The Situation
In early 2020, an online investment platform branded as Algos Crypto Mining (algoscryptomining.com) began operating across Telegram and LinkedIn.
The perpetrators presented themselves as representatives of a U.S.-based crypto hedge fund and mining enterprise, luring investors with guaranteed monthly returns of 15%-40%.
Their scheme relied heavily on social engineering and misdirection:
- They showcased an active Bitcoin wallet address (1NDy...oba1s) which ultimately belonged to billion-dollar hedge fund.
- This tactic gave victims a false sense of security, convincing them their deposits were part of high-value crypto operations.
- In reality, all funds were diverted to unrelated wallets controlled by the scammers.
By September 2021, the syndicate had defrauded over 100 investors worldwide—mainly business professionals and crypto newcomers—stealing approximately $4 million USD in Bitcoin (BTC), Tether (USDT), and Ethereum (ETH).
The Challenge: A Multi-Layered Global Crypto Laundering Scheme
Unlike typical investment scams, Algos Crypto Mining used real blockchain activity to fabricate legitimacy.
The scammers operated through a network of crypto addresses and exchange accounts spread across several jurisdictions, including:
- Binance, KuCoin, and Coinbase for fund transfers and liquidation.
- Privacy-oriented wallets and tumbling services to obscure transactional trail.
- Telegram communities that simulated ongoing "trading results," complete with fake screenshots of profitable ROI dashboards.
Victims' testimonies revealed that the group was highly organized, using corporate-like structures:
- Dedicated "relationship managers" for investors.
- Automated Telegram bots sending daily mining "profits."
- A professional-looking website hosted on international servers with fast-expiring domains to prevent legal migrations to evade takedowns.
The scheme also evolved over time—transitioning from small-scale investments to high-ticket fraud, with single victims losing between $50,000 and $96,000 USD.
Our Investigative Approach
Probe Division deployed a four-phase forensic framework, leveraging both technical intelligence and inter-agency cooperation:
1. Blockchain & Digital Forensics
Our analysts conducted a full transaction-path analysis of more than 6,000 blockchain records, mapping out interlinked wallets across Bitcoin, Ethereum, and Tether networks. By combining on-chain data with exchange KYC leakpoints, we reconstructed the syndicate's fund-movement architecture and identified several primary receiving addresses.
Advanced clustering algorithms and heuristic tracing tools allowed us to uncover:
- Recurrent consolidation wallets.
- Transfer patterns consistent with mixer/tumbler evasion techniques.
- Binance and KuCoin wallet fingerprints belonging to known Nigerian users.
2. Exchange Intelligence and Legal Coordination
Our compliance liaisons submitted formal Exchange Information Requests (EIRs) under international AML protocols.
Within days, we obtained verified KYC profiles, IP metadata, and transactional signatures connecting the scam's key wallets to real-world individuals.
This evidence established a direct link between the scam's operational wallets and one Binance account holding approximately $208,000 USD, registered under Ahmed Olukole, a Nigerian national.
3. Law Enforcement Collaboration
Probe Division coordinated with:
- The Nigerian EFCC (Economic and Financial Crimes Commission) for local apprehension.
- The U.S. Secret Service and FBI Crypto Crime Task Force for extradition and prosecution.
Olukole's arrest led to the exposure of seven additional members, all part of an organized network operating under shell business names.
Collectively, they were charged with wire fraud, investment fraud, and cross-border money laundering.
4. Asset Recovery and Victim Restitution
Using a combination of legal freezes, wallet blacklisting, and cross-exchange asset locks, Probe Division successfully recovered and returned $1.8 million USD to verified victims.
Remaining assets continue to be monitored across secondary exchanges and DeFi liquidity pools for potential future recovery.
"Probe Division's forensic accuracy and speed of coordination were beyond expectation. Within weeks, they had traced every transaction and exposed an entire criminal network."