The post Young California Man Admits Role in $263M Bitcoin Theft and Laundering Scheme appeared on BitcoinEthereumNews.com. The SE Enterprise crypto theft ring involved a coordinated group that stole over $263 million in Bitcoin from a Washington, D.C. victim and targeted others across the U.S. Evan Tangeman, a 22-year-old from California, pleaded guilty to helping launder at least $3.5 million for the operation. SE Enterprise used social engineering tactics, including fake calls and burglaries, to access victims’ crypto holdings. The group operated from October 2023 through at least May 2025, with members specializing in hacking, laundering, and theft. Prosecutors applied RICO charges to treat the ring as an organized criminal enterprise, similar to mafia operations, leading to multiple guilty pleas. Discover the details of the SE Enterprise crypto theft ring and Evan Tangeman’s guilty plea in this major Bitcoin heist case. Learn how authorities are combating such sophisticated schemes—stay informed on crypto security today. What is the SE Enterprise Crypto Theft Ring? The SE Enterprise crypto theft ring was a sophisticated criminal operation that targeted cryptocurrency holders through social engineering and physical theft, stealing approximately $263 million in Bitcoin from a single victim in Washington, D.C., and hundreds of millions more nationwide. The group, active from no later than October 2023 through at least May 2025, functioned like an organized crime syndicate with specialized roles including hackers, callers impersonating exchange support, launderers, and burglars. Federal prosecutors invoked the Racketeer Influenced and Corrupt Organizations (RICO) Act to charge members, emphasizing the interconnected nature of their activities. How Did the SE Enterprise Execute Their Crypto Thefts? The SE Enterprise crypto theft ring relied on a multi-layered approach to breach victims’ defenses and launder proceeds. Members began by identifying targets through online gaming platforms, where friendships formed the basis of recruitment. Database hackers accessed personal information, while “callers” posed as representatives from major cryptocurrency exchanges or email providers to trick… The post Young California Man Admits Role in $263M Bitcoin Theft and Laundering Scheme appeared on BitcoinEthereumNews.com. The SE Enterprise crypto theft ring involved a coordinated group that stole over $263 million in Bitcoin from a Washington, D.C. victim and targeted others across the U.S. Evan Tangeman, a 22-year-old from California, pleaded guilty to helping launder at least $3.5 million for the operation. SE Enterprise used social engineering tactics, including fake calls and burglaries, to access victims’ crypto holdings. The group operated from October 2023 through at least May 2025, with members specializing in hacking, laundering, and theft. Prosecutors applied RICO charges to treat the ring as an organized criminal enterprise, similar to mafia operations, leading to multiple guilty pleas. Discover the details of the SE Enterprise crypto theft ring and Evan Tangeman’s guilty plea in this major Bitcoin heist case. Learn how authorities are combating such sophisticated schemes—stay informed on crypto security today. What is the SE Enterprise Crypto Theft Ring? The SE Enterprise crypto theft ring was a sophisticated criminal operation that targeted cryptocurrency holders through social engineering and physical theft, stealing approximately $263 million in Bitcoin from a single victim in Washington, D.C., and hundreds of millions more nationwide. The group, active from no later than October 2023 through at least May 2025, functioned like an organized crime syndicate with specialized roles including hackers, callers impersonating exchange support, launderers, and burglars. Federal prosecutors invoked the Racketeer Influenced and Corrupt Organizations (RICO) Act to charge members, emphasizing the interconnected nature of their activities. How Did the SE Enterprise Execute Their Crypto Thefts? The SE Enterprise crypto theft ring relied on a multi-layered approach to breach victims’ defenses and launder proceeds. Members began by identifying targets through online gaming platforms, where friendships formed the basis of recruitment. Database hackers accessed personal information, while “callers” posed as representatives from major cryptocurrency exchanges or email providers to trick…

Young California Man Admits Role in $263M Bitcoin Theft and Laundering Scheme

2025/12/09 14:53
  • SE Enterprise used social engineering tactics, including fake calls and burglaries, to access victims’ crypto holdings.

