$250 million cryptocurrency theft: Unraveling the truth behind the century's heist within a month

CN
链捕手
Follow
4 hours ago

Original Title: They Stole a Quarter-Billion in Crypto and Got Caught Within a Month Original Author: Mitch Moxley Original Translation: zhouzhou, BlockBeats

Editor’s Note: This article tells the story of a crime incident triggered by cryptocurrency theft. ZachXBT tracked the luxurious lifestyle of suspect Lam through social media and assisted law enforcement in the investigation. Lam and other accomplices used complex money laundering techniques but were ultimately caught by the police. Meanwhile, another kidnapping case was also linked to this criminal group, involving several men from Florida. The case reveals how cybercrime is gradually evolving into more violent real-world crime, and ultimately, the police successfully recovered the stolen Bitcoin and related evidence.

The following is the original content (reorganized for better readability):

On August 25, 2024, on a hot afternoon, Sushil and Radhika Chetal were viewing a house in an upscale neighborhood in Danbury, Connecticut. The lawns were neatly trimmed, and the pool was equipped with a heating system. Sushil was a vice president at Morgan Stanley's New York branch, driving a newly purchased matte gray Lamborghini Urus, an SUV priced at around $240,000.

As they turned a corner, a white Honda Civic suddenly crashed into the back of the Lamborghini. At the same time, a white Ram ProMaster van cut in from the front, blocking the Chetals' path. According to a criminal complaint filed afterward, a group of six men dressed in black and wearing masks got out of the vehicle, forcibly dragged the Chetals out of their car, and pushed them into the side door of the van.

When Sushil resisted, the assailants struck him with a baseball bat and threatened to kill him. They bound the couple's hands and feet with tape, forced Radhika to lie on the ground, and warned her not to look at them, even as she gasped for breath due to asthma. They also taped Sushil's face and beat him again with the baseball bat as the van sped away.

Multiple witnesses saw the attack and called 911. One of them was an off-duty FBI agent who lived nearby and happened to be at the scene; he followed the van and the Honda Civic, relaying the vehicles' movements to the police in real-time. This FBI agent also managed to record part of the license plate numbers.

Soon, Danbury police located the van. A patrol car activated its lights in an attempt to intercept it, but the van's driver accelerated and weaved through traffic. About a mile into the chase, the driver veered off the road and crashed into a curb. Four suspects abandoned the vehicle and fled. Police found one of them under a bridge and arrested him after a brief chase. In the following hours, the remaining three were also found and apprehended in nearby woods. Meanwhile, police discovered the Chetals in the back of the van, still bound and shaken.

Detective Sergeant Steve Castrovinci of the Danbury Police Department was on vacation that day when he received a call from the shift commander informing him of the incident. He recalled the commander saying, "We have a kidnapping case, a real kidnapping." Castrovinci gathered several detectives to understand the situation, stopped by the crime scene, and then headed to the police station to interrogate the suspects. Based on information from one of the arrested suspects, two more suspects were found and arrested the next morning at an Airbnb in Roxbury, about a 30-minute drive from Danbury, along with the white Honda Civic.

For Castrovinci, this was an unusual and dramatic case. Danbury is a wealthy and quiet place; while the police occasionally handle kidnapping cases, they are almost always related to custody disputes. A violent kidnapping in broad daylight was unheard of. Even stranger, law enforcement discovered that these suspects—aged between 18 and 26—had traveled from Miami specifically to Connecticut.

They had also rented the van through the Turo app. "In a case like this, a police officer might encounter one or two in a lifetime," Castrovinci, who has 20 years of law enforcement experience and worked for the New York Police Department for five years, told me. "Especially in a place like ours, this kind of thing is just not common."

In the following weeks, the police revealed almost no information to the public. Castrovinci and his team were working hard to piece together the motive behind the crime. It was hard to believe that the Chetals were targeted because of Sushil's executive position at the investment bank. As a vice president at Morgan Stanley, his salary was enviable but not unusual in Danbury. If the kidnappers' motive was money, it was very strange that they abandoned the Chetals' Lamborghini (which was later found discarded in the woods). All the clues seemed nonsensical.

