Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese National Jailed to 46 Months for Laundering Millions of Dollars Stolen from American Investors

Posted on January 28, 2026January 28, 2026 By CWS

A Chinese language nationwide named Jingliang Su has been sentenced to 46 months in jail for his involvement in a serious cryptocurrency fraud scheme concentrating on American traders.

On January 27, 2026, federal courts ordered Su to serve his sentence and pay $26.9 million in restitution to victims.

The case represents a major legislation enforcement victory towards worldwide monetary crime networks that exploit digital property to steal from unsuspecting Individuals.

This legal operation impacted 174 victims throughout the US who misplaced a mixed $36.9 million in fraudulent digital asset investments.

The rip-off operated by way of coordinated worldwide operations primarily based in Cambodia, the place legal networks orchestrated elaborate schemes to deceive victims.

Su and his co-conspirators used social media platforms, telephone calls, textual content messages, and on-line relationship providers to ascertain false belief with potential victims.

The criminals then promoted pretend digital asset funding alternatives by way of counterfeit web sites designed to imitate respectable cryptocurrency buying and selling platforms.

Victims believed they have been investing in real cryptocurrency platforms after they have been truly transferring funds straight into accounts managed by the rip-off community.

The Workplace of Public Affairs, US Division of Justice, famous that this case demonstrates how criminals have weaponized the web and digital monetary techniques for large-scale fraud operations.

Legislation enforcement businesses together with U.S. Secret Service, Homeland Safety Investigations, and Customs and Border Safety labored collectively to dismantle the legal community and hint the movement of stolen cash.

Cash Laundering Infrastructure and Digital Asset Misuse

Essentially the most important side of this operation concerned the delicate cash laundering infrastructure that Su helped set up.

After victims despatched funds to shell firm financial institution accounts, Su and his associates coordinated the switch of $36.9 million to a single account at Deltec Financial institution within the Bahamas.

From there, the legal community transformed the stolen cash into Tether (USDT), a stablecoin cryptocurrency designed to keep up secure worth.

This conversion step proved crucial to the scheme as a result of it allowed the criminals to maneuver cash throughout worldwide borders rapidly whereas avoiding conventional banking oversight.

Su then directed the switch of transformed cryptocurrency to a digital asset pockets managed in Cambodia, the place regional rip-off middle leaders distributed funds all through Southeast Asia.

This layered method utilizing respectable cryptocurrency infrastructure made tracing the cash exceptionally tough for legislation enforcement.

Su’s responsible plea in June 2025 to conspiracy to function an unlicensed cash transmitting enterprise mirrored his central position in managing the monetary spine of this worldwide fraud operation.

Eight co-conspirators have already pleaded responsible, with sentences starting from 36 to 51 months in jail.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:American, Chinese, Dollars, Investors, Jailed, Laundering, Millions, Months, National, Stolen

Post navigation

Previous Post: Fortinet Patches Exploited FortiCloud SSO Authentication Bypass
Next Post: Indurex Emerges From Stealth to Close Security Gap in Cyber-Physical Systems

Related Posts

Next.js Released a Scanner to Detect and Update Apps Impacted by React2Shell Vulnerability Cyber Security News
Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks Cyber Security News
New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses Cyber Security News
Beware of Fake ‘LastPass Hack’ Emails Trying to Trick Users Into Installing Malware Cyber Security News
LG WebOS TV Vulnerability Let Attackers Bypass Authentication and Enable Full Device Takeover Cyber Security News
Livewire Filemanager Vulnerability Exposes Web Applications to RCE Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Why We Can’t Let AI Take the Wheel of Cyber Defense
  • SoundCloud Data Breach Exposes 29.8 Million Personal users Details
  • Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
  • Chrome Security Update Patches Background Fetch API Vulnerability
  • Password Reuse in Disguise: An Often-Missed Risky Workaround

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Why We Can’t Let AI Take the Wheel of Cyber Defense
  • SoundCloud Data Breach Exposes 29.8 Million Personal users Details
  • Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
  • Chrome Security Update Patches Background Fetch API Vulnerability
  • Password Reuse in Disguise: An Often-Missed Risky Workaround

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark