2024.4.18, international investigation disrupts phishing-as-a-service platform labhost
欧洲刑警组织和18个国家的警察机构,联合捣毁一个网络钓鱼诈骗平台。
international investigation disrupts phishing-as-a-service platform labhost
labhost facilitated the phishing of users of hundreds of financial institutions worldwide for monthly subscription fee
18 apr 2024
this week, law enforcement from 19 countries severely disrupted one of the world’s largest phishing-as-a-service platform, known as labhost. this year-long operation, coordinated at the international level by europol, resulted in the compromise of labhost’s infrastructure.
between sunday 14 april and wednesday 17 april a total of 70 addresses were searched across the world, resulting in the arrest of 37 suspects. this includes the arrest of 4 individuals in the united kingdom linked to the running of the site, including the original developer of the service.
the labhost platform, previously available on the open web, has been shut down.
this international investigation was led by the uk’s london metropolitan police, with the support of europol’s european cybercrime centre (ec3) and the joint cybercrime action taskforce (j-cat) hosted at its headquarters.
europol has supported this case since september 2023. an operational sprint was organised at its headquarters with all the countries involved so that the national investigators could identify and develop intelligence on the users and victims in their own countries. during the action phase, a europol specialist supported the dutch national police with their enforcement actions.
commoditising phishing attacks
cybercrime-as-a-service has become a rapidly growing business model in the criminal landscape whereby threat actors rent or sell tools, expertise, or services to other cybercriminals to commit their attacks. while this model is well established with ransomware groups, it has also been adopted in other aspects of cybercrime, such as phishing attacks.
labhost had become a significant tool for cybercriminals around the world. for a monthly subscription, the platform provided phishing kits, infrastructure for hosting pages, interactive functionality for directly engaging with victims, and campaign overview services.
the investigation uncovered at least 40 000 phishing domains linked to labhost, which had some 10 000 users worldwide.
with a monthly fee averaging $249, labhost would offer a range of illicit services which were customisable and could be deployed with a few clicks. depending on the subscription, criminals were provided an escalating scope of targets from financial institutions, postal delivery services and telecommunication services providers, among others. labhost offered a menu of over 170 fake websites providing convincing phishing pages for its users to choose from.
what made labhost particularly destructive was its integrated campaign management tool named labrat. this feature allowed cybercriminals deploying the attacks to monitor and control those attacks in real time. labrat was designed to capture two-factor authentication codes and credentials, allowing the criminals to bypass enhanced security measures.
easily accessible, yet still a crime
platforms such as labhost make cybercrime more easily accessible for unskilled hackers, significantly expanding the pool of threat actors.
yet, however user-friendly the service portrays itself to be, its malicious use constitutes an illegal activity – and the penalties can be severe.
a vast amount of data gathered throughout the investigation is now in the possession of law enforcement. this data will be used to support ongoing international operational activities focused on targeting the malicious users of this phishing platform.
the following authorities have taken part in the investigation:
australia: australian federal police-led joint policing cybercrime coordination centre;
austria: criminal intelligence service (bundeskriminalamt);
belgium: federal judicial police brussels (police judiciaire fédérale bruxelles/ federale gerechtelijke politie brussel);
finland: national police (poliisi);
ireland: an garda siochana;
netherlands: central netherlands police (politie midden-nederland);
new zealand: new zealand police;
lithuania: lithuania police;
malta: malta police force (il-korp tal-pulizija ta’ malta);
poland: central office for combating cybercrime (centralne biuro zwalczania cyberprzestępczości);
portugal: judicial police (polícia judiciária);
romania: romanian police (poliția română);
spain: national police (policía nacional);
sweden: swedish police authority (polisen);
united kingdom: london metropolitan police;
united states: united states secret service (usss) and federal bureau of investigation (fbi);
czechia: bureau of criminal police and investigation service;
estonia: estonian police and border guard board;
canada: royal canadian mounted police.
—
global police agencies take down massive scam website that defrauded thousands of victims
•britain’s metropolitan police said in a statement thursday that the labhost website was used by 2,000 criminals to steal users’ personal details.
•police identified just under 70,000 individual u.k. victims who entered their details onto one of labhost’s websites.
•labhost’s websites were disrupted and replaced with a message stating that law enforcement has seized the services.
a huge fraud website used by thousands of criminals to trick people into handing over personal information such as email addresses, passwords and bank details, has been infiltrated by international police.
britain’s metropolitan police said in a statement thursday that the website, called labhost, was used by 2,000 criminals to steal users’ personal details.
police have so far identified just under 70,000 individual u.k. victims who entered their details onto a website linked to labhost. a total of 37 suspects have been arrested so far, according to the metropolitan police.
police have also disrupted those websites and replaced the information on their pages with a message stating that law enforcement has seized the services.
labhost obtained 480,000 credit card numbers, 64,000 pin codes, as well as more than 1 million passwords used for websites and other online services, the metropolitan police said.
the metropolitan police said that up to 25,000 victims in the u.k. have been contacted by police to notify them that their data has been compromised.
what is labhost?
police say that labhost was set up in 2021 by a criminal cyber network which sought to scam victims out of key personally identifiable information, such as bank details and passwords, by creating fake websites.
criminals were able to use it to exploit victims through existing sites, or create new websites mimicking those of trusted brands including banks, health-care providers and postal services.
