Crypto
Russian National Charged With Laundering $530 Million Through Cryptocurrency Companies
Iurii Gugnin, a 38-year-old Russian national residing in New York, has been charged with 22 criminal counts by the US Department of Justice (DOJ) for allegedly laundering over $530 million through his cryptocurrency companies, Evita Investments and Evita Pay. The charges include wire fraud, bank fraud, money laundering, and violations of the International Emergency Economic Powers Act (IEEPA).
Gugnin is accused of creating a financial pipeline using the stablecoin Tether USDt (USDT) to support sanctioned Russian entities and bypass US sanctions and export controls. He allegedly deceived banks, falsified compliance documents, and facilitated access to sensitive US technologies. Gugnin’s actions highlight the misuse of digital assets for illicit finance and the growing challenges of regulating cryptocurrency markets.
Gugnin presented Evita as a legitimate cryptocurrency payment service but allegedly used it to secretly transfer illegal funds for Russian clients. By posing as a compliant financial technology company, Evita moved money through US banks and crypto exchanges while hiding the funds’ real sources. As president, treasurer, and compliance officer, Gugnin had complete control over these companies’ operations, finances, and regulatory reporting, enabling him to manage transactions, misrepresent the companies’ activities, and ignore Anti-Money Laundering (AML) rules. Authorities claim Evita’s systems were used to help sanctioned Russian entities obtain US technology and channel funds through stablecoins like USDT.
Gugnin is accused of moving $530 million through the US financial system while concealing the illicit origins of the funds. He laundered about $530 million through US banks and cryptocurrency exchanges, primarily using USDT, a stablecoin tied to the US dollar and known for its fast, low-volatility cross-border transactions. The operation involved receiving cryptocurrency from foreign clients, many connected to sanctioned Russian banks, including Sberbank, VTB, Sovcombank, and Tinkoff. These digital funds were channeled through cryptocurrency wallets controlled by Evita and then converted into US dollars or other traditional currencies via US bank accounts. This helped Gugnin to obscure their origins and assist Russian clients in evading international sanctions.
Gugnin used deceptive methods to hide the illegal nature of these cross-border transactions. He altered invoices digitally to remove the names and addresses of Russian clients and provided false compliance documents to banks and cryptocurrency exchanges. These documents wrongly claimed that Evita had no ties to sanctioned entities and had complied with AML and Know Your Customer (KYC) regulations. Despite claiming compliance, Evita allegedly operated without an actual AML compliance and failed to file Suspicious Activity Reports (SARs) as required by US regulations. This allowed Gugnin to mask the source and purpose of the funds, enabling high-risk transactions that may have supported Russia’s access to restricted US technology.
Gugnin, through his cryptocurrency companies, allegedly created a financial network to support Russian entities banned by US sanctions. Prosecutors allege he handled more than $500 million in transactions for Russian clients connected to sanctioned banks, including PJSC Sberbank, PJSC Sovcombank, PJSC VTB Bank, and JSC Tinkoff Bank. While living in the US, Gugnin held personal accounts with sanctioned banks JSC Alfa-Bank and PJSC Sberbank. He also enabled payments to acquire US export-controlled technology, such as sensitive servers, and laundered money to obtain components for Rosatom, Russia’s state nuclear agency. Actions of Gugnin and Evita provided Russian clients access to restricted components. Gugnin hid his activities by altering invoices to conceal Russian ties and falsifying compliance documents.
Gugnin and his companies are accused of deliberately violating US sanctions and export controls and the International Emergency Economic Powers Act (IEEPA). He allegedly deceived US banks and cryptocurrency exchanges by falsely stating that Evita had no connections with sanctioned Russian entities, while actively processing transactions for clients linked to blacklisted banks. To hide his activities, Gugnin secured a Florida money transmitter license by providing false details about Evita’s operations. This allowed him to use crypto exchange services under the pretense of compliance. Gugnin transferred over $500 million, often in USDT, into the US financial system through this scheme. Gugnin’s actions violated federal laws and threatened national security by enabling sanctioned entities to evade restrictions and illegally obtain sensitive US technologies.
The US DOJ alleges that Gugnin and his crypto companies failed to follow key AML rules required by the Bank Secrecy Act. Although Gugnin presented Evita as a legitimate money services business, he allegedly did not establish an effective AML program and failed to submit suspicious activity reports (SARs) to the Financial Crimes Enforcement Network (FinCEN), which are crucial for detecting and preventing illegal financial activities. Moreover, Gugnin misled banks and cryptocurrency exchanges by falsely claiming that Evita complied with strict AML and KYC standards, when these measures were either inadequate or missing. This deception allowed over $500 million to flow through the US financial system without proper regulatory oversight.
Federal investigators found strong evidence that Gugnin knew his actions were illegal. They found that Gugnin had allegedly searched terms like “how to know if there is an investigation against you,” “money laundering penalties US,” and “am I being investigated?” This showed he was aware of potential legal risks. Gugnin had also searched for “Evita Investments Inc. criminal records” and “Iurii Gugnin criminal records,” indicating he was worried about the consequences of his actions. Gugnin had also visited websites explaining signs of being under criminal investigation and ways to detect law enforcement attention. These online activities suggest he was conscious of his guilt and actively tried to avoid detection. This digital evidence supports the prosecution’s claim that Gugnin intentionally broke US laws while attempting to conceal his money laundering activities from authorities.
