Skip to main content
Mallory

California Man Sentenced for Laundering Millions From Social-Engineering Crypto Heists

enforcement-actioncryptocurrency-platform-riskvoice-social-engineeringidentity-impersonation-fraudremote-access-implant
Updated April 30, 2026 at 09:01 PM4 sources
Share:
California Man Sentenced for Laundering Millions From Social-Engineering Crypto Heists

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Evan Tangeman, a 22-year-old from Newport Beach, California, was sentenced to 70 months in prison after pleading guilty to a RICO conspiracy tied to a cybercriminal network that stole roughly $230 million to $260 million in cryptocurrency from victims. Prosecutors said Tangeman laundered at least $3.5 million between October 2023 and May 2025 for the group, which allegedly stole more than 4,100 Bitcoin from a Washington, D.C., victim in August 2024 and used the proceeds to fund luxury homes, private jets, high-end vehicles, private security, and other lavish purchases.

Authorities said the organization, identified by law enforcement as the Social Engineering Enterprise, targeted wealthy cryptocurrency holders using stolen and dark-web-sourced data, spoofed phone numbers, impersonation of Google and Gemini support staff, and remote-access tools including AnyDesk to obtain Bitcoin Core private keys. Investigators alleged the group then obscured the proceeds through mixers, exchanges, peel chains, pass-through wallets, and VPNs, while Tangeman also helped rent properties under false identities and destroy devices after arrests of key members. Another alleged launderer, Kunal Mehta, has also pleaded guilty and is awaiting sentencing.

Timeline

  1. Apr 27, 2026

    Evan Tangeman sentenced to 70 months in prison

    On April 27, 2026, Tangeman was sentenced to 70 months in prison for laundering funds tied to the cryptocurrency theft enterprise. The sentence followed his guilty plea and admissions about helping conceal and spend stolen proceeds.

  2. Dec 1, 2025

    Tangeman pleads guilty to RICO conspiracy

    Evan Tangeman pleaded guilty in December 2025 to RICO conspiracy charges connected to laundering proceeds from the cryptocurrency theft enterprise. He admitted laundering at least $3.5 million in stolen cryptocurrency.

  3. Nov 1, 2025

    Kunal Mehta pleads guilty in related case

    Another alleged money launderer, Kunal Mehta, pleaded guilty in November 2025 in the same broader case. He was reported to be awaiting sentencing.

  4. May 31, 2025

    Tangeman's laundering activity period ends

    Prosecutors said Tangeman's admitted laundering conduct continued through May 2025. His role included helping conceal operations and arranging luxury home purchases and rentals under false identities.

  5. Sep 1, 2024

    U.S. charges 14 suspects in RICO conspiracy

    Authorities charged 14 suspects across September 2024 and May 2025 in a RICO conspiracy tied to the cryptocurrency theft and laundering scheme. Prosecutors alleged the network stole roughly $230 million to $260 million in cryptocurrency from victims.

  6. Sep 1, 2024

    Authorities arrest several enterprise leaders

    According to prosecutors, several leaders of the organization were arrested in 2024. After those arrests, Tangeman allegedly ordered the destruction of devices and other evidence.

  7. Aug 1, 2024

    Victim loses more than 4,100 Bitcoin in social-engineering theft

    In August 2024, the group allegedly stole more than 4,100 Bitcoin from a Washington, D.C., victim. Authorities said the theft involved spoofed phone numbers, impersonation of Google and Gemini support, and AnyDesk access to obtain Bitcoin Core private keys.

  8. Oct 1, 2023

    Tangeman launders millions for the crypto theft enterprise

    Between October 2023 and May 2025, Evan Tangeman allegedly helped launder at least $3.5 million for the criminal enterprise. Prosecutors said the group used mixers, exchanges, peel chains, pass-through wallets, and VPNs to conceal proceeds.

