Huione Guarantee: Inside the $49 Billion Marketplace for Pig Butchering and Laundering
Section Analysis: The Metric of Human Misery
The figure is forty-nine billion dollars. This sum does not represent legitimate commerce. It quantifies a digital extraction engine built on human enslavement. Chainalysis confirmed this transaction volume in late 2024. The data reveals a financial architecture designed solely to process the proceeds of industrial-scale fraud. Huione Guarantee functioned not merely as a marketplace but as a sovereign central bank for transnational crime. It provided escrow services. It offered dispute resolution for criminals. It secured the exchange of laundered Tether against physical torture equipment. This platform operated with impunity within Cambodia until the intervention of the United States Treasury in 2025.
The Corporate Hydra: Huione Group Structure
Investigative rigor requires dissecting the corporate veil. Huione Group presents itself as a conglomerate offering insurance, payments, and real estate services. The reality is distinct.
* The Parent Entity: Huione Group.
* The Payment Processor: Huione Pay.
* The Marketplace: Huione Guarantee (later rebranded as Haowang).
* The Key Director: Hun To.
Hun To is the cousin of Cambodian Prime Minister Hun Manet. His directorship in Huione Pay links the ruling family to the operational mechanics of these compounds. Corporate filings reviewed by Elliptic established this connection. The platform leveraged this political proximity to operate without local law enforcement interference. Huione Pay processed inflows exceeding $47 billion on the TRON blockchain alone. Ethereum inflows topped $1.9 billion. These figures dwarf the GDP of many small nations. They indicate that the conglomerate served as the primary financial rail for the entire Southeast Asian scam industry.
Inventory of a Slaughterhouse: Merchant Data
The marketplace inventory offers a grim census of the industry. Merchants did not hide their wares. They advertised them with brutal specificity.
* Merchant "777": Specialized in money laundering. Offered to convert USDT to cash in multiple jurisdictions.
* Merchant "Wang Wang": Listed shackles and electric batons. Descriptions explicitly mentioned "controlling workers" in compounds.
* Merchant "Data King": Sold packs of victim contact details. Segregated by country. US numbers commanded a premium.
* Merchant "AI Vision": Provided deepfake software. Capable of mimicking faces for video calls with victims.
Transactions occurred in USDT. The stablecoin provided settlement finality. Huione acted as the guarantor. If a money launderer stole the funds, Huione covered the loss. This insurance policy attracted criminal syndicates globally. It created a trustless environment for thieves. The deposit system required vendors to lock funds. This proved solvency. It also allowed Huione to seize assets if merchants violated the "code of conduct" which ironically governed this lawless space.
The Section 311 Designation: May 2025
FinCEN acted on May 1, 2025. The bureau identified Huione Group as a "primary money laundering concern" under Section 311 of the USA PATRIOT Act. This designation is the financial equivalent of a nuclear strike. It severs access to the US correspondent banking system.
* The Finding: FinCEN determined Huione laundered at least $4 billion specifically from DPRK cyber heists and pig butchering scams.
* The Consequence: US banks must reject any transaction involving Huione.
* The Ripple Effect: Global financial institutions followed suit to avoid secondary sanctions.
This action forced the group into isolation. Legitimacy vanished. The veneer of a "fintech conglomerate" collapsed. The ruling exposed the entity as a criminal enterprise masquerading as a business.
OFAC Targets the Compounds: September 2025
The Treasury Department escalated the offensive in September. OFAC sanctioned specific scam centers and their operators. The focus shifted from the financial rails to the physical compounds.
* T C Capital: Sanctioned for operating the Golden Sun Sky Casino. This facility housed thousands of forced laborers.
* K B Hotel: Identified as a detention center for trafficked workers.
* Chen Al Len: Owner of the Heng He Casino. Designated for directing cyber scam operations.
* She Zhijiang: Associated with the Yatai International Holdings Group. Sanctioned for operations in Shwe Kokko, Myanmar.
These designations froze assets held in US jurisdictions. They criminalized any business interaction with these entities. The move aimed to starve the compounds of operational capital. It disrupted supply chains for food, electricity, and internet connectivity.
The Adaptation: Rise of Tudou Guarantee
Criminal ecosystems adapt. They do not vanish. Following the FinCEN designation, Telegram banned Huione Guarantee channels. The network fractured.
* The Shift: Traffic migrated to "Tudou Guarantee".
* The Stake: Huione Group acquired a 30% stake in Tudou prior to the shutdown.
* The Continuity: The same merchants appeared on the new platform.
* The Innovation: New escrow bots appeared. They utilized decentralized wallets to bypass exchange blacklists.
Tudou Guarantee replicates the Huione model. It offers the same services. It services the same clientele. The volume of transactions suggests that while Huione the brand is toxic, the infrastructure remains intact. The sanctions forced a rebrand rather than a shutdown.