Gugnin faces a 22-count federal indictment for offenses related to laundering $530 million through his cryptocurrency companies. He has been charged with wire fraud, bank fraud, money laundering, conspiracy to defraud the US, violations of the IEEPA, and running an unlicensed money transmitting business. Additional charges stem from Gugnin’s failure to establish an effective AML program and not filing suspicious activity reports (SARs). If found guilty, Gugnin could face up to 30 years in prison for each bank fraud charge and up to 20 years for wire fraud and sanctions violations. Gugnin was arrested and arraigned in New York, and he is currently detained while awaiting trial, as authorities consider him a flight risk.
The case against Gugnin reveals increasing concerns about cryptocurrencies, especially stablecoins like Tether, being used to evade cryptocurrency regulations and US sanctions. As part of a broader effort to combat illegal crypto activities, the indictment shows how sanctioned entities, particularly those connected to Russia, use digital currencies to bypass restrictions and access global financial systems. Although stablecoins provide transparent transaction records, their speed and worldwide reach make them appealing for money laundering. The Gugnin case may lead to stricter regulations for crypto exchanges, payment processors, and money transmitters, with more vigorous enforcement of AML and sanctions compliance rules. Gugnin’s case also highlights the national security risks, as his actions enabled Russian clients to obtain restricted US technology. It may result in regulators imposing more stringent reporting measures on crypto firms to prevent foreign adversaries from exploiting digital finance to harm US interests.
Crypto
UK Treasury to regulate cryptocurrency under new legislation
The UK is set to introduce new legislation by 2027 that will bring cryptocurrencies, including Bitcoin, under a regulatory framework akin to traditional financial products.
The Treasury has unveiled plans for these new laws, which will mandate crypto firms to adhere to a specific set of standards and rules. These will be rigorously overseen by the Financial Conduct Authority (FCA).
This move comes amidst a broader push to reform the burgeoning crypto market, which has seen a surge in popularity as both an alternative investment and a method of payment.
Currently, unlike established financial instruments such as stocks and shares, the cryptocurrency sector lacks comparable regulation, potentially leaving consumers with reduced protection.

The Government said the new rules, coming into force in 2027, will make the industry more transparent and make it easier to detect suspicious activity, impose sanctions or hold firms to account over their activity.
Chancellor Rachel Reeves said: “Bringing crypto into the regulatory perimeter is a crucial step in securing the UK’s position as a world-leading financial centre in the digital age.
“By giving firms clear rules of the road, we are providing the certainty they need to invest, innovate and create high-skilled jobs here in the UK, while giving millions strong consumer protections, and locking dodgy actors out of the UK market.”
Crypto firms, which can include crypto exchanges and digital wallets, currently have to register with the FCA if they provide services that fall within the scope of money laundering regulations.
The changes will bring firms that provide crypto services into the remit of the FCA with the intention of supporting legitimate businesses.
City minister Lucy Rigby said: “We want the UK to be at the top of the list for cryptoassets firms looking to grow and these new rules will give firms the clarity and consistency they need to plan for the long term.”
Crypto
SEC Sets Bullish Tone on On-Chain Markets as Blockchain Settlement Becomes Strategic Priority
Crypto
Westlake police say cryptocurrency scam cost woman over $5,000
WESTLAKE, Ohio – A convenience store clerk at 1:30 p.m. on Nov. 26 alerted a police dispatcher that a female customer was feeding large amounts of cash into a cryptocurrency ATM at the store on Center Ridge Road at Dover Center Road.
The clerk said the customer would not believe the clerk’s warning that she was being scammed.
Officers arrived to find the 71-year-old still “anxiously depositing” cash into the machine. Officers told her to stop, but she did not believe the uniformed men. The officers talked to her for several minutes before she finally believed that there was an issue. She was still on the phone with the scammer at the time.
The incident started that morning when the victim received a pop-up message on her home computer instructing her to call a provided support phone number due to a supposed issue with the computer’s operating system. She called the number and was connected to a man who claimed he was a representative from Apple, according to a police department press release.
The man talked her into allowing him remote access to her computer while he asked for her bank information. The scammer talked the victim into believing that there was a problem with her accounts, and she was at risk of losing $18,000 in connection with pornographic websites out of China or Mexico.
She was connected to a fake fraud department for her bank, and another scammer persuaded her to go to a bank and withdraw as much cash as they would allow. The scammer even told her to give the teller a story about needing cash to buy a car. The perpetrator kept the woman on the phone as she took out cash and traveled to the crypto ATM. The victim had deposited approximately $5,500 before officers persuaded her to stop. The Westlake Detective Bureau is attempting to recover the lost funds.
Get police blotters by email every weekday for free with our new Police Blotter newsletter. Sign up at cleveland.com/newsletters.
Read more from the West Shore Sun.
-
Alaska1 week agoHowling Mat-Su winds leave thousands without power
-
Texas1 week agoTexas Tech football vs BYU live updates, start time, TV channel for Big 12 title
-
Washington6 days agoLIVE UPDATES: Mudslide, road closures across Western Washington
-
Iowa1 week agoMatt Campbell reportedly bringing longtime Iowa State staffer to Penn State as 1st hire
-
Miami, FL1 week agoUrban Meyer, Brady Quinn get in heated exchange during Alabama, Notre Dame, Miami CFP discussion
-
Iowa2 days agoHow much snow did Iowa get? See Iowa’s latest snowfall totals
-
Cleveland, OH1 week agoMan shot, killed at downtown Cleveland nightclub: EMS
-
World1 week ago
Chiefs’ offensive line woes deepen as Wanya Morris exits with knee injury against Texans