“online fraudsters think they can act with impunity,” dame lynne owens, deputy commissioner of the metropolitan police service, said in a statement thursday.
“they believe they can hide behind digital identities and platforms such as labhost and have absolute confidence these sites are impenetrable by policing.”
owens added that the operation showed “how law enforcement worldwide can, and will, come together with one another and private sector partners to dismantle international fraud networks at source.”
private companies including blockchain analysis firm chainalysis, intel 471, microsoft, the shadowserver foundation and trend micro worked with police to identify and bring down labhost.
the investigation started in june 2022 after police received intelligence about labhost’s activities from the cyber defence alliance, an intelligence-sharing partnership between banks and law enforcement agencies.
the met’s cyber crime unit then joined forces with the national crime agency, city of london police, europol, regional u.k. authorities, as well as other international police forces to take action.
—
police storm airports across the uk to break up ‘labhost’ cyber scam gang that defrauded 70,000 brits by using ai to copy banking websites in an ‘industrial scale’ con worth £1m
police have stormed a number of airports across the uk to break up a global cyber scam gang that defrauded 70,000 brits.
the uk-founded website labhost, which had been used to defraud victims on an industrial scale, was infiltrated by the metropolitan police leading to 37 arrests around the world, including at manchester and luton airports.
the site was set up in 2021 by a criminal network and enabled criminals to create their own scam websites designed to trick innocent victims into revealing personal information such as email addresses, passwords, and bank details.
by the beginning of 2024, more than 40,000 fraudulent sites had been created through labhost, which generated just under £1 million in payments from criminal users paying a monthly subscription fee.
as many as 70,000 uk victims were tricked by scamming set up through labhost, which obtained 480,000 card numbers, 64,000 pins and more than one million passwords globally.
criminal subscribers to labhost were able to log on to the service and choose from existing sites or request bespoke pages replicating those of trusted brands including banks, healthcare agencies and postal services.
labhost even provided templates and an easy to follow tutorial allowing would-be fraudsters with limited it knowledge to use the service and set up phishing websites.
phishing is a form of scam where attackers deceive people into revealing sensitive information by masquerading as a legitimate person.
by the beginning of 2024, more than 40,000 fraudulent sites had been created and 2,000 users were registered and paying a monthly subscription fee to labhost.
labhost provided its subscribers with fake profiles for 170 companies to trick victims, including 47 based in the uk.
those subscribing to the ‘worldwide membership’, meaning they could target victims internationally, paid between £200 and £300 a month. since creation, the site has received just under £1 million in payments from criminal users.
work apprehending the gang behind labhost began in june 2022 after detectives received crucial intelligence about the site’s activity from the cyber defence alliance – a group of british-based banks and law enforcement agencies which work together to share intelligence.
the met joined forces with the national crime agency, city of london police, europol, regional organised crime units (rocus) across the country and other international police forces to put an end to the gang’s harmful scheme.
they also worked with a number of tech companies including intel 471 and microsoft to bring down the platform.
between sunday, april 14 and wednesday april 17 a total of 37 suspects were arrested across the uk and by international law enforcement agencies.
this included arrests at both manchester and luton airports, as well as in essex and london. over 70 addresses were searched both in the uk and across the world.
shortly after the arrests were made on wednesday, labhost and its linked fraudulent sites were disrupted and existing information was replaced with a message stating law enforcement had seized the services.
following the met’s intervention, 800 users subscribed to labhost received a video message, nicknamed labhost wrapped, telling them that police ‘know who they are and what they’ve been doing’.
criminals users were shown how much they’ve paid to labhost, how many different sites they’ve accessed and how many lines of data they’ve received, according to data obtained by the met.
these users will continue to be investigated by detectives over the coming weeks and months.
meanwhile, detectives have so far contacted up to 25,000 victims in the uk to tell them their data has been compromised after using scamming sites set up through labhost.
detectives have so far established that just under 70,000 individual uk victims have entered their details into one of labhost’s fraudulent sites, but said the total number of victims is likely to be even higher.
the met said that each victim has been given advice about next steps and how to further protect their data, while a team of officers will also be on hand to provide personalised support to any victims who want further help and advice.
dame lynne owens, deputy commissioner of the metropolitan police service, said: ‘you are more likely to be a victim of fraud than any other crime.
‘in addition to the financial impact, it undermines the public’s confidence in the tools and technology they need to use in daily life. our collective approach should ensure suspects feel that same level of distrust in their own criminal environment.
‘online fraudsters think they can act with impunity. they believe they can hide behind digital identities and platforms such as labhost and have absolute confidence these sites are impenetrable by policing.
‘but this operation and others over the last year show how law enforcement worldwide can, and will, come together with one another and private sector partners to dismantle international fraud networks at source.
‘our approach is to be more precise and targeted with a clear focus on those enabling online fraud to be carried out on an international scale.’
adrian searle, director of the national economic crime centre in the nca, said: ‘fraud is a terrible crime that impacts victims both financially and psychologically, undermining our collective trust in others and the online services on which we all rely.