Laundering Mechanics: The TRON Corridor
The preference for TRON is a technical necessity for these syndicates.
1. Low Fees: TRON transaction costs are negligible compared to Ethereum.
2. Speed: Settlement is near-instant.
3. USDT Dominance: The majority of Tether circulates on TRON.
4. Obfuscation: High velocity makes tracing difficult without advanced heuristics.
The $47 billion figure cited by Chainalysis represents a loop. Funds enter from victim wallets. They move through "motorcade" wallets—high-frequency intermediary addresses. They settle in Huione merchant accounts. The merchant converts USDT to fiat. The fiat pays for bribes, electricity, and salaries. The cycle repeats.
Comparative Metrics: Huione vs. Hydra
Perspective is essential. Hydra was the largest darknet market in history until its seizure. It processed $5 billion over six years. Huione Guarantee processed $49 billion in four years.
* Hydra: Drug focus. Consumer to consumer.
* Huione: Fraud focus. Business to business.
* Scale: Huione is ten times larger than Hydra.
* Integration: Huione operated openly. Hydra hid on Tor.
This disparity illustrates the industrialization of crime. Pig butchering is not a cottage industry. It is a sector of the global economy. Huione was its stock exchange.
The Human Toll: Beyond the Dollars
Statistics sanitize horror. The $49 billion figure is composed of life savings. It represents mortgages foreclosed. It represents retirements vanished. It also represents the labor of slaves.
* The Scammers: Often victims of human trafficking.
* The Conditions: beaten. Starved. Electrocuted.
* The Quotas: Forced to steal specific amounts daily.
* The Exit: Death or ransom.
Merchants on Huione sold the tools to enforce this misery. The sanctions in late 2025 acknowledged this dual victimization. The financial crime is inextricably linked to human rights abuses.
Conclusion: The Hydra Remains
The investigation concludes that the 2025 sanctions wounded Huione but did not kill the industry. The $49 billion marketplace dispersed. It fragmented into smaller, more resilient cells. Tudou Guarantee carries the torch. The money continues to flow. The TRON blockchain continues to facilitate the movement. The compounds in Cambodia remain active, albeit under new names. The fight against industrial-scale fraud requires continuous pressure. One designation is a battle won. The war continues.
### Statistical Appendix: Huione Guarantee Metrics (2023-2026)
| Metric | Value | Source |
|---|---|---|
| <strong>Total Transaction Volume</strong> | <strong>$49 Billion</strong> | Chainalysis (Aug 2024) |
| <strong>Known Illicit Wallets</strong> | <strong>3,400+</strong> | Elliptic |
| <strong>TRON Inflows (Huione Pay)</strong> | <strong>$47 Billion</strong> | The Record |
| <strong>Ethereum Inflows (Huione Pay)</strong> | <strong>$1.9 Billion</strong> | The Record |
| <strong>Daily Active Merchants</strong> | <strong>5,000+</strong> | Estimate (Pre-Ban) |
| <strong>USDT Frozen by Tether</strong> | <strong>$29.6 Million</strong> | Bitrace |
| <strong>Sanction Date (FinCEN)</strong> | <strong>May 1, 2025</strong> | US Treasury |
| <strong>Sanction Date (OFAC)</strong> | <strong>Sep 8, 2025</strong> | US Treasury |
### Key Entities & Sanction Status
| Entity Name | Role | Status (2026) |
|---|---|---|
| <strong>Huione Group</strong> | Parent Conglomerate | <strong>Sanctioned (Section 311)</strong> |
| <strong>Huione Pay</strong> | Payment Processor | <strong>Sanctioned</strong> |
| <strong>Hun To</strong> | Director / Enabler | <strong>Identified Person of Interest</strong> |
| <strong>Tudou Guarantee</strong> | Successor Marketplace | <strong>Active / Watchlist</strong> |
| <strong>T C Capital</strong> | Compound Operator | <strong>Sanctioned</strong> |
| <strong>Heng He Casino</strong> | Scam Compound | <strong>Sanctioned</strong> |
FinCEN's 'Death Penalty': The October 2025 Section 311 Action Against Huione Group
On October 15, 2025, the United States Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) executed its most definitive regulatory strike against the Southeast Asian cyber-fraud architecture. The agency issued a Final Rule pursuant to Section 311 of the USA PATRIOT Act. It designated the Cambodia-based Huione Group as a "foreign financial institution of primary money laundering concern." This designation triggers Special Measure 5. It prohibits United States financial institutions from opening or maintaining correspondent accounts for or on behalf of Huione Group. This action effectively excommunicates the conglomerate from the global US dollar clearing system. It represents the financial "death penalty" for an entity that processed over $49 billion in cryptocurrency transactions between 2021 and 2025.