  • The group operated from October 2023 through at least May 2025, with members specializing in hacking, laundering, and theft.

  • Prosecutors applied RICO charges to treat the ring as an organized criminal enterprise, similar to mafia operations, leading to multiple guilty pleas.

Discover the details of the SE Enterprise crypto theft ring and Evan Tangeman’s guilty plea in this major Bitcoin heist case. Learn how authorities are combating such sophisticated schemes—stay informed on crypto security today.

What is the SE Enterprise Crypto Theft Ring?

The SE Enterprise crypto theft ring was a sophisticated criminal operation that targeted cryptocurrency holders through social engineering and physical theft, stealing approximately $263 million in Bitcoin from a single victim in Washington, D.C., and hundreds of millions more nationwide. The group, active from no later than October 2023 through at least May 2025, functioned like an organized crime syndicate with specialized roles including hackers, callers impersonating exchange support, launderers, and burglars. Federal prosecutors invoked the Racketeer Influenced and Corrupt Organizations (RICO) Act to charge members, emphasizing the interconnected nature of their activities.

How Did the SE Enterprise Execute Their Crypto Thefts?

The SE Enterprise crypto theft ring relied on a multi-layered approach to breach victims’ defenses and launder proceeds. Members began by identifying targets through online gaming platforms, where friendships formed the basis of recruitment. Database hackers accessed personal information, while “callers” posed as representatives from major cryptocurrency exchanges or email providers to trick victims into revealing wallet credentials or two-factor authentication codes. In one prominent case, co-defendants Malone Lam and Danish Zulfiqar allegedly drained over 4,100 BTC—valued at about $263 million at the time—from a D.C. resident, a sum that has since appreciated to over $370 million.

Physical elements amplified the threat: operatives conducted in-person burglaries to steal hardware wallets directly from victims’ homes. After thefts, the group converted stolen assets into privacy-focused cryptocurrencies like Monero to obscure trails, then routed funds through opaque exchanges and cash-out brokers. Evan Tangeman’s involvement included transforming digital crypto into bulk fiat currency, securing luxury rentals under false names, and assisting in immediate cash collections post-heist. He also monitored security feeds during an FBI raid on Lam’s Miami home and directed the destruction of digital evidence to impede investigations.

According to the U.S. Justice Department, the operation’s scale justified RICO charges, originally designed for mafia and drug cartels, allowing prosecutors to prosecute the enterprise as a unified entity. A recent superseding indictment added three new defendants—Nicholas Dellecave, Mustafa Ibrahim, and Danish Zulfiqar—further expanding accountability. Authorities, aided by blockchain analysts like ZachXBT, traced funds through mixers and peel chains, leading to arrests such as Lam and Jeandiel Serrano in September 2024 on fraud and money-laundering counts.

Ari Redbord, Global Head of Policy at TRM Labs, highlighted the unique dangers: “The speed of crypto allows stolen assets to be moved at the speed of the internet, while the use of violence or threats adds an immediate physical layer of risk for victims, creating a hybrid threat model that law enforcement and the private sector are now confronting head-on.” Redbord, experienced in both violent and cyber crimes, noted that RICO’s application signals a shift toward viewing these incidents as organized operations rather than isolated events, enabling comprehensive charges under one legal framework.

Frequently Asked Questions

What Role Did Evan Tangeman Play in the SE Enterprise Crypto Theft?

Evan Tangeman, a 22-year-old from California, admitted in federal court in Washington, D.C., to participating in the racketeering conspiracy of the SE Enterprise. He specifically helped launder at least $3.5 million in stolen funds by converting cryptocurrency to cash, securing properties under aliases, and aiding in evidence destruction. Tangeman faces sentencing on April 24, 2026, before a U.S. District Judge.

How Are Authorities Tackling Crypto Theft Rings Like SE Enterprise?

Authorities are using advanced blockchain forensics and RICO statutes to dismantle groups like SE Enterprise, treating them as cohesive criminal organizations. Collaboration with experts such as ZachXBT has been key in tracing laundered funds, while arrests and indictments target leaders and specialists alike. This integrated approach addresses both digital and physical threats to enhance victim protection and deter future schemes.

