福利加碼,Gate 廣場明星帶單交易員二期招募開啟!
入駐發帖 · 瓜分 $20,000 月度獎池 & 千萬級流量扶持!
如何參與:
1️⃣ 報名成為跟單交易員:https://www.gate.com/copytrading/lead-trader-registration/futures
2️⃣ 報名活動:https://www.gate.com/questionnaire/7355
3️⃣ 入駐 Gate 廣場,持續發布交易相關原創內容
豐厚獎勵等你拿:
首帖福利:首發優質內容即得 $30 跟單体验金
雙周內容激勵:每雙周瓜分 $500U 內容獎池
排行榜獎勵:Top 10 交易員額外瓜分 $20,000 登榜獎池
流量扶持:精選帖推流、首頁推薦、周度明星交易員曝光
活動時間:2026 年 2 月 12 日 18:00 – 2 月 24 日 24:00(UTC+8)
詳情:https://www.gate.com/announcements/article/49849
Ringleader of Massive $73M Crypto Fraud Receives 20-Year Sentence - Crypto Economy
TL;DR
Daren Li, a dual national of China and St. Kitts and Nevis, was sentenced in absentia to 20 years in US federal prison for his role in an international cryptocurrency investment conspiracy that stole more than $73 million from victims, many of them American investors. The maximum sentence signals authorities see “pig butchering” as organized financial crime with real-world victims, not a fringe online scheme. Prosecutors said Li is a fugitive after cutting off his electronic ankle monitor and fleeing in December 2025, and the court also imposed three years of supervised release.
How the scam worked and why the crackdown is widening
Prosecutors said Li and co-conspirators operated from scam centers in Cambodia and used spoofed domains and websites designed to resemble legitimate cryptocurrency trading platforms. They initiated contact through unsolicited social-media interactions and online dating services, then built professional or romantic relationships to gain trust before persuading targets to transfer funds. The scheme’s durability came from pairing relationship-driven persuasion with credible-looking “platform” infrastructure that normalized repeated deposits. Victims were directed into financial accounts controlled by the group, which prosecutors said were used to process the inflows.

The Justice Department described multiple variants of the operation. In some cases, victims were pitched direct “investment” opportunities through the spoofed platforms. In other iterations, scammers claimed to be from customer service or technology support companies and induced victims to send money to remediate a non-existent virus or other fabricated computer problem. The financial backbone was the laundering workflow, converting victim wires into virtual currency through shell-company accounts and controlled transfers. Li admitted the conspiracy caused at least $73.6 million in victim funds to be deposited into bank accounts associated with the defendants and co-conspirators, including at least $59.8 million routed through US shell companies that laundered proceeds.
The sentencing is the first in the case for a defendant directly tied to the ultimate receipt of victim funds, while eight co-conspirators have pleaded guilty and are awaiting sentencing. The enforcement message is expanding from stopping the scammers who make contact to dismantling the facilitators who move money and keep the machinery running. Investigators include the US Secret Service Global Investigative Operations Center, with support from Homeland Security Investigations task forces, Customs and Border Protection’s National Targeting Center, the US Marshals Service, and other partners involved in tracing funds, seizing assets, and disrupting infrastructure.