How a Russian National Allegedly Used Tether to Launder $530M in Crypto

How a Russian National Allegedly Used Tether to Launder $530M in Crypto


Thank you for reading this post, don't forget to subscribe!

Key takeaways

Iurii Gugnin allegedly used his crypto firm to move $530 million through US banks and crypto exchanges using Tether (USDT), facilitating payments for Russian clients tied to sanctioned banks.

Gugnin allegedly failed to implement AML regulations and didn’t file suspicious activity reports (SARs), violating the Bank Secrecy Act and misleading financial institutions.

Gugnin also reportedly accessed websites that provided information on indicators of criminal investigation and methods for detecting law enforcement surveillance.

Gugnin faces 22 criminal counts, including wire fraud, bank fraud and money laundering, with potential penalties of up to 30 years per charge. 

The US Department of Justice (DOJ) has charged Iurii Gugnin, also known as George Goognin and Iurii Mashukov, a Russian national residing in New York, with 22 criminal counts in a sweeping case that underscores the growing challenges of regulating cryptocurrency markets. Gugnin is accused of laundering more than $530 million through his cryptocurrency companies, Evita Investments and Evita Pay, while facilitating transactions for sanctioned Russian entities.

According to the DOJ, Gugnin created a financial pipeline using the stablecoin Tether USDt (USDT) to support sanctioned Russian entities and bypass US sanctions and export controls. His actions allegedly involved deceiving banks, falsifying compliance documents and facilitating access to sensitive US technologies, highlighting the misuse of digital assets for illicit finance. 

This article explores the details of Gugnin’s alleged scheme, its implications for cryptocurrency regulation, and the broader national security concerns as the US intensifies its crackdown on crypto-enabled sanctions evasion.

Who is Iurii Gugnin

Iurii Gugnin is a 38-year-old Russian citizen living in New York. He set up Evita Investments Inc. and Evita Pay Inc., two cryptocurrency firms, now linked to a $530 million money laundering operation. 

Gugnin presented Evita as a legitimate cryptocurrency payment service but allegedly used it to secretly transfer illegal funds for Russian clients. By posing as a compliant financial technology company, Evita moved money through US banks and crypto exchanges while hiding the funds’ real sources. 

As president, treasurer and compliance officer, Gugnin had complete control over these companies’ operations, finances and regulatory reporting, enabling him to manage transactions, misrepresent the companies’ activities and ignore Anti-Money Laundering (AML) rules. Authorities claim Evita’s systems were used to help sanctioned Russian entities obtain US technology and channel funds through stablecoins like USDT.

How Gugnin Allegedly Laundered $530 Million Using USDT and US Banks

Gugnin, through his cryptocurrency companies, was allegedly involved in money laundering activities between June 2023 and January 2025, using various deceptive tactics. Gugnin is accused of moving $530 million through the US financial system while concealing the illicit origins of the funds.

Here are some aspects of Gugnin’s money-laundering activities:

Scale of money laundering: Gugnin laundered about $530 million through US banks and cryptocurrency exchanges, primarily using USDT, a stablecoin tied to the US dollar and known for its fast, low-volatility cross-border transactions.

Involvement of sanctioned Russian banks: The operation involved receiving cryptocurrency from foreign clients, many connected to sanctioned Russian banks, including Sberbank, VTB, Sovcombank and Tinkoff. These digital funds were channeled through cryptocurrency wallets controlled by Evita and then converted into US dollars or other traditional currencies via US bank accounts. This helped Gugnin to obscure their origins and assist Russian clients in evading international sanctions.

Concealment tactics: Gugnin used deceptive methods to hide the illegal nature of these cross-border transactions. He altered invoices digitally to remove the names and addresses of Russian clients and provided false compliance documents to banks and cryptocurrency exchanges. These documents wrongly claimed that Evita had no ties to sanctioned entities and had complied with AML and Know Your Customer (KYC) regulations.

Noncompliance with financial regulations: Despite claiming compliance, Evita allegedly operated without an actual AML compliance and failed to file Suspicious Activity Reports (SARs) as required by US regulations. This allowed Gugnin to mask the source and purpose of the funds, enabling high-risk transactions that may have supported Russia’s access to restricted US technology.

Gugnin charged with 22-count indictment in the Eastern District of New York (EDNY) court

How Gugnin Enabled Russian Access to US Tech

Gugnin, through his cryptocurrency companies, allegedly created a financial network to support Russian entities banned by US sanctions. Prosecutors allege he handled more than $500 million in transactions for Russian clients connected to sanctioned banks, including PJSC Sberbank, PJSC Sovcombank, PJSC VTB Bank and JSC Tinkoff Bank. 