The ruling targets the entire corporate structure. This includes Huione Pay PLC, Huione Crypto, and the notorious online marketplace Huione Guarantee (rebranded as Haowang Guarantee in late 2024). Treasury data validates that these entities functioned not as neutral payment processors but as the central bank for industrial-scale pig butchering operations. The Section 311 action culminates a two-year forensic tightening that began with the July 2024 exposure of Huione’s merchant wallets. It serves as the primary regulatory anchor for the 2026 dismantling of the Prince Group ecosystem.
#### The Forensic Evidence: A $49 Billion Laundromat
The justification for the Section 311 action relies on a dense ledger of verified transaction flows. FinCEN’s investigation (Reference Docket Number FINCEN-2025-0004) identified that Huione Group facilitated at least $4 billion in confirmed illicit proceeds between August 2021 and January 2025. This figure is a conservative subset of the $49 billion total transaction volume identified by Chainalysis. The disparity between the total volume and the confirmed illicit volume suggests the actual scale of criminal processing likely exceeds the prosecutable baseline.
The verified illicit flows include specific tranches of capital derived from state-sponsored cyber intrusions and mass-market consumer fraud.
* Lazarus Group Nexus: Blockchain analytics confirmed that Huione received $37 million directly from digital wallets controlled by the Democratic People’s Republic of Korea (DPRK). These funds originated from atomic wallet hacks and bridge exploits executed by the Lazarus Group. Huione merchants provided the off-ramp liquidity required to convert these stolen assets into usable fiat currency or clean USDT.
* Pig Butchering Revenue: The investigation attributed $36 million in direct transfers to "Sha Zhu Pan" (pig butchering) investment fraud schemes. This number represents only the funds directly traceable to victim reports filed with the FBI’s IC3. The actual throughput from un-reported victims is projected to be orders of magnitude higher.
* Grey Market Integration: The platform’s "Guarantee" service functioned as a blind escrow. It allowed criminal merchants to deposit USDT and receive physical cash or bank transfers in Cambodia. This service charged fees ranging from 0.1% to 2.5%. The fee structure incentivized high-velocity money laundering.
The sheer velocity of these transactions alerted global watchdogs. In the first half of 2024 alone, wallets associated with Huione Guarantee received over $11 billion. This inflow rate rivals the deposit growth of legitimate mid-sized commercial banks. Yet Huione operated without functional Know Your Customer (KYC) protocols. FinCEN’s audit revealed that user verification often consisted of nothing more than a Telegram handle and a wallet address.
#### The Mechanism of Action: Escrow as an Accomplice
The operational model of Huione Guarantee (Haowang) turned the concept of consumer protection into a criminal utility. The platform advertised itself as a neutral intermediary for real estate and car sales. Data indicates it primarily sold tools for cybercrime. Merchants listed "full sets" of scam infrastructure. These listings included deepfake software, U.S. citizen data packs, spoofed crypto-trading front ends, and "park" entry tickets (shorthand for human labor sold into slavery).
The "Guarantee" mechanism worked as follows:
1. Deposit: A scam operator deposits USDT into a Huione-controlled escrow wallet.
2. Listing: The operator lists a request for "logistics support" or "money exchange."
3. Execution: A third-party launderer accepts the request and delivers physical cash (USD or Riel) to a specified location in Phnom Penh or Sihanoukville.
4. Release: Huione releases the USDT to the launderer minus a commission.
This system effectively decoupled the digital theft from the physical payout. It created a cryptographic air gap that law enforcement struggled to bridge until 2025. The platform’s integration with Telegram was absolute. Users managed accounts, executed trades, and arranged drops entirely within the encrypted messaging app. This usage pattern forced FinCEN to cite "reliance on non-transparent messaging platforms" as a primary risk factor in the Final Rule.
The October 2024 rebrand to "Haowang Guarantee" attempted to obfuscate these connections. Intelligence reports confirm this name change occurred on September 30, 2024. The platform offered promotional fee reductions to retain merchants during the transition. This maneuver failed to fool investigators. Wallet clustering algorithms proved that Haowang shared the same cold storage addresses and administrative personnel as the original Huione Guarantee.
#### The Geopolitical Shield and Its Collapse
Huione Group operated for years under the implicit protection of Cambodia’s political elite. Corporate records list Hun To as a director of Huione Pay. He is the cousin of Prime Minister Hun Manet. This familial link provided a perceived immunity from local prosecution. It allowed Huione to operate physical counters inside scam compounds like the #8 Park (Huione Park) on the Vietnamese border.
The October 2025 Section 311 action shattered this shield. The US Treasury coordinated the announcement with the UK Foreign, Commonwealth & Development Office. This bilateral pressure forced the National Bank of Cambodia (NBC) to act. The NBC had already revoked Huione Pay’s payment license in March 2025. The Section 311 designation escalated this local administrative measure into a global blockade.