‘together with cyber crime, it makes up around 50% of all crime in england and wales. recognising the scale and nature of the threat, law enforcement are working evermore closely together, both here and overseas, to target the fraudsters and the technology they are exploiting.
‘this operation again demonstrates that uk law enforcement has the capability and intent to identify, disrupt and completely compromise criminal services that are targeting the uk on an industrial scale.’
—
欧洲刑警组织和18国联合 捣毁诈骗网络钓鱼平台
(伦敦19日讯)欧洲刑警组织和18个国家的警察机构,以及多家大型企业展开联合行动,捣毁一个网络钓鱼诈骗平台。
领导这项全球执法行动的英国警方说,这次行动破坏了名为“labhost”的平台。执法单位过后突击了70个场所,先后在英国等地逮捕37名嫌犯,包括4名疑似创建和运营网站的人。
当局说,这是一个一站式的网络钓鱼平台,骗子可以利用它来创建钓鱼网站,诱骗受害者透露银行信息和密码等个人资料。
欧洲刑警组织的调查发现,该平台在全球拥有约1万名用户,至少有4万个钓鱼域名和“labhost”有关联,受害人数以万计。
当局是在接到情报后,从2022年6月开始调查。参与这次执法行动的包括澳洲、纽西兰、美国等国家,以及微软、区块链分析公司“chainalysis ”、网络犯罪情报公司intel471等企业。
2024.4.12, a joint investigation conducted by several european law enforcement authorities, supported by europol and eurojust, has culminated in the arrest of 9 suspects following the notorious “juicyfields” investment fraud case.
9 arrests in eur 645 million juicyfields investment scam case
unreported damages presumably much higher, with 186 000 persons victimised by massive ponzi scheme
a joint investigation conducted by several european law enforcement authorities, supported by europol and eurojust, has culminated in the arrest of 9 suspects following the notorious “juicyfields” investment fraud case. on an action day carried out on 11 april 2024, over 400 law enforcement officers in 11 countries executed 9 arrest warrants and conducted 38 house searches. during the investigation and action day, eur 4 700 000 in bank accounts, eur 1 515 000 in cryptocurrencies, eur 106 000 in cash and eur 2 600 000 in real estate assets were seized or frozen. law enforcement also seized several luxury vehicles, works of art, cash and various luxury items, as well as large numbers of electronic devices and documents.
according to judicial estimates, the total damages resulting from fake investments in the advertised cannabis cultivation crowdsourcing platform amount to a staggering eur 645 million, but actual and unreported damages could be significantly higher. in total, an estimated 550 000 participants worldwide, most of them european citizens, were registered as online investors. using bank transfers or cryptocurrencies, around 186 000 participants actually transferred funds into the elaborate ponzi scheme active from early 2020 to july 2022.
juicyfields and its fake cannabis investment opportunities
the suspects, of mainly russian but also dutch, german, italian, latvian, maltese, polish, jordanian, united states and venezuelan nationality, used advertisements on social networks to lure victims to their websites. these platforms offered promising crowdsourcing investment opportunities in the cultivation, harvesting and distribution of cannabis plants to be used for medicinal purposes.
with a minimum initial investment of at least eur 50 in this so-called ‘e-growing’ opportunity, investors were promised to be linked with producers of medical cannabis. upon the purchase of a cannabis plant, the platform assured investors – also referred to as e-growers – they could soon collect high profits from the sale of marijuana to authorised buyers. while the company pledged annual returns of 100 percent or more, they did not reveal exactly how they would accomplish this, let alone be able to guarantee it.
the legalisation of cannabis cultivation or the expansion of permissible thc content in cannabis products for personal, recreational, and therapeutic purposes is a significant subject of public debate within the eu. this discourse is further fuelled by the reality that cannabis stands as one of the most widely consumed illicit substances both within the european union and globally. as seen in other contexts, criminal networks are particularly adept at applying new narratives to existing criminal practices, particularly in periods of changes in regulatory frameworks, which may open up a window of opportunity for fraudsters to advertise low-risk, high-profit investment opportunities.
a classic “too good to be true” ponzi scheme
a ponzi scheme is a type of investment scam where criminals promise high returns with little or no risk to investors. instead of actually generating profits through legitimate business activities, the scammers use money from new investors to pay returns to earlier investors. this creates the illusion of a profitable enterprise, but in reality, the scheme collapses when there aren’t enough new investors to sustain the pay-outs, leaving most investors with losses.
as an example, the average – even cautious – investor would make an initial investment of eur 50 and receive a pay-out doubling their money soon after. motivated by these financial gains, many investors would raise the stakes and pay in hundreds, thousands, or in many cases even tens of thousands of euros. the platform feigned credibility as it was not only represented in the digital world, but upheld the image of a trustworthy legal business structure with physical offices, staff and representation at cannabis industry events. initially, the more than 500 000 e-growers were receiving their investment returns. in july 2022 however, the criminals behind the scheme abruptly removed company profiles from social media networks and stopped users from logging in to their accounts, thus freezing cash withdrawals.
