

The exposure of Operation Destabilise marked a significant breakthrough in understanding how modern money laundering networks operate at the intersection of cryptocurrency and organized crime. This extensive operation resulted in 128 arrests worldwide and the seizure of over £25 million ($33 million) in cash and cryptocurrency in Britain alone, revealing the sophisticated infrastructure behind crypto-based money laundering.
The Smart and TGR networks functioned as illicit clearing houses, operating a complex system that collected physical cash in one country and made equivalent value available in another jurisdiction. These networks leveraged Tether's stablecoin to provide massive liquidity, enabling seamless cross-border transfers that traditional banking systems would flag or block. The operational model was particularly attractive to criminal organizations because it combined the anonymity of cash with the speed and global reach of cryptocurrency.
These crypto-rich criminal rings specialized in converting dirty money from various illegal activities, including the drugs trade and firearms supply, into clean digital assets. The transformation process involved multiple layers of obfuscation, making it extremely difficult for law enforcement to trace the original source of funds. By the time the money emerged as cryptocurrency, it had been laundered through numerous intermediary wallets and exchanges, effectively breaking the chain of evidence.
The client base of these networks was remarkably diverse, ranging from sanctioned broadcaster Russia Today in the UK to the notorious Kinahan family crime syndicate. The networks demonstrated their versatility by supporting almost any type of criminal activity through seamless cross-border value transfers. This flexibility made them invaluable to both state-sponsored operations and traditional organized crime groups.
"Through this laundering scheme, we can now draw a line between the money involved in the local drugs trade to global organized crime, geopolitics, and state sponsored activity," said Sal Melki, the NCA's deputy director for economic crime. This statement underscores how cryptocurrency laundering has created unprecedented connections between previously separate criminal ecosystems.
The networks operated at multiple levels of international money laundering, from collecting street cash from drug deals at the lowest tier to purchasing banks and enabling breaches of global sanctions at the highest level. This multi-tiered approach allowed them to serve clients with varying needs and risk profiles, making them a one-stop solution for criminal money laundering.
Beyond the UK operation, Russian intelligence services have increasingly relied on Bitcoin and other cryptocurrencies to fund covert operations across Europe, demonstrating how state actors have adapted to digital payment methods for espionage activities. This shift represents a significant evolution in how intelligence agencies conduct financial operations in the digital age.
In mid-2024, a comprehensive Reuters investigation conducted in collaboration with blockchain forensics firms Global Ledger and Recoveris revealed how the Federal Security Service (FSB) systematically used cryptocurrency to finance espionage operations. The investigation uncovered a sophisticated payment structure that included recruiting Canadian teenager Laken Pavan after detaining him in Donetsk, illustrating how intelligence agencies target vulnerable individuals for recruitment.
Pavan received just over $500 in Bitcoin while in Copenhagen before fleeing to Poland, where he eventually turned himself in and received a 20-month sentence. While this amount might seem modest, it represents the typical payment structure for low-level operatives in intelligence operations. The use of Bitcoin allowed the FSB to make this payment without traditional banking oversight, avoiding the scrutiny that would accompany an international wire transfer.
Blockchain analysts traced the payment through multiple intermediary wallets to a larger wallet created in June 2022 that has since processed more than $600 million in Bitcoin. This discovery revealed the massive scale of FSB cryptocurrency operations, with transactions routed through sanctioned Russian exchange Garantex and other platforms designed to evade international sanctions. The wallet's transaction history provided unprecedented insight into the financial infrastructure supporting Russian intelligence operations.
Global Ledger's detailed analysis found that transactions from FSB-linked wallets followed highly structured laundering patterns, operating exclusively during Moscow business hours. This operational security pattern provided crucial evidence linking the wallets to Russian state actors, as the timing consistency suggested institutional rather than individual control of the funds.
Recoveris identified an extensive network of 161 Bitcoin addresses tied to the FSB, with hundreds of transactions occurring within 6 a.m. to 6 p.m. Moscow time. This temporal pattern analysis became a key forensic tool in identifying state-sponsored cryptocurrency activity, demonstrating how behavioral patterns can reveal the operators behind anonymous blockchain transactions.
In recent operations, Canadian regulators discovered that unregistered crypto exchange companies are facilitating large cash-for-crypto transactions without requiring identity verification, delivering up to $1 million in untraceable cash. This finding highlighted a critical vulnerability in North American cryptocurrency regulation, where unlicensed operators can move significant sums without triggering anti-money laundering protocols.
