark web crypto laundering kingpin sentenced to 12.5 years in prison

Prosecutors hand Russo-Swede a half-billion bill


The operator of the longest-running money laundering machine in dark web history, Bitcoin Fog, has been sentenced to 12 years and six months in US prison.

Roman Sterlingov, 36, a Russian-Swedish national, was also ordered to repay more than half a billion dollars accrued from the cryptocurrency mixing service that he ran for a decade between 2011 and 2021.

Bitcoin Fog was assessed to have processed 1.2 million Bitcoin during that time, worth roughly $400 million at the time it was shuttered. Of this, Sterlingov was ordered to repay $395,563,025.39 in restitution, forfeit roughly $1.76 million in seized assets, and relinquish control of Bitcoin Fog's wallet containing more than $100 million in Bitcoin.

He was found guilty back in March, at which point he faced a maximum 50-year sentence. Prosecutors said the vast majority of Sterlingov's wealth came from the proceeds of crime in which he and his online service helped criminals hide from law enforcement.

The court heard that the crimes associated with this activity included the sale of drugs, computer misuse offenses, identity theft, and child sexual abuse material (CSAM).

"Roman Sterlingov laundered over $400 million in criminal proceeds through Bitcoin Fog, his cryptocurrency 'mixing' service that was open for business to criminals looking to hide dirty money," said Principal Deputy Assistant Attorney General Nicole M Argentieri, head of the Justice Department's Criminal Division. 

"Through his illicit money laundering operation, Sterlingov helped criminals launder proceeds of drug trafficking, computer crime, identity theft, and the sexual exploitation of children.

"Today's sentencing underscores the Justice Department's commitment to holding those who facilitate criminal activity fully accountable for their crimes. I am especially proud of the dedicated investigators and prosecutors who worked tirelessly to unmask and prosecute the Bitcoin Fog scheme."

There are many cryptocurrency mixers available to criminals, so the downfall of Bitcoin Fog won't put a significant dent in their use. However, investigators will be pleased that a service as relied upon as Sterlingov's could be scuppered and distrust sown throughout the community of criminals who use them.

Different cryptocurrencies claim to offer varying levels of anonymity, although law enforcement agencies have become adept at tracking criminals across most of the major blockchains over time.

It's obviously in the criminals' best interests to be as untraceable along these blockchains as possible. Mixers make investigators' jobs a great deal more difficult by pooling all users' funds together – many different crypto tokens belonging to different people – and redistributing them back to the users after taking a cut for the trouble.

They're not illegal in most places. If they're not being abused to launder the proceeds of crime, there's not much to attract law enforcement. That said, they are indeed widely abused, which is why action is taken to end the more popular ones.

Legitimate uses of mixers can be found in oppressive regimes that heavily monitor payments made by citizens. Using mixers can help pay for legal goods and services more anonymously, should someone wish to do so. ®

Send us news
24 Comments

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

Bitfinex heist gets the Netflix treatment after 'cringey couple' sentenced

Streamer's trademark dramatic style takes on Bitcoin Bonnie and Clyde

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Infosec experts divided on AI's potential to assist red teams

Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the 'known senders' setting