complex investigation following elaborate fraud scheme
the widespread occurrence of police reports across europe prompted europol to initiate a coordinated approach for investigations involving multiple eu and non-eu countries. this law enforcement focus on juicyfields and related investment platforms was followed by the establishment of a joint investigation team at eurojust, led by german and spanish police, french gendarmerie and supported by europol, the national crime agency of the united kingdom and other law enforcement from numerous member states. after painstakingly piecing together breadcrumbs of digital evidence, investigators had drawn up a joint intelligence picture that allowed police forces across europe to initiate this wave of arrests.
one of the primary high value targets in this investigation was traced to a residence in the dominican republic. the russian national, suspected to be one of the main organisers of the fraudulent scheme, had a property he was residing at searched by the dominican republic authorities with officers from the spanish investigation team along with a europol specialist deployed on site to assist with coordination.
europol’s role
europol supported this massive cross-border investigation from the very start, taking the lead in operational coordination and providing tailored analytical support. furthermore, europol shared results of financial investigations as well as other intelligence with the involved countries. on the action day, europol deployed officers with mobile offices to various locations around the globe. eurojust ran a coordination centre, staffed by senior police officers from the various investigation authorities, prosecutors and europol staff, to assist with the coordination of legal coercive measures in multiple countries in multiple time zones.
joint investigation team:
france: national gendarmerie (la gendarmerie nationale)
germany: criminal investigation department berlin (landeskriminalamt berlin); berlin public prosecutor’s office (staatsanwaltschaft berlin)
spain: national police (policía nacional – unidad de delincuencia económica y fiscal (udef))
participating countries:
austria, belgium, bulgaria, croatia, cyprus, czech republic, denmark, dominican republic, estonia, finland, greece, hungary, ireland, italy, latvia, lithuania, luxembourg, malta, netherlands, norway, poland, portugal, romania, slovak republic, slovenia, switzerland, united kingdom, united states
participating agencies:
europol
eurojust
(https://www.europol.europa.eu/media-press/newsroom/news/9-arrests-in-eur-645-million-juicyfields-investment-scam-case)
—
uk arrest in €645 million international investment scam
the national crime agency has arrested a senior staff member of a scam company, joining law enforcement across the continent to crack down on “juicyfields” – a notorious and elaborate ponzi scheme.
ponzi schemes are a form of fraud, promising large profits with minimal risk. instead of generating returns through legitimate business activities, the scammers use money from new investors to pay earlier investors, creating the illusion of a profitable enterprise. the scheme collapses when there aren’t enough new investors to sustain the pay-outs.
investments in the platform are thought to amount to a staggering €645 million, though unreported damages could bring that sum far higher.
from early 2020 to 2022, more than 500,000 individuals across dozens of countries were registered to juicyfields websites and offered promising crowdsourcing investment opportunities in the cultivation, harvesting and distribution of medicinal cannabis. over 180,000 investors transferred funds.
in july 2022, those behind the scheme abruptly removed company profiles from social media networks and prevented users from logging into their accounts, thereby freezing cash withdrawals.
the nca’s work was part of co-ordinated action across 10 countries.
huge numbers of police reports across europe led to the establishment of a joint investigation team at eurojust, led by spanish, german and french authorities, and supported by europol, the nca, and policing partners from multiple member states.
on 11 april 2024, law enforcement across the continent arrested nine individuals and conducted over 30 house searches. over the course of the investigation, several millions of euros in crypto assets and bank accounts have been frozen. real estate properties, vehicles, artwork, cash and various luxury items have been seized, in addition to a large number of electronic devices and documents.
officers from the nca, joined by spanish police, arrested a 42 year-old man in atherstone, warwickshire. he was responsible for paying salaries to staff members and helped to legitimise the company by attending industry events.
in a subsequent search of his house, officers recovered a number of digital devices, which will now be forensically analysed. he appeared at westminster magistrates’ court on 11 april for the commencement of extradition proceedings.
tom barford, nca branch commander, said: “criminals like those behind juicyfields are highly adept at identifying new and more sophisticated ways to target victims.
“in this case, individuals across the world were lured by the promise of high returns with little or no risk, and then faced with devastating losses.
“the nca is one of many partners who joined german, french and spanish authorities to take joint action, showing what we can achieve when we come together to tackle serious and organised crime.”
for more information on how to protect yourself from fraud, including ways to report it, visit the stop! think fraud website.
12 april 2024
(https://www.nationalcrimeagency.gov.uk/news/uk-arrest-in-645-million-international-investment-scam)
—
nine arrested in ‘juicyfields’ cannabis fraud probe
european police have swooped on website operators of a now defunct cannabis investment scheme, europol said on friday, arresting nine suspects and seizing millions of euros in bank accounts and cryptocurrency.
some 400 law enforcement officers raided premises around europe and the dominican republic on thursday in an operation against operators of the “juicyfields” ponzi scheme — which europol said duped more than 180,000 investors around the world.
police arrested suspects in britain, germany, italy, latvia, and spain, as well as one of the main suspects, a russian, in the dominican republic.
“according to judicial estimates, the total damages resulting from fake investments in the advertised cannabis cultivation crowdsourcing platform amount to a staggering 645 million euros,” the hague-based law agency said.
“actual damages could be significantly higher,” europol added.
“juicyfields” which europol called an “elaborate” online pyramid scheme, between 2020 and 2022 enticed customers to invest as little as 50 euros to buy a cannabis plant online in so-called “e-growing opportunities.”
the website claimed to link up investors with producers of medical cannabis, promising “annual returns of 100 percent or more,” europol said.
initial investors of the 50 euros were paid out double their investment.
“motivated by these financial gains, many investors would raise the stakes and pay in hundreds, thousands, or in many cases even tens of thousands of euros,” europol said.
“the platform feigned credibility as it was not only represented in the digital world, but upheld the image of a trustworthy legal business structure with physical offices, staff and representation at cannabis industry events,” europol said.
although 186,000 people paid over money to juicyfields, some 500,000 “e-growers” were getting investment returns.
in july 2022 however, the scheme’s backers abruptly removed company profiles from social media networks and stopped users from logging in to their accounts, freezing cash withdrawals.
widespread reports to police triggered europol to coordinate a complex investigation involving various european countries and agencies.
“after painstakingly piecing together breadcrumbs of digital evidence, investigators had drawn up a joint intelligence picture that allowed police forces across europe to initiate this wave of arrests,” europol said.
the russian suspect was at a property in the dominican republic which was searched by local law and spanish law officers, accompanied by a europol specialist.
police seized cash, luxury vehicles, art, cash and various luxury items, europol said.
—
騙走逾222億!大麻投資「龐氏騙局」遭歐警破獲 juicyfields強迫關閉
歐洲警方揭露6億歐元醫用大麻「龐氏騙局」!日前,醫用大麻詐騙集團juicyfields成員於歐洲各國遭逮捕,其利用資金轉移手法建立一套行銷系統,誘導受害者進行投資,行騙蹤跡橫跨歐洲數國。如今,歐洲刑警組織追回部分受害者的財產,juicyfields也被強迫關閉。
詐騙行銷系統
《路透社》報導,歐洲刑警組織及歐洲國家警察逮捕「juicyfields」國際詐騙集團成員,該組織涉嫌使用藥用大麻設計騙局,向眾多國家受害者詐騙高達6.45億歐元(約222億台幣)。此外,他們也建立一個詐騙行銷系統,並在國際大麻博覽會中說服民眾進行投資。
西班牙警方發言人加里多表示,該組織建立一個詐騙行銷系統,並在國際大麻博覽會中說服民眾進行投資,並聲稱利用投資者的資金轉移建立合作夥伴關係,為大麻種植計畫提供援助。透過詐騙行銷系統的運作,該組織向受害者承諾每年有近70%到168%的利潤。
虛假商業模式
《wion》指出,juicyfields以虛假的商業模式吸引受害者,並聲稱使用投資者的資金來種植大麻。然而,juicyfields只是一個詐騙計劃,利用新投資者的錢財來償還先前投資者的資金,而當他們的資金流動無法償還所需時,所建立的資金系統便會崩潰。
英國國家犯罪局(nca)稱其為「惡名昭彰且精心策劃的龐氏騙局」,並表示約有 18 萬人向juicyfields投資。目前,警方封鎖兩個分別有58600歐元和116300歐元的加密貨幣帳戶,並追回了106000歐元現金,其價值26億歐元的財產也被沒收。
如今,9名嫌疑人因涉嫌詐欺而分別在西班牙、英國、德國、拉脫維亞、波蘭、義大利和多明尼加共和國被拘留,在西班牙和英國等多個警方的共同努力下,juicyfields已被關閉。
2024.3.20,cps(the crown prosecution service, 英国皇家检察署)专家团队参与英国最大的比特币扣押行动
https://www.cps.gov.uk/cps/news/specialist-cps-team-involved-uks-largest-bitcoin-seizure
specialist cps team involved in uk’s largest bitcoin seizure
–20 march 2024|news, fraud and economic crime
an ex-takeaway worker has been convicted (wednesday 20 march 2024) of laundering the proceeds which saw her rise from living above a chinese restaurant to residing in a multi-million pound house in an affluent part of north london.
jian wen, 42, was found guilty at southwark crown court of an offence relating to money laundering.
a metropolitan police investigation resulted in the cps seizure of bitcoin wallets from wen, with an initial estimated value in excess of £2 billion. prosecutors told the court the sheer scale of the seized bitcoin, the lack of any legitimate evidence for how it was acquired and its connection to a massive investment fraud in china, all indicated that it was criminal property. the original fraud and acquisition of the bitcoin was undertaken by another suspect who is yet to be arrested and brought before the court. wen was involved in converting significant amounts of bitcoin into cash and other expensive assets, on behalf of the international fraudster.
prior to working for her “employer”, wen lived a modest lifestyle in leeds, with declared earnings in 2015 and 2016 of just £12,800 and £5,979. her fortune changed significantly when she met the fellow chinese national who was the source of the bitcoin.
in 2017, they moved into a six-bedroom property in london, at a rental cost of over £17,000 each month. the two women presented themselves as successfully operating an international jewellery business, with wen operating as the english-speaking and apparently legitimate front person for her employer. wen was later joined by her young son, who moved from china to attend a private school in the uk, benefitting from her newly affluent lifestyle. wen later stated that she had been gifted 3,000 bitcoin, then valued at approximately £15 million, by her employer.
between autumn 2017 and late 2018, wen made efforts to purchase properties in london, valued at £4.5 million, £23.5 million, and £12.5 million. she was hampered by difficulties converting sufficient bitcoin into sterling and by “know your customer” questions asked of her under anti-money laundering regulations. when challenged about the source of the proposed funding for the property purchases, wen claimed it came from legitimate sources including bitcoin mining, a claim that was ultimately not accepted by those she instructed to assist with the sale.
between 2017 and 2019, wen also travelled abroad extensively, throughout europe and elsewhere, largely enabling the conversion of large amounts of bitcoin into more tangible assets. a receipt addressed to wen, for example, showed jewellery worth tens of thousands of pounds had been purchased in zurich. in 2019, she travelled to dubai, arranging to view a number of properties for sale. in october and november of that year, she went on to purchase two properties in dubai. their value in total amounted to more than £500,000.
throughout the course of the investigation and subsequent trial, wen denied knowing that any of the bitcoin was derived from criminality and had no suspicions about its scale.
the cps proceeds of crime division used its civil powers to obtain a property freezing order from the high court against wen whilst it undertakes a non-conviction-based civil recovery investigation. that investigation could result in the forfeiture of the seized bitcoin regardless of whether wen or the other suspect are convicted.
andrew penhale, chief crown prosecutor, said: “bitcoin and other cryptocurrencies are increasingly being used by organised criminals to disguise and transfer assets, so that fraudsters may enjoy the benefits of their criminal conduct. this case, involving the largest cryptocurrency seizure in the uk, illustrates the scale of criminal proceeds available to those fraudsters.
“although the original fraudster remains at large, the metropolitan police and cps have successfully secured a money laundering conviction against jian wen, an individual employed to launder criminal proceeds. the cps will now work to ensure, through criminal confiscation and civil proceedings, that the criminal assets remain beyond the fraudsters’ reach.
“the cps is committed to working closely with law enforcement and investigatory authorities, to bring to justice individuals and companies who engage in laundering criminal proceeds through cryptocurrency.”
adrian foster, chief crown prosecutor said: “the cps has used the full range of our criminal and non-conviction based civil asset recovery powers, to firstly freeze and then look to seize the very large quantity of cryptocurrency and other assets, used by wen and her “employer” to fund their extravagant lifestyle.
“we have worked with the police to obtain freezing orders preserving all the seized cryptocurrency, and a cps-led civil recovery investigation is running to establish that the frozen cryptocurrency is criminal property and to seek its forfeiture.”
detective chief superintendent jason prins, metropolitan police, whose team led the investigation, said: “thanks to the hard work and perseverance of highly skilled detectives in the met, we have been able to disrupt a sophisticated economic crime operation – the sheer scale of which demonstrates how international criminals seek to exploit cryptocurrency online.
“our team have helped secure justice today and have persevered to trace this bitcoin and identify the criminality it was linked to.
“today’s verdict and lengthy five-year investigation demonstrates that we’ll leave no stone unturned in our pursuit to catch criminals who look to enjoy the proceeds of illicit funds – no matter how complex the case.”
notes to editors
•andrew penhale is the chief crown prosecutor for the regional and wales division of the cps serious economic, organised crime and international directorate
•adrian foster is the chief crown prosecutor for cps proceeds of crime division of the serious economic, organised crime and international directorate
•jian wen (dob: 25/12/1981) has been found guilty of one count of entering into or becoming concerned in a money laundering arrangement at southwark crown court and is due to be sentenced on 10 may 2024
•where a defendant refuses to pay their confiscation order in a timely way, cps proceeds of crime division can invite the court to impose an additional default sentence on them of up to 14 years’ imprisonment. the full debt continues to be in force until it is paid, and interest is charged against it at the civil judgement debt rate, currently 8%
•where they are found to have additional available assets in the future, the cps may ask the court to revisit the order and make an additional confiscation order up to the value of their full criminal benefit
—
woman found with £2bn in bitcoin convicted of money laundering arrangement offence
a former takeaway worker found with bitcoin worth more than £2bn has been convicted at southwark crown court of a crime linked to money laundering.
jian wen, 42, from hendon in north london, was involved in converting the currency into assets including multi-million-pound houses and jewellery.
on monday she was convicted of entering into or becoming concerned in a money laundering arrangement.
the met said the seizure is the largest of its kind in the uk.
although wen was living in a flat above a chinese restaurant in leeds when she became involved in the criminal activity, her new lifestyle saw her move into a six-bedroom house in north london in 2017 which was rented for more than £17,000 per month.
she posed as an employee of an international jewellery business and moved her son to the uk to attend private school, the crown prosecution service (cps) said.
that same year, wen tried to buy a string of expensive houses in london, but struggled to pass money-laundering checks and her claims she had earned millions legitimately mining bitcoin were not believed.
she later travelled abroad, buying jewellery worth tens of thousands of pounds in zurich, and purchasing properties in dubai in 2019.
another suspect is thought to be behind the fraud but they remain at large.
the met said it carried out a large scale investigation as part of the case – searching several addresses, reviewing 48 electronic devices, and examining thousands of digital files including many which were translated from mandarin.
det ch supt jason prins, whose team led the investigation, said the “sheer scale” of the operation “demonstrates how international criminals seek to exploit cryptocurrency for illegal purposes”.