  9. Jan 1, 2023

    Social Engineering Enterprise forms to target crypto holders

    Prosecutors said the criminal organization later dubbed the Social Engineering Enterprise was formed in 2023 by Malone Lam in Singapore. The group allegedly used stolen and dark-web-purchased databases to identify wealthy cryptocurrency holders for theft and fraud.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

US Law Enforcement Actions Targeting Crypto-Enabled Crime and Illicit Marketplaces

US Law Enforcement Actions Targeting Crypto-Enabled Crime and Illicit Marketplaces

US authorities reported multiple enforcement actions tied to **crypto-enabled crime**. In the Empire Market case, prosecutors said co-creators **Raheim Hamilton** and **Thomas Pavey** designed the dark web marketplace to help users evade law enforcement and launder proceeds; the market allegedly facilitated about **$430M** in transactions (drugs, stolen payment data, counterfeit currency) before disappearing in 2020 in what investigators described as an exit scam that stole an estimated **$30M** in bitcoin. Hamilton pleaded guilty to federal drug conspiracy charges and agreed to forfeit roughly **1,230 BTC** plus **24.4 ETH** and real estate; Pavey previously pleaded guilty and agreed to forfeit about **1,584 BTC** and other assets. Separately, reporting highlighted alleged misuse and laundering of digital assets in other contexts. On-chain investigator **ZachXBT** traced movements from wallets associated with **US-seized crypto** (held under U.S. Marshals Service custodianship) to wallets allegedly linked to **John Daghita**, the son of a federal contractor executive, with claims of roughly **$23M** in diverted cryptocurrency and another wallet holding about **$36M** in Ethereum; ZachXBT said he alerted the **U.S. Marshals Service**. In another DOJ case, **Jingliang Su** (a Chinese national) was sentenced to **46 months** for laundering proceeds from a cryptocurrency investment fraud that authorities said victimized **174** people for **$36.9M**, using social engineering via social media/dating platforms and counterfeit trading sites, with **$26.9M** restitution ordered and multiple US agencies involved in tracing funds and dismantling the network.

1 months ago
Social Engineering Enterprise Cryptocurrency Theft and Prosecution

Social Engineering Enterprise Cryptocurrency Theft and Prosecution

A criminal group known as the Social Engineering Enterprise orchestrated large-scale cryptocurrency thefts using social engineering tactics and physical attacks to gain access to victims' digital assets. The group targeted individuals with significant cryptocurrency holdings, either deceiving them into revealing access credentials or physically breaking into their homes to steal devices containing private keys. Law enforcement efforts have led to multiple arrests and guilty pleas, including a California man who admitted to laundering millions in stolen cryptocurrency and facilitating the group's operations by renting luxury properties for their activities. In related developments, a key participant in a $263 million social engineering ring pleaded guilty, and additional members have been indicted and arrested in various locations, including Miami and Dubai. The group's operations began in late 2023 and involved members from the United States and abroad, who coordinated attacks and laundered proceeds through real estate and other means. The ongoing investigation highlights the growing threat of organized cybercrime targeting cryptocurrency holders through both digital and physical means.

1 months ago
Daren Li Sentenced in Absentia for $73M Pig-Butchering Crypto Laundering Scheme

Daren Li Sentenced in Absentia for $73M Pig-Butchering Crypto Laundering Scheme

A U.S. federal court sentenced **Daren Li** (42), a dual citizen of **China** and **St. Kitts and Nevis**, to **20 years in prison in absentia** for conspiring to launder proceeds from an international **“pig butchering”** cryptocurrency investment/romance-baiting fraud that stole more than **$73 million** from victims. Li pleaded guilty in **November 2024** and admitted that at least **$73.6 million** in victim funds was deposited into accounts controlled by his group, with a significant portion routed through **U.S.-based shell companies**; the operation was tied to scam centers in **Cambodia** and relied on a network of money launderers to move funds through U.S. bank accounts and onward to domestic/international accounts and crypto platforms to obscure origins. Li was arrested in **April 2024** at **Hartsfield-Jackson Atlanta International Airport**, but fled before sentencing in **December 2025** after cutting off his ankle monitor; U.S. authorities have not publicly confirmed his current whereabouts and indicated they will work with international partners to return him to serve the sentence. The court also imposed **three years of supervised release** following imprisonment, and reporting noted that multiple co-conspirators have pleaded guilty, with Li described as the first sentenced defendant directly involved in receiving victim funds.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

California Man Sentenced for Laundering Millions From Social-Engineering Crypto Heists | Mallory