However, a few days after the attempted kidnapping, Castrovinci stated that their team received a tip from the FBI, which brought an unexpected twist to the case: it might be related to a massive cryptocurrency theft that occurred just a week before the attack.

Several young individuals (some of whom met on a Minecraft server) were suspected of stealing $250 million from an unsuspecting victim, triggering a series of incredible events involving a network of teenage cybercriminals, independent cyber detectives tracking their movements, and multiple law enforcement agencies. It now appeared that all of this ultimately evolved into the kidnapping of the Chetals—an unchecked chaos of the digital underworld and its surrounding culture seeping into the real world in such a brutally tangible way.

This series of events began weeks earlier when a resident of Washington, D.C., started receiving unusual login notifications for his Google account, indicating that these logins seemed to be coming from overseas. Then, on August 18, he received a call from someone claiming to be from Google's security team. The caller stated that his email account had been compromised. The call sounded very convincing—the caller had personal information about the D.C. resident. The caller asked him to verify some personal information over the phone, or else the account would be closed, and the resident complied.

Shortly after speaking with the so-called Google employee, the Washington, D.C. resident (whose identity is concealed in federal court documents) received another call from someone claiming to be a representative of the security department of the well-known cryptocurrency exchange Gemini.

Similarly, the caller had his personal information and informed him that his account at Gemini (which contained about $4.5 million in cryptocurrency) had been hacked and that he needed to immediately reset his two-factor authentication and transfer the Bitcoin in his account to another wallet to ensure the safety of his funds.

The person on the phone then suggested that the account holder download a program that could "enhance security." The man agreed, unaware that he was downloading a remote desktop application that would allow the caller to remotely control his computer—thus gaining access to his other cryptocurrency account and exposing his assets to an even more astonishing risk of theft. It turned out that this Washington, D.C. resident was an early investor in cryptocurrency, holding over 4,100 Bitcoins in total. Ten years ago, these Bitcoins were worth about $1 million; on that day, their market value exceeded $243 million.

There is a core paradox in the cryptocurrency realm: while the holders of coins are often anonymous, all transaction records are publicly recorded on a ledger called the blockchain. This means that once funds are transferred, anyone can see it. This paradox has given rise to a new breed of investigators who specialize in tracking suspicious transactions on the blockchain. One of the most well-known is ZachXBT, an independent cryptocurrency crime investigator.

In the crypto world, ZachXBT is a widely known but elusive figure. He frequently posts long investigative threads on X (formerly Twitter), exposing individuals suspected of wrongdoing, sometimes even naming them directly. He has about 850,000 followers on the platform. He often shares his findings with law enforcement agencies. Wired magazine referred to him as "the world's most active independent cryptocurrency crime investigator." He has never revealed his true identity online.

Just minutes after the Washington, D.C. resident's crypto assets were emptied, ZachXBT was at the airport catching a flight when he suddenly received a push notification on his phone about an unusual transaction. Cryptocurrency investigators typically use tools to monitor the flow of cryptocurrencies globally and set alerts for specific situations, such as transactions exceeding $100,000 and involving exchanges with extremely loose security measures.

The initial alert was for a transaction in the six-figure range, which then escalated, peaking at $2 million. After passing through security, ZachXBT found a seat, opened his laptop, and began tracking the transaction, ultimately tracing it back to a wallet holding about $240 million in cryptocurrency. Some of the Bitcoins could even be traced back to 2012. "At that moment, I felt something was off," he told me, "Why would someone who has held Bitcoin for so many years suddenly decide on a weekend, 'I want to transfer the money in batches to a bunch of exchanges and convert it to Monero and Ethereum'—normal people don't do that."

He then added the wallet addresses associated with these transactions to his tracking list and boarded the plane. Once connected to the in-flight Wi-Fi, more transaction alerts kept coming in. Throughout the day, the Bitcoin from the massive wallet was continuously cashed out through more than 15 high-fee cryptocurrency service platforms.

