{"id":18230,"date":"2024-10-31T17:00:00","date_gmt":"2024-10-31T15:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/the-cryptex-case-why-the-exchanges-founder-was-wanted-in-the-us-and-arrested-in-russia\/"},"modified":"2024-10-31T17:00:00","modified_gmt":"2024-10-31T15:00:00","slug":"the-cryptex-case-why-the-exchanges-founder-was-wanted-in-the-us-and-arrested-in-russia","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/the-cryptex-case-why-the-exchanges-founder-was-wanted-in-the-us-and-arrested-in-russia\/","title":{"rendered":"The Cryptex case: why the exchange\u2019s founder was wanted in the US and arrested in Russia"},"content":{"rendered":"<p>In early October the Interior Ministry and the National Guard mounted a sweeping operation to detain almost 100 people suspected of running illegal cryptocurrency operations. Six alleged key figures were placed under house arrest, among them Cryptex founder Sergei Ivanov.<\/p>\n<p>Notably, the sweep came soon after US authorities offered a reward of up to $10m for information on Ivanov\u2019s whereabouts. Gregory Osipov, director of investigations at SHARD, shares with ForkLog why Cryptex attracted the attention of both American and Russian authorities and how the case may affect market regulation.<\/p>\n<div class=\"wp-block-text-wrappers-disclamer article_disclamer\"><span class=\"gtb_text-wrappers_disclamer_head\">Disclaimer<\/span><\/p>\n<p>The author\u2019s opinion may differ from the editorial stance. The individuals mentioned are presumed innocent until a court decision.  <\/p>\n<\/div>\n<h2 class=\"wp-block-heading\"><strong>What Cryptex is accused of<\/strong><\/h2>\n<p>On September 26, 2024 US authorities added Russian citizens Sergei Ivanov and Timur Shakhmametov to sanctions lists, suspecting them of organising bank fraud.<\/p>\n<p>The charges concern their payment processing for <span data-descr=\"A type of fraud that involves the theft and sale of credit-card and bank-account data\" class=\"old_tooltip\">carding<\/span> sites Rescator and Joker\u2019s Stash. The latter, according to authorities, was used to attack the United States\u2019 critical financial infrastructure.<\/p>\n<p>A reward of up to $10m was announced for information on the suspects\u2019 whereabouts. Alongside Ivanov and Shakhmametov, sanctions were extended to affiliated companies Cryptex, Universal Anonymous Payment System (UAPS) and BTC2PM.<\/p>\n<p>And by October 2, 2024 Russia\u2019s Investigative Committee had opened a criminal case against the creators of the anonymous payment system UAPS and the cryptocurrency exchange Cryptex. They are suspected of forming a criminal organisation, unauthorised access to computer systems and illegal banking activity.<\/p>\n<p>Searches were carried out in several regions of Russia. Police brought in 96 people, but the court placed only six under house arrest: Sergei Ivanov, Alexander Tereshchenko, Artem Lysenko, Elena Polyakova, and brothers Ruslan and Roman Orekhovsky.<\/p>\n<p>Investigators allege that more than 112 billion roubles flowed through UAPS and Cryptex in 2023. The defendants\u2019 unjustified income is estimated at 3.7 billion roubles.<\/p>\n<p>According to a journalistic <a href=\"https:\/\/krebsonsecurity.com\/2024\/09\/u-s-indicts-2-top-russian-hackers-sanctions-cryptex\/\" target=\"_blank\" rel=\"noopener\" title=\"\">investigation<\/a> by cybersecurity specialist Brian Krebs, Ivanov and Shakhmametov had processed payments since the early 2000s and in 2013 created the anonymous Universal Anonymous Payment System, which served the shadow crypto market.<\/p>\n<p>Funds from services such as Joker\u2019s Stash and BriansClub, which sold stolen card data, were cashed out via the platform. In 2018 the suspects launched the Cryptex cryptocurrency exchange and, to cover unlawful activity and launder money, organised a network of exchangers including btc2pm and PinPays. The platforms were used by both criminals and law-abiding users.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Reputational damage<\/strong><\/h2>\n<p>For advocates of banning cryptocurrencies, the Cryptex case is further confirmation of links between digital assets and carding services, underground casinos and ransomware.<\/p>\n<p>The services that drew law-enforcement scrutiny conducted little user identification (KYC) and ignored anti\u2013money-laundering (AML) rules, offering clients complete anonymity. In tightly regulated jurisdictions such activity is illegal, yet Cryptex and UAPS remained on the market for suspiciously long.