On December 9, according to The Block, the U.S. Department of Justice announced today that 22-year-old California man Evan Tangeman has pleaded guilty to laundering money for a crypto scam ring involved in a case amounting to $263 million. He laundered over $3.5 million for the scam group. The DOJ stated that Tangeman is the ninth defendant to plead guilty in this investigation. The organization carried out its scam operations from October 2023 to May 2025, stealing approximately 4,100 Bitcoin, which was valued at $263 million at the time and is about $371 million at current prices. The group consisted of hackers, organizers, target identifiers, phone scammers, and burglars specializing in stealing hardware wallets, and they used stolen databases to select their targets. Hackers infiltrated websites and servers to obtain cryptocurrency-related databases, while target identifiers used this data to screen for the most valuable victims.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
A California man pleads guilty to laundering money for a crypto scam ring involving $263 million.
On December 9, according to The Block, the U.S. Department of Justice announced today that 22-year-old California man Evan Tangeman has pleaded guilty to laundering money for a crypto scam ring involved in a case amounting to $263 million. He laundered over $3.5 million for the scam group. The DOJ stated that Tangeman is the ninth defendant to plead guilty in this investigation. The organization carried out its scam operations from October 2023 to May 2025, stealing approximately 4,100 Bitcoin, which was valued at $263 million at the time and is about $371 million at current prices. The group consisted of hackers, organizers, target identifiers, phone scammers, and burglars specializing in stealing hardware wallets, and they used stolen databases to select their targets. Hackers infiltrated websites and servers to obtain cryptocurrency-related databases, while target identifiers used this data to screen for the most valuable victims.