paint-brush
Operation Destabilize: 6 Key Takeaways for the Crypto Industryby@lexfisun
293 reads

Operation Destabilize: 6 Key Takeaways for the Crypto Industry

by Lex FisunJanuary 26th, 2025
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

UK's National Crime Agency (NCA) disrupted two Russian money laundering networks. The networks had links to drug trafficking, ransomware, and espionage and made 84 arrests. Global Ledger's CEO and Co-founder sheds light on how these networks used crypto in their operations.
featured image - Operation Destabilize: 6 Key Takeaways for the Crypto Industry
Lex Fisun HackerNoon profile picture
0-item

Following the news about Operation Destabilise, in which the UK’s National Crime Agency (NCA) disrupted two multi-billion Russian money laundering networks with links to drug trafficking, ransomware, and espionage and made 84 arrests, we have aimed to shed light on how these networks used crypto in their operations.


As a reminder, the networks, Smart and TGR, facilitated the movement of criminally gained funds from one country to another using cryptocurrency transfers. Such crypto transactions were used both to launder money and to bypass Western sanctions against Russia.

As a result of the operation, the US Office of Foreign Assets Control (OFAC) has sanctioned five individuals and four entities associated with the criminal networks. The designation also included two crypto addresses used by two of the designated individuals. The addresses belonged to two Russian nationals, Elena Chirkinyan (Chirkinyan), the second-in-command within the TGR network, as well as Khadzhi Murat Dalgatovich Magomedov (Magomedov), a professional money launderer for Russian clients.

Sanctioned Crypto Addresses: Six Lessons Learned

1. USDT is #1 for laundering

Most laundering operations relied on Tether (USDT), a commonly used stablecoin that preserves the value of transfers. Given the volume of transactions, including numerous cash-to-crypto exchanges, Tether allowed criminals to minimize value loss across transfers.

2. 195M+ USDT laundered via Magomedov’s sanctioned wallet

The total value of cryptocurrency laundered through Magomedov’s sanctioned wallet exceeded USDT 195 million, as outlined in the Counterparty Report below. The laundering activity included interactions with a wide range of counterparties, but the wallet’s largest counterparty was a major centralized exchange.


Source: Gl Vision Protocol — https://vision.glprotocol.com


Source: Gl Vision Protocol — 3. 146K+ USDT laundered through Chirkinyan’s wallet

3. 146K+ USDT laundered through Chirkinyan’s wallet

In contrast, the total value of cryptocurrency transacted through Chirkinyan’s wallet was much smaller, amounting to just over USDT 146,000.

Source: Gl Vision Protocol — https://vision.glprotocol.com


4. Addresses made direct deposits to CEXs, including both well-regulated ones and sanctioned Garantex

Both wallets’ top counterparties included addresses at top well-known and well-regulated crypto exchanges.


However, they also engaged in transactions with the Russian crypto exchange Garantex long after it was sanctioned in April 2022. For example, Chirkinyan’s wallet received deposits totaling over USD 22,000 from Garantex between June 2022 and February 2023. Additionally, an unsanctioned wallet transferred 1,295 USDT to Chirkinyan’s wallet and over USD 41,000 to Garantex in October 2024, demonstrating ongoing use of this sanctioned entity.


As for the number of counterparties involved, Magomedov’s wallet interacted with a significantly greater number of exchanges and counterparties compared to Chirkinyan’s wallet, including activity with a high-risk wallet previously flagged as a reported hack. Chirkinyan’s transactions mostly culminated in deposits to a prominent centralized exchange.


Conversely, Magomedov’s transactions involved multiple counterparties. Notably, Magomedov’s activity did not include numerous hops aimed at obfuscating the flow of funds, opting instead for direct deposits to CEX deposit wallets.

5. Wallets interacted with exchanges requiring partial KYC

Except for CEXs, wallets interacted with exchanges requiring KYC only partially, depending on the customer’s activity, such as where KYC would only be required for crypto transfers, but not fiat ones.

6. Chirkinyan’s wallet received crypto from a Cyprus-based gambling service

One wallet was receiving incoming crypto transfers from a gambling service domiciled in Cyprus, which processes all its transactions in crypto.

Sanctioned Crypto Addresses: Challenges for the Industry

While the two sanctioned wallets are unlikely to continue operating due to their identification by blockchain analytics providers and likely blacklisting by crypto exchanges, numerous connected wallets may continue transacting and being used by professional money launderers. These wallet networks pose ongoing risks. We recommend these wallets be placed under monitoring using a blockchain analytics provider to prevent exposure and ensure compliance.


Even without reusing the wallets spotted as part of the transactional activity linked to the two sanctioned wallets, criminal networks can easily create new crypto addresses. Depending on the type of wallet and the platform being used, creating a wallet can take anywhere from a few seconds to a few minutes. The process could be slower if it includes additional verification steps, such as Know Your Customer procedures, which are usually required by centralized exchanges for custodial wallets but are not often included for decentralized ones.

To sum up

In summary, while sanctioning these wallets was a necessary step, Chirkinyan’s and Magomedov’s wallets are unlikely to be reused for money laundering purposes. However, placing these wallets under monitoring and including them on an internal blacklist are recommended steps for industry players, such as crypto exchanges, to prevent any future exposure and to remain compliant.


We also recommend that the full extent of these wallets’ activity be investigated and understood using a blockchain analytics tool and that all other direct past counterparties of these wallets be placed on a watchlist.


As a common theme of the wallets’ activity was exposure to Garantex even after the exchange was sanctioned, it is advised that crypto industry participants use blockchain analytics to identify and prevent such exposure in the future.


Finally, crypto wallets identified as having frequent high-value incoming and outgoing transactions with an unusually large number of counterparties should be considered as presenting a higher risk of money laundering.