After the plane landed, ZachXBT contacted several colleagues who specialize in investigating cryptocurrency theft cases. One of them was Josh Cooper-Duckett, the investigation director at Cryptoforensic Investigators. This company is one of the growing number of independent agencies focused on tracking cryptocurrency theft and fraud and assisting law enforcement in recovering funds for victims. The 26-year-old Cooper-Duckett, from London, developed an interest in cryptocurrency at an early age. After working as a security consultant at Deloitte for three and a half years, he began focusing on investigating cryptocurrency theft cases, particularly those with losses of at least $100,000—which are now very common.

ZachXBT shared his findings with Cooper-Duckett and other investigators, and they all agreed that emptying a wallet worth nearly $250 million was extremely suspicious. "Someone with that much money wouldn't just wake up one weekend and decide, 'I want to transfer the money in batches to a bunch of exchanges and convert it to Monero and Ethereum'—normal people don't do that."

This group of cryptocurrency investigators then contacted the relevant exchanges and service platforms, informing them that the funds were stolen and hoping they could freeze the assets and cooperate with the police investigation. Some platforms complied, but others did not. "This situation was a bit like a game of whack-a-mole," Cooper-Duckett said. "They kept trying to transfer the money to various exchanges and service platforms to see where they could successfully launder it. After all, they were trying to launder $240 million, which is an astronomical figure."

Meanwhile, ZachXBT also warned his followers on X: "About seven hours ago, a suspicious transaction occurred, with the victim's account transferring out 4,064 Bitcoins (approximately $238 million)." He wrote. The funds subsequently flowed to cryptocurrency platforms such as THORChain, eXch, KuCoin, ChangeNOW, RAILGUN, and Avalanche Bridge.

ZachXBT also noted that the victim had previously received bankruptcy compensation from Genesis. Genesis is a lending platform that filed for bankruptcy in 2023 due to the collapse of Sam Bankman-Fried's FTX.

Through his network, ZachXBT eventually managed to contact the victim via email. The shocked Washington, D.C. resident subsequently hired ZachXBT, Cryptoforensic Investigators, and another cryptocurrency investigation company to help track his stolen assets.

On the same day, he also filed a police report with the FBI's Internet Crime Complaint Center (IC3), and ZachXBT immediately reached out to his contacts in law enforcement. (The FBI and the Department of Justice both declined to comment on the matter.)

The rapid increase in cryptocurrency theft cases has overwhelmed federal investigators. According to the latest report, the Internet Crime Complaint Center (IC3) received over 69,000 complaints related to cryptocurrency financial fraud in 2023, with total losses exceeding $5.6 billion, a 45% increase from 2022.

Although cryptocurrency-related complaints only account for 10% of all financial fraud cases, the losses from these cases account for nearly half of the total. The report noted that the decentralized nature of cryptocurrency, the irreversibility of transactions, and the ability to transfer funds freely around the globe make it highly attractive to criminals, complicating the FBI's efforts to recover funds. In response, the FBI established the Virtual Assets Unit (VAU) in 2022 specifically to combat cryptocurrency theft.

Due to the large scale of the cases and the high difficulty of investigation, experts say that government agencies—including the FBI, the Department of Homeland Security, the Secret Service, and even the IRS—have had to rely on private companies and individual investigators who have a deep understanding of the digital crime underground. "Josh and Zach, they are really fast and accurate in tracking," said Nick Bax, founder of the cryptocurrency analysis company Five I's.

Bax has collaborated with ZachXBT on several cases but has never seen his true face. In their early conversations, ZachXBT even used voice-changing software to sound like Mickey Mouse. "To be honest, I'm pretty good myself, but compared to them, I'll never catch up," Bax said, "and I feel like their brains have really been rewired because they've been doing this since they were very young."

Cryptocurrency investigators often use fake accounts to infiltrate forums like Telegram and Discord, where hackers and scammers gather, observing their communications, planning, and boasting. They found that these criminals are often very young and act quite recklessly, often leaving clues inadvertently.

After ZachXBT posted about the theft on X, a source contacted him through a temporary account, providing some clues that could point to the identity of the thieves. This informant sent ZachXBT several screen recording videos, allegedly recorded during a live stream of one of the scammers showcasing the theft to friends. The total length of the video, about an hour and a half, included footage of calls with the victim. In one segment, the scammers could be heard excitedly shouting, "Oh my God! Oh my God! $243 million! This is amazing! Oh my God! Oh my God! Bro!"