The expansion of cryptocurrency laundering networks has become a critical concern for law enforcement agencies worldwide, as the infrastructure supporting these operations continues to grow in sophistication and scale. The proliferation of crypto ATMs and unregulated exchange services has created new vulnerabilities in the financial system.
In early 2025, federal prosecutors charged Firas Isa, founder of Chicago-based Crypto Dispensers, with money-laundering conspiracy for allegedly moving at least $10 million in fraud and drug proceeds through crypto kiosks nationwide between 2018 and 2025. This case exemplifies how legitimate-seeming cryptocurrency businesses can serve as fronts for large-scale money laundering operations. The seven-year operation demonstrated the persistent nature of these criminal enterprises and the challenges law enforcement faces in detecting them.
The indictment arrived as FBI data revealed a dramatic increase in crypto ATM-related complaints, with nearly 11,000 incidents reported in 2024, totaling more than $246 million in losses. This surge in complaints reflects both the growing popularity of crypto ATMs and their increasing exploitation by criminal networks. The machines' ability to facilitate anonymous, high-value transactions makes them particularly attractive for money laundering purposes.
In parallel developments, the Treasury's Office of Foreign Assets Control (OFAC) has sanctioned eight individuals and two North Korean entities for laundering proceeds from cyber theft and operating an IT worker scheme. The sanctions cited more than $3 billion stolen over three years, primarily in cryptocurrency, highlighting how state-sponsored actors from multiple countries have embraced digital assets for illicit financial activities. The North Korean operations particularly focused on circumventing international sanctions through cryptocurrency channels.
The designations block property within US jurisdiction and prohibit transactions involving designated parties, imposing strict compliance obligations on crypto businesses to halt flows that touch listed names or related addresses. These sanctions represent a growing trend of regulators using traditional financial enforcement tools to combat cryptocurrency-based money laundering, though their effectiveness remains limited by the borderless nature of blockchain technology.
Ekaterina Zhdanova, the central figure in the UK investigation, was hit with US sanctions in 2023 after authorities determined she moved more than $100 million for one oligarch to the United Arab Emirates. Her case illustrates the international nature of cryptocurrency money laundering, where operators can serve clients across multiple jurisdictions while physically residing in countries with limited cooperation with Western law enforcement.
Zhdanova has spent over a year in pre-trial detention in France, accused of crimes in a separate case, while the NCA has arrested 45 suspected money launderers in under 12 months and seized £5.1 million in cash. These enforcement actions demonstrate increased international cooperation in combating cryptocurrency-enabled money laundering, though the arrests represent only a fraction of the individuals involved in these extensive networks. The ongoing investigations suggest that authorities are working to dismantle the broader infrastructure supporting these operations rather than simply pursuing individual cases.
UK police identified the scheme through blockchain transaction analysis, tracking suspicious crypto fund flows to known Russian operatives. Advanced forensics linked wallet addresses to illicit money laundering activities, revealing the laundromat network used for espionage financing.
The case involved Bitcoin and Ethereum used in layered transactions across multiple wallets. Illicit funds were converted through peer-to-peer exchanges, mixed via tumbling services, and transferred across decentralized protocols to obscure the money trail and conceal Russian intelligence funding sources.
Cryptocurrencies enable faster, borderless transactions with pseudonymity, lack centralized oversight, have lower regulatory barriers, and offer difficulty in transaction tracing. These factors make them attractive for illicit financial activities compared to heavily regulated traditional banking systems.
Governments implement AML/KYC regulations, blockchain monitoring, asset freezes, and international cooperation through FATF guidelines. They establish crypto licensing frameworks, enhance transaction surveillance, and prosecute money laundering cases to combat illegal financing activities.
This incident may increase regulatory scrutiny on crypto platforms, prompting stricter compliance measures. Legitimate users could face enhanced KYC requirements and transaction monitoring. Short-term, market confidence may dip, but long-term adoption strengthens as industry standards improve, benefiting compliant projects and serious investors.
Notable cases include the North Korean Lazarus Group's Sony hack funds laundering through crypto exchanges, Russian FSB operatives using Bitcoin for espionage financing, Chinese APT groups converting stolen assets via privacy coins, and Iranian IRGC-linked entities moving sanctions-evasion funds through decentralized protocols.
Exchanges deploy KYC/AML protocols, transaction monitoring systems, wallet screening, suspicious activity reporting, and blockchain analysis tools to identify and block illicit transactions and comply with regulatory requirements.