Key Takeaways

  • Sophisticated Social Engineering: The SE Enterprise combined online deception with real-world burglaries, stealing over $263 million from one victim alone and targeting many others.
  • RICO’s Role in Prosecution: By applying organized crime laws, prosecutors can link diverse crimes like hacking, laundering, and violence into a single case, as seen with nine guilty pleas including Evan Tangeman’s.
  • Ongoing Crypto Security Needs: Victims and exchanges should prioritize multi-factor authentication, hardware wallets, and awareness of social engineering to mitigate risks from hybrid threats.

Conclusion

The guilty plea of Evan Tangeman marks a significant step in dismantling the SE Enterprise crypto theft ring, underscoring the evolving threats in the cryptocurrency space where digital speed meets physical coercion. With over $263 million stolen in Bitcoin from a D.C. victim and broader national impacts, federal efforts using RICO charges demonstrate a robust response to these organized schemes. As blockchain analysis tools advance and collaborations strengthen, the crypto community can anticipate improved safeguards, encouraging holders to adopt vigilant practices for a more secure future.

Source: https://en.coinotag.com/young-california-man-admits-role-in-263m-bitcoin-theft-and-laundering-scheme

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

BFX Presale Raises $7.5M as Solana Holds $243 and Avalanche Eyes $1B Treasury — Best Cryptos to Buy in 2025

BFX Presale Raises $7.5M as Solana Holds $243 and Avalanche Eyes $1B Treasury — Best Cryptos to Buy in 2025

BFX presale hits $7.5M with tokens at $0.024 and 30% bonus code BLOCK30, while Solana holds $243 and Avalanche builds a $1B treasury to attract institutions.
Share
Blockchainreporter2025/09/18 01:07
OCC Findings Suggest Major U.S. Banks Restricted Access for Digital Asset Firms Amid Debanking Probe

OCC Findings Suggest Major U.S. Banks Restricted Access for Digital Asset Firms Amid Debanking Probe

The post OCC Findings Suggest Major U.S. Banks Restricted Access for Digital Asset Firms Amid Debanking Probe appeared on BitcoinEthereumNews.com. The Office of the Comptroller of the Currency (OCC) has confirmed that nine major U.S. banks engaged in debanking practices from 2020 to 2023, restricting access for digital asset firms and other sectors. This marks the first official acknowledgment of these policies, which limited services based on customer types, affecting crypto businesses significantly. OCC report highlights inappropriate distinctions by banks like JPMorgan Chase and Bank of America, targeting crypto and high-risk sectors. Nine banks reviewed showed similar policies restricting customer access without objective risk assessments. Impacted industries include digital asset firms, with potential referrals to the Attorney General for unlawful practices. Discover how major U.S. banks’ debanking policies hit crypto firms hard, per OCC’s 2025 report. Learn the implications for digital assets and what regulators are doing next—stay informed on banking risks today! What Are the OCC’s Findings on Banks Debanking Crypto Firms? Banks debanking crypto firms involves major financial institutions limiting or denying services to digital asset businesses based on perceived risks, as detailed in a recent Office of the Comptroller of the Currency (OCC) report. From 2020 to 2023, nine of the largest U.S. banks implemented policies that required escalated reviews or outright restrictions for certain customers, including those in the crypto sector. This practice, now publicly confirmed, underscores ongoing tensions between traditional banking and emerging digital asset industries. How Did These Debanking Practices Affect Digital Asset Companies? The OCC’s six-page report, released on Wednesday, revealed that institutions such as JPMorgan Chase, Bank of America, Citigroup, Wells Fargo, U.S. Bancorp, Capital One, PNC Financial Services Group, Toronto-Dominion Bank, and Bank of Montreal made distinctions among customers that were deemed inappropriate. For digital asset firms, this meant heightened scrutiny or complete denial of banking services, hindering operations in an already volatile market. The regulator noted that these policies spanned…
Share
BitcoinEthereumNews2025/12/11 11:01