In private chats, the group of scammers used aliases like Swag, $$$, and Meech, but they made a fatal mistake: one of them inadvertently exposed his Windows desktop during the live stream, revealing his real name—Veer Chetal, an 18-year-old from Danbury—who was the son of the previously mentioned kidnapped couple.

Veer Chetal was a quiet honor student who had just graduated from Immaculate High School in Danbury and was about to attend Rutgers University in New Jersey. In 2022, he completed a "Future Lawyer" program, and that year the school website featured a photo of him—a boy wearing glasses, a Tommy Hilfiger windbreaker, and a red polo shirt, smiling brightly.

Classmates recalled that Chetal was always shy and loved cars. "He was basically always a loner," said Marco Dias, who became friends with Chetal in their senior year. Another classmate, Nick Paris, also mentioned that Chetal was originally low-key until one day in the middle of senior year when he suddenly showed up at school driving a Corvette. "He just parked it in the lot at 7:30 in the morning, and everyone was stunned," Paris said.

Soon, Chetal switched to a BMW, then a Lamborghini Urus. He began wearing Louis Vuitton shirts and Gucci shoes. On Senior Skip Day, when Paris and other classmates just went to a nearby mall, Chetal took some friends, including Dias, to New York, renting a yacht for a party, where they took photos on the deck holding bundles of cash.

Chetal claimed he made this money through cryptocurrency trading; Dias said that one morning in study hall, Chetal even showed him his trading records as proof. Once, Chetal rented a large house in Stamford, Connecticut, and invited friends for a three-day party. "I was once playing around in the basement with friends when I suddenly saw him lying on the couch alone playing on his phone, basically avoiding everyone the whole time," Dias recalled, "I thought to myself, this is really strange." Paris also remembered that during a school parade, the police stopped Chetal for a traffic violation while he was driving the Lamborghini Urus, "He immediately called his lawyer before the police even had a chance to ask him anything. Everyone thought: wow, this guy really has something going on, he’s really rich."

Independent investigators pointed out that Chetal was actually a secret member of an organization called Com (also known as Comm or Community). This organization originated in the hacker underground of the 1980s and has now evolved into a social network for cybercriminals and aspiring individuals.

According to an FBI affidavit in an unrelated case, an agent described Com as "a geographically dispersed alliance of subgroups that collaborate through online communication tools like Discord and Telegram to engage in various criminal activities."

According to this affidavit and experts studying Com, the activities of these subgroups include: swatting (making false reports to police or institutions to provoke a response); SIM card hijacking (SIM swapping, usually stealing target phone numbers by deceiving customer service representatives); ransomware attacks (using malicious software to block users or organizations from accessing their computer files); cryptocurrency theft, and penetration attacks on corporate systems.

Allison Nixon is the chief researcher at the cybersecurity expert group Unit 221B, and she has been focusing on this expanding corner of the internet since 2011, now widely regarded as one of the top experts in the field of Com research.

She stated that most members of Com are young men from Western countries. In group chats, many discuss college life and the cybersecurity courses they are taking, and this knowledge has also aided them in their criminal activities. Nixon pointed out that many people initially enter this circle through video games like RuneScape, Roblox, and Grand Theft Auto.

By the mid-2010s, a darker world was quietly emerging within Minecraft—a game centered on creative building—largely thanks to the advent of online servers. These servers are owned and operated by users, allowing players to team up for battles, also known as "factions." In these servers, Minecraft evolved into a highly competitive battleground, bringing with it opportunities for profit and scams.

Soon, servers began introducing in-game purchase mechanisms, allowing players to spend money on upgrades, such as flying abilities, stronger weapons, and armor. Some in-game purchases could also unlock stylish character outfits, becoming a way for players to flaunt their status online.

As players increasingly leaned towards participating in these competitive servers, a large black market emerged on Discord, specifically trading game items and rare usernames. Since most Minecraft players are teenagers, this black market quickly became a breeding ground for scams.

Users often agreed to pay real money via PayPal in exchange for game items, but after receiving the money, scammers would block the other party's account. This behavior became so rampant that people began offering "escrow services" to resolve trust issues—these intermediaries would charge a fee to hold the money and items, then pass them on to both parties in the transaction.

In this circle, some high-value usernames became hot collectibles, usually no more than four letters long, such as Tree, OK, Mark, YOLO, or G, with prices sometimes reaching over $10,000.

As Minecraft's "faction" servers and black market flourished, virtual currency began to gain popularity within these communities, eventually replacing PayPal as the mainstream method of transaction. This unpunished arena of competition, gambling, and scams, combined with players' increasing familiarity with cryptocurrency, gradually turned Minecraft servers into a "breeding ground" for new cybercriminals.

By 2017, as Bitcoin prices skyrocketed, Com members seamlessly transitioned from Minecraft scams to cryptocurrency theft. One of Com's most popular forums, called "OGUsers," initially served as a platform for discussing and purchasing social media accounts and usernames but later evolved into a hub for cybercrime, involving SIM card hijacking, Twitter account hacking, and more.

Nixon explained, "These antisocial communities quickly transformed into a group of 'hacker millionaires' who got rich overnight and spread this culture, as people saw others suddenly becoming millionaires and wanted to know how they did it." This also led to a rapid expansion of Com's scale.

One of the most commonly used methods of cryptocurrency theft by Com is called "social engineering," which refers to manipulating people's emotions to induce users to disclose sensitive information. Com members compile a list of numerous potential victims obtained through data breaches and then target them one by one—such was the case with the victim in Washington D.C. Sometimes, they even post "job ads" online, recruiting individuals willing to assist them in carrying out scams.

Cryptocurrency investigator Nick Bax once shared a job posting on Telegram that promised "5f a week" (a five-figure weekly payment)—"as long as you act quickly"—to call potential targets. The ad also required "a professional American customer service voice." After completing the theft, Com members sometimes return to the Minecraft black market, using the stolen cryptocurrency to purchase rare in-game items, which they then sell for real cash via PayPal, effectively "laundering" the money.

After ZachXBT discovered Veer Chetal's true identity, he and other investigators quickly identified more individuals involved in the case. In recordings obtained by ZachXBT, the thieves referred to each other by Com's codenames, sometimes directly mentioning each other's real names. One name that was repeatedly mentioned was Malone, referring to Malone Lam.

Malone Lam is a 20-year-old from Singapore, notorious within the Com circle, with online aliases including Greavys and Anne Hathaway. He is also an experienced Minecraft player, known for his side-swept bangs, frequently getting banned from servers but always managing to return. In the spring of 2023, he clashed with an administrator on the Minecadia server, losing some in-game items, and subsequently doxxed the administrator by posting their addresses and social security numbers online. At least once, he called emergency services to harass the administrator.

According to multiple users and Discord chat logs from that time, Chetal and Lam met in Minecraft, where they teamed up in a "faction" led by Lam.

In October 2023, Lam entered the U.S. on a 90-day visa. He had essentially stopped playing Minecraft. Court documents indicated that he later maintained his lifestyle through other cryptocurrency-related fraudulent activities.

After a cryptocurrency theft case in August 2024, ZachXBT tracked Lam through so-called OSINT (open-source intelligence), specifically via social media. In Com's chat groups, everyone was sharing that Lam was spending lavishly, with no one knowing the source of his money, but they mentioned his luxurious lifestyle in Los Angeles nightclubs.

ZachXBT investigated the city's most popular nightclubs and reviewed Instagram posts from partygoers and the clubs themselves. In one post, Malone was seen wearing a white Moncler jacket, with what appeared to be diamond rings and diamond-studded sunglasses. He stood on a table, showering the crowd with hundred-dollar bills.

As the money rained down, waitstaff carried $1,500 bottles of champagne with fireworks inserted into the bottles, holding up signs that read "@Malone." That night, he spent $569,528 at the nightclub. At another club, Lam and his crew playfully challenged ZachXBT, instructing nightclub patrons to hold up signs that read "TOLD U WE'D WIN," while another sign said "[expletive] ZACHXBT."

