The post $150M asset freeze, $14.4B Bitcoin trail – Inside Chen Zhi’s crypto scandal appeared on BitcoinEthereumNews.com. Key Takeaways Why is Chen Zhi under investigation? U.S. prosecutors allege his company, Prince Holding Group, ran large-scale “pig butchering” crypto scams by luring workers to Cambodia and forcing them to target victims online. How were the funds moved? The proceeds were laundered through more than 100 shell companies and crypto mining operations, eventually converted to Bitcoin to obscure the trail. In a surprising turn of events, Singapore has moved to freeze more than $150 million (around $106 million) in assets linked to Chen Zhi, the Chinese-born chairman of Cambodia’s Prince Holding Group. The move comes as part of a widening international crackdown on what authorities describe as a large-scale transnational fraud network. Details of the enforcement operation The enforcement operation took place on the 30th of October and was officially reported by the Singaporean police the following day. Authorities targeted six properties, along with bank and securities accounts, cash reserves, a yacht, 11 vehicles, and high-end alcohol, all linked to Chen and his associates, who are currently outside Singapore. This action came shortly after U.S. and UK authorities jointly announced criminal indictments against Chen in mid-October. They also launched efforts to seize approximately $14.4 billion in Bitcoin [BTC] tied to the alleged scheme. Chen founded Prince Holding Group in 2015, promoting it as a global investment conglomerate with interests in real estate, finance, and hospitality. However, U.S. prosecutors allege that the group operated as a large-scale criminal network. According to their claims, workers were lured to Cambodia with fake job offers and then forced to run “pig butchering” crypto fraud schemes within heavily guarded compounds. Who all were involved? Court documents revealed that Chen’s network laundered the proceeds through more than 100 shell companies, crypto exchanges, and mining operations. The network then converted the funds into Bitcoin to obscure… The post $150M asset freeze, $14.4B Bitcoin trail – Inside Chen Zhi’s crypto scandal appeared on BitcoinEthereumNews.com. Key Takeaways Why is Chen Zhi under investigation? U.S. prosecutors allege his company, Prince Holding Group, ran large-scale “pig butchering” crypto scams by luring workers to Cambodia and forcing them to target victims online. How were the funds moved? The proceeds were laundered through more than 100 shell companies and crypto mining operations, eventually converted to Bitcoin to obscure the trail. In a surprising turn of events, Singapore has moved to freeze more than $150 million (around $106 million) in assets linked to Chen Zhi, the Chinese-born chairman of Cambodia’s Prince Holding Group. The move comes as part of a widening international crackdown on what authorities describe as a large-scale transnational fraud network. Details of the enforcement operation The enforcement operation took place on the 30th of October and was officially reported by the Singaporean police the following day. Authorities targeted six properties, along with bank and securities accounts, cash reserves, a yacht, 11 vehicles, and high-end alcohol, all linked to Chen and his associates, who are currently outside Singapore. This action came shortly after U.S. and UK authorities jointly announced criminal indictments against Chen in mid-October. They also launched efforts to seize approximately $14.4 billion in Bitcoin [BTC] tied to the alleged scheme. Chen founded Prince Holding Group in 2015, promoting it as a global investment conglomerate with interests in real estate, finance, and hospitality. However, U.S. prosecutors allege that the group operated as a large-scale criminal network. According to their claims, workers were lured to Cambodia with fake job offers and then forced to run “pig butchering” crypto fraud schemes within heavily guarded compounds. Who all were involved? Court documents revealed that Chen’s network laundered the proceeds through more than 100 shell companies, crypto exchanges, and mining operations. The network then converted the funds into Bitcoin to obscure…

$150M asset freeze, $14.4B Bitcoin trail – Inside Chen Zhi’s crypto scandal

2025/11/01 20:45

Key Takeaways

Why is Chen Zhi under investigation?

U.S. prosecutors allege his company, Prince Holding Group, ran large-scale “pig butchering” crypto scams by luring workers to Cambodia and forcing them to target victims online.

How were the funds moved?

The proceeds were laundered through more than 100 shell companies and crypto mining operations, eventually converted to Bitcoin to obscure the trail.


In a surprising turn of events, Singapore has moved to freeze more than $150 million (around $106 million) in assets linked to Chen Zhi, the Chinese-born chairman of Cambodia’s Prince Holding Group.

The move comes as part of a widening international crackdown on what authorities describe as a large-scale transnational fraud network.

Details of the enforcement operation

The enforcement operation took place on the 30th of October and was officially reported by the Singaporean police the following day.

Authorities targeted six properties, along with bank and securities accounts, cash reserves, a yacht, 11 vehicles, and high-end alcohol, all linked to Chen and his associates, who are currently outside Singapore.

This action came shortly after U.S. and UK authorities jointly announced criminal indictments against Chen in mid-October. They also launched efforts to seize approximately $14.4 billion in Bitcoin [BTC] tied to the alleged scheme.

Chen founded Prince Holding Group in 2015, promoting it as a global investment conglomerate with interests in real estate, finance, and hospitality.

However, U.S. prosecutors allege that the group operated as a large-scale criminal network. According to their claims, workers were lured to Cambodia with fake job offers and then forced to run “pig butchering” crypto fraud schemes within heavily guarded compounds.

Who all were involved?

Court documents revealed that Chen’s network laundered the proceeds through more than 100 shell companies, crypto exchanges, and mining operations.

The network then converted the funds into Bitcoin to obscure their origin.

From May 2021 to August 2022, the group has funneled at least $18 million from over 250 U.S. victims through shell entities in Brooklyn and Queens.