While living in the US, Gugnin held personal accounts with sanctioned banks JSC Alfa-Bank and PJSC Sberbank. He also enabled payments to acquire US export-controlled technology, such as sensitive servers, and laundered money to obtain components for Rosatom, Russia’s state nuclear agency. 

Actions of Gugnin and Evita provided Russian clients access to restricted components. Gugnin hid his activities by altering invoices to conceal Russian ties and falsifying compliance documents.

Did you know? The 2021 Infrastructure Investment and Jobs Act expanded the definition of “broker” to include crypto exchanges, requiring them to report user transactions to the Internal Revenue Service (IRS) starting in 2025. 

Evasion of US sanctions and export controls by Gugnin and Evita

Gugnin and his companies are accused of deliberately violating US sanctions and export controls and the International Emergency Economic Powers Act (IEEPA). He allegedly deceived US banks and cryptocurrency exchanges by falsely stating that Evita had no connections with sanctioned Russian entities, while actively processing transactions for clients linked to blacklisted banks. 

To hide his activities, Gugnin secured a Florida money transmitter license by providing false details about Evita’s operations. This allowed him to use crypto exchange services under the pretense of compliance. Gugnin transferred over $500 million, often in USDT, into the US financial system through this scheme.

Gugnin’s actions violated federal laws and threatened national security by enabling sanctioned entities to evade restrictions and illegally obtain sensitive US technologies.

Failure to comply with AML regulations

The US DOJ alleges that Gugnin and his crypto companies failed to follow key AML rules required by the Bank Secrecy Act. Although Gugnin presented Evita as a legitimate money services business, he allegedly did not establish an effective AML program and failed to submit suspicious activity reports (SARs) to the Financial Crimes Enforcement Network (FinCEN), which are crucial for detecting and preventing illegal financial activities. 

Moreover, Gugnin misled banks and cryptocurrency exchanges by falsely claiming that Evita complied with strict AML and KYC standards, when these measures were either inadequate or missing. This deception allowed over $500 million to flow through the US financial system without proper regulatory oversight. 

Did you know? Under the Bank Secrecy Act, US crypto exchanges must report suspicious activity over $10,000, just like banks. Failing to comply can lead to hefty penalties.

Gugnin’s awareness of illegality

Federal investigators found strong evidence that Gugnin knew his actions were illegal. They found that Gugnin had allegedly searched terms like “how to know if there is an investigation against you,” “money laundering penalties US,” and “am I being investigated?” This showed he was aware of potential legal risks. Gugnin had also searched for “Evita Investments Inc. criminal records” and “Iurii Gugnin criminal records,” indicating he was worried about the consequences of his actions. 

Gugnin had also visited websites explaining signs of being under criminal investigation and ways to detect law enforcement attention. These online activities suggest he was conscious of his guilt and actively tried to avoid detection. This digital evidence supports the prosecution’s claim that Gugnin intentionally broke US laws while attempting to conceal his money laundering activities from authorities.

Did you know? In 2023, the US Treasury’s Office of Foreign Assets Control (OFAC) fined crypto exchange Kraken over $360,000 for violating sanctions by allowing users in Iran to transact on its platform.

Legal consequences of Gugnin’s fraudulent acts

Gugnin faces a 22-count federal indictment for offenses related to laundering $530 million through his cryptocurrency companies. He has been charged with wire fraud, bank fraud, money laundering, conspiracy to defraud the US, violations of the IEEPA and running an unlicensed money transmitting business. 

Additional charges stem from Gugnin’s failure to establish an effective AML program and not filing suspicious activity reports (SARs). If found guilty, Gugnin could face up to 30 years in prison for each bank fraud charge and up to 20 years for wire fraud and sanctions violations. 

Gugnin was arrested and arraigned in New York, and he is currently detained while awaiting trial, as authorities consider him a flight risk.

Broader implications of Gugnin case on crypto regulations and sanctions enforcement

The case against Gugnin reveals increasing concerns about cryptocurrencies, especially stablecoins like Tether, being used to evade cryptocurrency regulations and US sanctions. As part of a broader effort to combat illegal crypto activities, the indictment shows how sanctioned entities, particularly those connected to Russia, use digital currencies to bypass restrictions and access global financial systems. 

Although stablecoins provide transparent transaction records, their speed and worldwide reach make them appealing for money laundering. The Gugnin case may lead to stricter regulations for crypto exchanges, payment processors and money transmitters, with more vigorous enforcement of AML and sanctions compliance rules. 

Gugnin’s case also highlights the national security risks, as his actions enabled Russian clients to obtain restricted US technology. It may result in regulators imposing more stringent reporting measures on crypto firms to prevent foreign adversaries from exploiting digital finance to harm US interests.

This article does not contain investment advice or recommendations. Every investment and trading move involves risk, and readers should conduct their own research when making a decision.



Source link