“this verdict and lengthy five-year investigation demonstrates that we’ll leave no stone unturned in our pursuit to catch criminals who look to enjoy the proceeds of illicit funds – no matter how complex the case,” he said.
the cps has obtained a freezing order from the high court, while it carries out a civil recovery investigation that could lead to the forfeiture of the bitcoin.
the value of the bitcoin was worth around £2bn at the time of initial estimates – but due to the fluctuation in the currency’s value, it has since increased to around £3.4bn.
cps chief crown prosecutor andrew penhale said bitcoin and other cryptocurrencies “are increasingly being used by organised criminals to disguise and transfer assets, so that fraudsters may enjoy the benefits of their criminal conduct”.
he added this case “illustrates the scale of criminal proceeds available to those fraudsters”.
wen is due to be sentenced on 10 may.
—
how chinese takeaway worker led police to bitcoin worth £3bn in britain’s biggest ever cryptocurrency seizure
jian wen, 42, was said to have been the “front person” recruited to help fugitive yadi zhang launder the profits of a £5bn fraud.
within weeks of yadi zhang’s arrival in london in september 2017, jian wen had left her job and room in a chinese takeaway and moved into a £5m six-bedroom house near hampstead heath.
the women, who claimed to run an international jewellery business trading in diamonds and antiques in countries including japan, thailand and china, travelled the world and spent tens of thousands of pounds on designer clothes and shoes in harrods.
in her newly affluent lifestyle, wen bought a £25,000 e-class mercedes and sent her son to the £6,000-a-term heathside preparatory school.
but alarm bells rang when she tried to buy some of london’s most expensive properties, including a £23.5m seven-bedroom hampstead mansion with a swimming pool and a nearby £12.5m home with a cinema and gym.
wen, who had declared income of just £5,979 in the 2016/17 financial year, could not explain the source of the bitcoin she would use to pay for the properties and police first raided the women’s home on 31 october 2018.
but it would be another two-and-a-half years before investigators realised they had made the uk’s biggest-ever cryptocurrency seizure when more than 61,000 bitcoin were discovered in digital wallets.
the cryptocurrency was worth £1.4bn at the time but its value has now risen to more than £3bn, while 23,308 bitcoin, now worth more than £1bn, linked to the investigation remains in circulation.
the £5bn investment fraud
the bitcoin came from a £5bn investment scam carried out in china by zhang, 45, who arrived in the uk on a false st kitts and nevis passport after conning nearly 130,000 chinese investors in fraudulent wealth schemes between 2014 and 2017, a court heard.
wen was not alleged to have been involved in the underlying fraud.
zhang, who is also known as zhimin qian (which means money in chinese) has fled the uk and her whereabouts are unknown.
wen, 42, has been found guilty of one count of money laundering between october 2017 and january 2022 and the jury failed to reach verdicts on two similar counts following a trial at southwark crown court.
prosecutors are not seeking a retrial and wen will be sentenced on 10 may.
she was acquitted of 10 other money laundering charges at a trial last year, which could not be reported over fears hackers could target the firm holding the seized cryptocurrency if the figures involved were made public.
as a category a prisoner, wen, a small woman wearing large round glasses, was led to the witness box in handcuffs, while two dock officers guarded the door as she gave evidence.
she told jurors she grew up in a working-class family in china, where she met her husband marcus barraclough before coming to the uk while heavily pregnant on a spousal visa in 2007.
wen’s lifestyle change
the relationship broke down following the birth of their son and she lived a modest lifestyle in leeds, where she took a law diploma and completed a ba in economics before moving to london in the summer of 2017.
she had already opened cryptocurrency accounts, making meticulous notes in her wallace and gromit notebook, but said she had “no idea” she would soon be dealing with bitcoin on such a “massive scale”.
she applied for dozens of jobs while working in a chinese takeaway in abbey wood, southeast london, where she lived in a room below the restaurant.
wen said she saw an advert on chinese social media app wechat for a “butler” and first met zhang at the five-star royal garden hotel in kensington. she later described her role as “live-in pa for a high net worth individual” on her cv.
the women soon moved into a £17,000-a-month hampstead home after paying a £40,000 deposit and six months’ rent in advance.
wen took trips to thailand and dubai and the women travelled extensively throughout europe, with zhang – who used aliases including rose, emma, and hua hua – avoiding countries with chinese extradition agreements.
hampstead mansions and a tuscan villa
they sold bitcoin and bought fine jewellery, with receipts found for £25,600 and £18,750 from christopher walser vintage diamonds, in zurich, and two watches worth around £49,300 and £69,900 from van cleef & arpels in switzerland.
over a three-month period at the end of 2017, more than £90,000 was spent in harrods on designer women’s clothes, jewellery and shoes using a rewards card in wen’s name, although she told jurors: “i was the one carrying the bags.”
wen bought two apartments in dubai for more than £500,000 and looked into buying a £10m 18th century tuscan villa with a sea view.
but efforts to buy multimillion-pound properties in london triggered anti-money laundering checks and none of the purchases went ahead because the source of the bitcoin could not be explained.
wen initially claimed the cryptocurrency had been mined, then said it was given to her as a “love present”, drawing up a deed of gift stating she had been given 3,000 bitcoin, then worth £15m, by zhang.
prosecutors said wen acted as a “front person” to help disguise the source of the stolen money, which had been used to buy cryptocurrency to remove the proceeds from china.