In the following weeks, Lam purchased 31 cars, including custom Lamborghinis, Ferraris, and Porsches, with some vehicles valued at up to $3 million. On August 24, he apparently sent a photo of a pink Lamborghini to a model, texting, "I bought you a gift; let's consider it an early birthday present." She replied, "I have a boyfriend now." He responded, "idc" (I don't care).

On September 10, after a 23-day party spree in Los Angeles, Lam and a group of friends took a private jet to Miami. There, he rented multiple properties, including a $7.5 million mansion with 10 bedrooms. Within days, Lam filled the driveway with more luxury cars, including several Lamborghinis, one of which had the name "Malone" printed on its side.

Every few days, ZachXBT sent the intelligence he collected to law enforcement. The information generally flowed one way, but federal authorities were also conducting their own investigation simultaneously. According to court documents, the suspects involved in the conspiracy used complex money laundering methods to hide their funds and identities, trading through cryptocurrency exchanges like eXch, which do not require personal customer information, and using virtual private networks (VPNs) to mask their true locations.

However, authorities stated that at least once, they made a mistake when a suspect registered an account with the digital currency exchange TradeOgre without using a VPN, resulting in the connected IP address pointing to a $47,500-per-month rental property in Encino, California. The property was leased by 21-year-old Jeandiel Serrano, who had used aliases like VersaceGod, @SkidStar, and Box online. By the time authorities identified Serrano, he was on vacation in the Maldives with his girlfriend.

On September 18, when Serrano flew back to Los Angeles International Airport from the Maldives, law enforcement was waiting for him at the airport. He was wearing a $500,000 watch. Upon his arrest, Serrano initially denied knowledge of the theft and agreed to speak with law enforcement without a lawyer. However, according to court reports, he quickly admitted his involvement, particularly in impersonating a Gemini employee.

Serrano confessed to owning five cars, two of which were gifts from his co-conspirators, with the funds for those cars coming from previous scams. He also admitted that his phone contained approximately $20 million in victim cryptocurrency and agreed to return the funds to the FBI.

Meanwhile, agents in Miami were preparing to raid one of the mansions rented by Lam. Lam was aware that the raid was imminent: after Serrano's arrest, Serrano's girlfriend immediately called to warn Lam's co-conspirators. They then deleted their Telegram accounts and other evidence from their phones.

Later that day, a team of FBI agents, working with the Miami police, raided a mansion near Miami Beach. The agents used explosives to breach the front metal gate, while another group of agents entered via a small saltwater canal at the back. As the agents entered the house, the sound of flashbang explosions echoed through the neighborhood.

Soon after, an agent escorted a handcuffed Lam out of the house. He was wearing a long-sleeve white top, deep red basketball shorts, and sneakers, with smoke filling the air, followed by at least five others who were also inside the house. Serrano and Lam were charged with money laundering and conspiracy to commit wire fraud. Each charge could carry a maximum sentence of 20 years in prison.

On the exact day one month after the heist, the party came to an end.

In Danbury, during the days and weeks following the Chetal family's kidnapping, Castrovinci and the police collaborated with federal investigators to build a case against the gang from Florida. They urgently obtained access to the suspects' phones, reviewing group chat records and tracking the movements of gang members.

They learned that the trip was partially funded and organized by 23-year-old Angel Borrero from Miami, whose nickname is Chi Chi. In the group chat, Borrero wrote to others, "If this goes smoothly, we’ll head to California next." Federal investigators speculated that this meant the gang planned to carry out further actions in California. On that day, Josue Alberto Romero (nicknamed Sway) messaged the gang, "Chi Chi, we’re more prepared than ever." These chat logs indicated that the gang began coordinating their actions as early as 7 a.m. and monitored the Chetal family for part of the afternoon.

By that time, police had found the motive: they believed these individuals targeted the Chetal family to extort money from their son through kidnapping. Independent investigators suspected that at least one member of the gang, Reynaldo (Rey) Diaz, using the alias Pantic, might be a member of Com.

