Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Threats/Chinese National Jailed 46 Months for Laund Laundering Millions
Threats

Chinese National Jailed 46 Months for Laund Laundering Millions

A 46-month prison sentence has been handed down to Chinese national Jingliang Su for his participation in a large-scale cryptocurrency fraud scheme preying on American investors. On January 27, 2026,...

Emy Elsamnoudy
Emy Elsamnoudy
January 28, 2026 2 Min Read
0 0

A 46-month prison sentence has been handed down to Chinese national Jingliang Su for his participation in a large-scale cryptocurrency fraud scheme preying on American investors.

On January 27, 2026, federal courts ordered Su to serve his sentence and pay $26.9 million in restitution to victims.

The case represents a significant law enforcement victory against international financial crime networks that exploit digital assets to steal from unsuspecting Americans.

This criminal operation impacted 174 victims across the United States who lost a combined $36.9 million in fraudulent digital asset investments.

The scam operated through coordinated international operations based in Cambodia, where criminal networks orchestrated elaborate schemes to deceive victims.

Su and his co-conspirators used social media platforms, phone calls, text messages, and online dating services to establish false trust with potential victims.

The criminals then promoted fake digital asset investment opportunities through counterfeit websites designed to mimic legitimate cryptocurrency trading platforms.

Victims believed they were investing in genuine cryptocurrency platforms when they were actually transferring funds directly into accounts controlled by the scam network.

The Office of Public Affairs, US Department of Justice, noted that this case demonstrates how criminals have weaponized the internet and digital financial systems for large-scale fraud operations.

Law enforcement agencies including U.S. Secret Service, Homeland Security Investigations, and Customs and Border Protection worked together to dismantle the criminal network and trace the flow of stolen money.

Money Laundering Infrastructure and Digital Asset Misuse

The most significant aspect of this operation involved the sophisticated money laundering infrastructure that Su helped establish.

After victims sent funds to shell company bank accounts, Su and his associates coordinated the transfer of $36.9 million to a single account at Deltec Bank in the Bahamas.

From there, the criminal network converted the stolen money into Tether (USDT), a stablecoin cryptocurrency designed to maintain stable value.

This conversion step proved critical to the scheme because it allowed the criminals to move money across international borders quickly while avoiding traditional banking oversight.

Su then directed the transfer of converted cryptocurrency to a digital asset wallet controlled in Cambodia, where regional scam center leaders distributed funds throughout Southeast Asia.

This layered approach using legitimate cryptocurrency infrastructure made tracing the money exceptionally difficult for law enforcement.

Su’s guilty plea in June 2025 to conspiracy to operate an unlicensed money transmitting business reflected his central role in managing the financial backbone of this international fraud operation.

Eight co-conspirators have already pleaded guilty, with sentences ranging from 36 to 51 months in prison.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

ExploitSecurity

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

WhatsApp’s New Strict Settings Protect Your Account from Hackers

Next Post

Nike Investigates Data Breach After WorldLeaks Ransomware

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us