‘i was duped’
gillian jones kc said when zhang landed in london she needed to convert the bitcoin back into cash or “property, jewellery or other high-value items”.
wen accepted she was involved in an arrangement dealing with some of the cryptocurrency but said she did not know or suspect it was from the proceeds of crime, claiming she was “duped” by the woman she called her boss.
“we were close… but looking back now, i was badly used,” she said. “i have no idea where she is.”
police say they are still actively looking for zhang.
2023.12.13,警方在非法 sky tv 流媒体调查中突袭赫特和埃塞克斯的住宅,逮捕了两人
两名埃塞克斯男子被认为是在英国各地销售非法电视订阅套餐、价值 80 万英镑的“复杂的大规模犯罪活动”的幕后黑手,现已被捕。周二(12 月 12 日),警方同时突袭了埃塞克斯郡的哈洛和奇格韦尔、赫特福德郡的沃尔瑟姆克罗斯和苏格兰拉纳克郡的住宅地址,导致这对 30 多岁的两人因涉嫌欺诈、洗钱和知识产权犯罪而被捕。他们被警方拘留接受审问,随后被保释。调查正在进行中。此次调查由东部地区特别行动小组 (ersou) 牵头,涉及 telegram 频道出售未经授权访问 sky tv 套餐的行为,这些套餐被认为已转售给数千名最终用户,使涉案者获利超过 80 万英镑。ersou 地区有组织犯罪部门的督察史蒂夫·佩恩 (steve payne) 表示:“昨天的逮捕行动是对一项复杂的大规模犯罪活动调查的一部分,该犯罪活动通过非法销售电视订阅套餐赚取了大量资金。我们从经验中得知,通过此类非法手段获得的资金往往会用于资助更广泛的有组织犯罪活动,这就是为什么逮捕涉案人员至关重要。我们还获得了购买流媒体的人的详细信息,我会提醒任何这样做的人,他们将触犯法律,并最终可能受到刑事诉讼。”
two essex men thought to be behind an £800,000 “sophisticated large-scale criminal operation” selling illicit tv subscription packages across the uk have been arrested. simultaneous police raids on residential addresses in harlow and chigwell in essex, waltham cross in hertfordshire and lanarkshire in scotland on tuesday (december 12) resulted in the pair, in their 30s, being arrested on suspicion of fraud, money laundering and intellectual property offences.
two arrests as police raid herts and essex homes in illegal sky tv streaming investigation
two essex men thought to be behind an £800,000 “sophisticated large-scale criminal operation” selling illicit tv subscription packages across the uk have been arrested.
simultaneous police raids on residential addresses in harlow and chigwell in essex, waltham cross in hertfordshire and lanarkshire in scotland on tuesday (december 12) resulted in the pair, in their 30s, being arrested on suspicion of fraud, money laundering and intellectual property offences.
a 35-year-old man was detained in chigwell, where specialist financial investigators seized £17,000 in cash, custom streaming devices and digital devices, which were sent for further examination.
a 33-year-old harlow man was also arrested for firearms licence breaches after two shotguns were seized.
they were taken into police custody for questioning and subsequently bailed. enquiries are ongoing.
the investigation, led by the eastern region special operations unit (ersou), relates to a telegram channel selling unauthorised access to sky tv packages, which are thought to have been resold to thousands of end users, earning those involved more than £800,000.
det insp steve payne, from ersou’s regional organised crime unit, said: “yesterday’s arrests form part of an investigation into a sophisticated large-scale criminal operation which has generated significant sums of money through the illicit sale of tv subscription packages.
“we know from experience that the money generated through illegal means such as this often goes on to fund wider organised criminality, which is why it’s key to apprehend those involved.
“we have also gained access to the details of those purchasing the streams, and i would remind anyone doing so that they will be breaking the law and could ultimately be subject to criminal proceedings.”
matt hibbert, director of anti-piracy, uk and republic of ireland, at sky, said: “we’re grateful to ersou and to the forces involved for taking this action, which will have a significant impact on the illicit sale of sky tv.
“we’ll continue to support efforts to shut down the organised networks involved in the large-scale theft of our content and to protect consumers from the risks involved in accessing content in this way. anyone concerned about those risks can visit bestreamwise.com for more information.”
illegal streaming services are increasingly operated by sophisticated criminal networks, often involved in other types of crime including cyber-crime. using illegal streams can give criminals your personal information from which they can steal your money or identity and increases the risk of devices being infected with viruses and malware.
发表回复