This amount represents only a small fraction of the larger financial flow tied to the scheme.

In October, the U.S. Treasury’s OFAC sanctioned 146 individuals and entities linked to the Prince Group.

Meanwhile, FinCEN reported that Cambodia’s Huione Group laundered more than $4 billion.

The U.K. also issued parallel sanctions against Chen and his affiliates.

Blockchain activity that drew major attention

Meanwhile, blockchain activity linked to the case grabbed close attention.

Just one day after U.S. indictments against Chen were unsealed, a wallet linked to the Chinese mining pool LuBian, previously associated with Chen, moved 11,886 BTC (approximately $1.3 billion). This was the wallet’s first activity in three years.

A week later, another 15,959 BTC (around $1.83 billion) was transferred across four separate addresses. These movements raised concerns about potential asset repositioning ahead of enforcement actions.

LuBian had gained prominence in 2020 but suffered a major breach that drained over 90% of its holdings, an estimated 127,426 BTC, now valued at roughly $14.5 billion.

The mining pool disappeared in early 2021, and its funds remained largely dormant until they resurfaced in mid-2024.

What’s ahead?

Prosecutors now allege that Chen used mining operations like LuBian and Warp Data in Laos to generate “clean” Bitcoin.

They say the network deliberately separated this Bitcoin from the original criminal proceeds to obscure its source.

If the United States Department of Justice wins the forfeiture case, the seized Bitcoin will become one of the largest additions to U.S. federal holdings.

This coincided with T3’s first-year results, highlighting both the growing sophistication of crypto-related crime and the widening role of private companies in combating it.

Therefore, as digital crime expands, the balance between security and the core ethos of crypto is becoming more difficult to maintain.

Next: Assessing Bittensor’s 23% jump as Europe launches first TAO ETP

Source: https://ambcrypto.com/150m-asset-freeze-14-4b-bitcoin-trail-inside-chen-zhis-crypto-scandal/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

Preliminary analysis of the Balancer V2 attack, which resulted in a loss of $120 million.

Preliminary analysis of the Balancer V2 attack, which resulted in a loss of $120 million.

On November 3, the Balancer V2 protocol and its fork projects were attacked on multiple chains, resulting in a serious loss of more than $120 million. BlockSec issued an early warning at the first opportunity [1] and gave a preliminary analysis conclusion [2]. This was a highly complex attack. Our preliminary analysis showed that the root cause was that the attacker manipulated the invariant, thereby distorting the calculation of the price of BPT (Balancer Pool Token) -- that is, the LP token of Balancer Pool -- so that it could profit in a stable pool through a batchSwap operation. Background Information 1. Scaling and Rounding To standardize the decimal places of different tokens, the Balancer contract will: upscale: Upscales the balance and amount to a uniform internal precision before performing the calculation; downscale: Reduces the result to its original precision and performs directional rounding (e.g., inputs are usually rounded up to ensure the pool is not under-filled; output paths are often truncated downwards). Conclusion: Within the same transaction, the asymmetrical rounding direction used in different stages can lead to a systematic slight deviation when executed repeatedly in very small steps. 2. Prices of D and BPT The Balancer V2 protocol’s Composable Stable Pool[3] and the fork protocol were affected by this attack. Stable Pool is used for assets that are expected to maintain a close 1:1 exchange ratio (or be exchanged at a known exchange rate), allowing large exchanges without causing significant price shocks, thereby greatly improving the efficiency of capital utilization between similar or related assets. The pool uses the Stable Math (a Curve-based StableSwap model), where the invariant D represents the pool's "virtual total value". The approximate price of BPT (Pool's LP Token) is: The formula above shows that if D is made smaller on paper (even if no funds are actually withdrawn), the price of BPT will be cheaper. BTP represents the pool share and is used to calculate how many pool reserves can be obtained when withdrawing liquidity. Therefore, if an attacker can obtain more BPT, they can profit when withdrawing liquidity. Attack Analysis Taking an attack transaction on Arbitrum as an example, the batchSwap operation can be divided into three stages: Phase 1: The attacker redeems BPT for the underlying asset to precisely adjust the balance of one of the tokens (cbETH) to a critical point (amount = 9) for rounding. This step sets the stage for the precision loss in the next phase. Phase Two: The attacker uses a carefully crafted quantity (= 8) to swap between another underlying asset (wstETH) and cbETH. Due to rounding down when scaling the token quantity, the calculated Δx is slightly smaller (from 8.918 to 8), causing Δy to be underestimated and the invariant D (derived from Curve's StableSwap model) to be smaller. Since BPT price = D / totalSupply, the BPT price is artificially suppressed. Phase 3: The attackers reverse-swap the underlying assets back to BPT, restoring the balance within the pool while profiting from the depressed price of BPT—acquiring more BPT tokens. Finally, the attacker used another profitable transaction to withdraw liquidity, thereby using the extra BPT to acquire other underlying assets (cbETH and wstETH) in the Pool and thus profit. Attacking the transaction: https://app.blocksec.com/explorer/tx/arbitrum/0x7da32ebc615d0f29a24cacf9d18254bea3a2c730084c690ee40238b1d8b55773 Profitable trades: https://app.blocksec.com/explorer/tx/arbitrum/0x4e5be713d986bcf4afb2ba7362525622acf9c95310bd77cd5911e7ef12d871a9 Reference: [1]https://x.com/Phalcon_xyz/status/1985262010347696312 [2]https://x.com/Phalcon_xyz/status/1985302779263643915 [3]https://docs-v2.balancer.fi/concepts/pools/composable-stable.html
Share
PANews2025/11/04 14:00