<\/p>\n<p>Recent raids and detentions show that authorities had long known about Cryptex not only in the US but also in Russia. These services helped hackers who breached American systems, extorted companies and stole funds from cards. Despite the scale of the operation, all detainees were placed under house arrest. Presumably, in the view of a Russian court, they do not pose a serious threat to the state.<\/p>\n<p>In the US the standing of platforms linked to Russia has sunk still lower: an equals sign is drawn between Russian crypto services and money laundering. To American authorities they are systemic cybercriminals causing billions in losses.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Possible consequences<\/strong><\/h2>\n<p>The notion that any exchange, broker or payment system dealing in cryptocurrencies is indistinguishable from Cryptex and UAPS may suggest that the authorities want to ban or de-anonymise all market participants. In reality the picture is more nuanced.<\/p>\n<p>Because Russia lacks clear legislation, any crypto service can formally fall under the definition of illegal banking. Crypto turnover sits in a grey zone, yet an infrastructure already exists: mining, exchange services and crypto payments. The market awaits regulation, or at least an \u201cexperimental legal regime\u201d.<\/p>\n<p>Russia\u2019s crypto market has both large and small players. The former favour legalisation, clear rules, user verification and AML compliance, and are ready to engage with state bodies.<\/p>\n<p>But part of the market still insists on full anonymity, avoiding centralised exchanges and verification. To the state, however, anonymity is increasingly associated with suspicious activity: drug and arms trafficking, money laundering and hacking.<\/p>\n<p>The takeaway from the Cryptex case for investors is simple: choose the most transparent platforms\u2014those that undergo audits, verify customers and comply with AML. This helps avoid links to illegal activity and enhances safety.<\/p>\n<p>The Cryptex case is a cautionary tale, underscoring the association between cryptocurrencies and illegal activity. When hidden risks surface, authorities tend to favour prohibitions over flexible policies to prevent\u2014or at least mitigate\u2014the harm caused by bad actors.<\/p>\n<p>One hopes the case will not trigger new initiatives aimed at tighter controls or outright bans.<\/p>\n<p>The situation around Cryptex shows that US regulators remain active in fighting the illicit use of cryptocurrencies and in shutting down services and exchanges that facilitate such operations. Enforcement will only intensify.<\/p>\n<p>For crypto companies the signal is clear: fully anonymous services are no longer viable, as regulators increasingly link them to criminal activity.<\/p>\n<p>In Russia the situation remains less defined due to the absence of clear regulation. Once it appears, the experience of foreign counterparts will likely be taken into account and applied.<\/p>\n<p>The Cryptex case suggests that the future of the crypto industry lies in transparency and compliance, as regulators increasingly associate anonymous crypto services with illegal activity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In early October the Interior Ministry and the National Guard mounted a sweeping operation to detain almost 100 people suspected of running illegal cryptocurrency operations. Six alleged key figures were placed under house arrest, among them Cryptex founder Sergei Ivanov. Notably, the sweep came soon after US authorities offered a reward of up to $10m [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":18229,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[1144],"tags":[1292,44,1375],"class_list":["post-18230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-longreads","tag-aml-kyc","tag-cybercrime","tag-lawyers"],"aioseo_notices":[],"amp_enabled":true,"views":"190","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/18230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=18230"}],"version-history":[{"count":0,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/18230\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/18229"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=18230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=18230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=18230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}