ZachXBT speculated that these thieves may have made themselves targets by boasting about their spending stories to other Com members. "You would think that after committing a crime, you would keep quiet and not bring it up again," he said. "But they have to compensate for something by bragging to people they think are friends. These people may not be true friends."

On August 27, the Danbury police charged six suspects in the case with multiple counts of first-degree assault, first-degree kidnapping, and reckless endangerment. Federal charges soon followed. On September 24, a grand jury indictment submitted to the U.S. District Court for Connecticut charged six Florida men with kidnapping, carjacking, and conspiracy.

These six Florida men represented an increasingly growing faction within Com, shifting their focus from online scams to a greater inclination towards violence. Diaz himself was shot two years ago in Florida during an attempted robbery.

In an FBI affidavit, an agent stated that Com members frequently engage in "brick throwing, shootings, and arson attacks." According to independent investigative journalist Brian Krebs, in 2022, a young man named Foreshadow was kidnapped and beaten by a rival SIM-swapping gang, demanding a $200,000 ransom.

In October 2023, 22-year-old Patrick McGovern-Allen from Egg Harbor Township, New Jersey, was sentenced to 13 years for participating in violent hired work after being employed by a group of cybercriminals. Last November, reports emerged that the CEO of a cryptocurrency company based in Toronto was kidnapped and demanded a $1 million ransom.

Weeks later, a 13-year-old boy was exposed in the cryptocurrency community for creating a cryptocurrency and inflating its value, with rumors that his dog was also kidnapped. In January of this year, the founder of the French cryptocurrency company Ledger and his wife were kidnapped, with the kidnappers mutilating his hand and demanding a ransom in the millions of dollars in cryptocurrency.

However, more and more individuals unrelated to Com are being targeted, researchers like Nixon noted. Some so-called Com members are involved in so-called "harm groups," whose members force young women and girls to self-harm and commit violence. Nixon stated that seven years ago, there were only a few dozen noteworthy members in Com; now, there are thousands. "Now," she said, "we are witnessing the evolution from unorganized crime to organized crime, and we are in the midst of this transition."

These two incidents—the cryptocurrency heist and the kidnapping case—indicate that Com members operate with complete impunity in the online world, leading them to believe they can continue committing similar crimes in the real world. "I don't think they've learned anything at all," ZachXBT said. "I've seen many people who, after being arrested or having their assets seized—many of them end up going back to their old lives."

This year, five of the six Florida men pleaded guilty to federal kidnapping and conspiracy charges, and they could face 15 years in prison. In January, 19-year-old Michael Rivas apologized for his actions in Hartford court, calling them "stupid," and stated that he was helping another person carry out a "revenge plan," although he did not elaborate.

In February, 22-year-old James Schwab from Georgia was charged in connection with the kidnapping plot. According to the federal indictment, Schwab had a confrontation with Veer Chetal at a nightclub in Miami a month before the kidnapping and helped fund the plan by arranging transportation and accommodations for the attackers. He pleaded not guilty.

On March 25, ZachXBT updated his followers on X about the latest developments in tracking the stolen cryptocurrency investigation: "Update: Wiz (Veer Chetal) has been arrested," he wrote, "here's his photo." The attached photo showed a young man wearing a white T-shirt, with fluffy hair and a thick beard, his mouth turned down and eyes weary. He looked far from the child in the photo on the Immaculate High School website. The charges listed in the prison records were federal misdemeanors, but did not specify the exact charges.

According to ZachXBT, the stolen Bitcoin he tracked had been transferred to a wallet controlled by law enforcement. That day, the matte gray Lamborghini Urus that Sushil and Radhika Chetal were driving during the kidnapping remained parked as evidence in a secure police lot in Danbury. This Lamborghini had previously been the car their son drove to school.

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

币安:注册返10%、领$600
链接:https://accounts.suitechsui.blue/zh-CN/register?ref=FRV6ZPAF&return_to=aHR0cHM6Ly93d3cuc3VpdGVjaHN1aS5hY2FkZW15L3poLUNOL2pvaW4_cmVmPUZSVjZaUEFG
Ad
Share To
APP

X

Telegram

Facebook

Reddit

CopyLink