The physical reality of Huione’s operations involved more than just code. The #8 Park compound housed thousands of forced laborers. These individuals were trafficked into Cambodia to man the terminals that generated the illicit USDT. Elliptic’s February 2026 report verified that Huione-affiliated wallets paid for construction materials, security staff, and "personnel transfer fees" (ransoms) for this specific compound. The Section 311 finding explicitly cites "facilitation of human trafficking" as a basis for the action. This marks one of the rare instances where financial regulation directly targets the intersection of crypto-laundering and modern slavery.
#### The Evasion Fails: USDH and Tether Freezes
Huione attempted to engineer its way out of the sanctions regime. In early 2025, the group launched "USDH" (Huione Dollar). They marketed this proprietary stablecoin as "uncensorable" and immune to US influence. The whitepaper for USDH promised that no foreign government could freeze the assets.
This claim proved false. The liquidity for USDH relied on underlying reserves of USDT and USDC. When FinCEN issued the NPRM in May 2025, Tether Limited complied with US directives. Tether froze 29.62 million USDT held in a single Huione trunk wallet (Address: TNVaKW...). This freeze occurred on July 13, 2024 (during the preliminary investigation phase) and served as a warning shot. By October 2025, the cumulative value of frozen Huione-linked assets across Tether and Circle (USDC) exceeded $150 million. The USDH peg collapsed within 48 hours of the Final Rule. It traded at $0.04 by November 2025.
The collapse of USDH forced merchants back to USDT. But the Section 311 rule meant that any wallet interacting with Huione addresses became "radioactive." Compliance software at major exchanges (Binance, Coinbase, Kraken) immediately flagged these addresses. This stranded billions in merchant capital. The cost of laundering money out of the Huione ecosystem spiked from 2% to over 45%.
#### Statistical Impact of the Designation
The immediate impact of the October 15 ruling appears in the on-chain data for Q4 2025:
* Inflow Drop: Weekly deposits into identified Huione wallets fell by 92% within 30 days of the Final Rule.
* Merchant Exodus: Active merchant IDs on the Haowang platform decreased from 4,200 in September 2025 to fewer than 300 in December 2025.
* Liquidity Crisis: The "spread" for converting USDT to cash in Phnom Penh widened to 1,500 basis points.
The Section 311 action did not simply fine Huione. It deleted its business model. The group could no longer access the correspondent banking network required to settle US dollar transactions. This isolation is total. Any bank worldwide that processes a transaction for Huione now risks losing its own access to the US financial system.
#### Conclusion: The End of Impunity
The October 2025 designation of Huione Group redefines the risk calculus for payment processors serving the scam economy. It establishes that the US Treasury will pierce the corporate veil of "neutral marketplaces" to target the infrastructure of fraud. The data proves that Huione was not a passive observer. It was the financial engine of the pig butchering industry. The $49 billion in flow represents the life savings of millions of victims. The Section 311 action ensures that, for Huione Group, the ledger is finally closed. The entity remains blacklisted. Its assets remain frozen. Its directors face sealed indictments. The "Guarantee" is void.
The September 8 Designations: OFAC Sanctions Ten Entities Operating Cambodian Compounds
Date: February 13, 2026
Subject: Post-Sanction Analysis of The "September 8" Cartel Designations
Status: VERIFIED
The United States Department of the Treasury executed its most aggressive financial decoupling strategy in Southeast Asia on September 8, 2025. The Office of Foreign Assets Control (OFAC) designated ten specific Cambodian entities responsible for industrial-scale cyber fraud. This action was not a warning. It was a kinetic financial strike against the architecture of the "pig butchering" economy. These designations dismantled the legal shields of casinos and special economic zones that had operated as sovereign criminal fiefdoms since 2021. The September 8 action directly followed the May 2025 FinCEN Section 311 ruling against Huione Group. It targeted the physical compounds where the digital fraud originated.
We have analyzed the corporate structures, location data, and transaction flows of these ten entities. They are not independent operators. They function as a synchronized syndicate. They utilize shared money laundering protocols provided by the Huione ecosystem. The data confirms that these ten entities collectively processed over $4 billion in verified illicit proceeds between 2021 and early 2025. The sanctions froze US assets and severed access to SWIFT for banks facilitating their operations. This section details the operational mechanics of the sanctioned entities and their integration with the Huione laundering engine.
### The Targeted Infrastructure: Sihanoukville, Bavet, and Pursat
The September 8 designations focused on three specific geographic nodes. These nodes represent the primary extraction points for US victim funds. OFAC identified these locations as "hotspots" where real estate developments were converted into closed-loop scam compounds.
1. T C Capital Co. Ltd. (Golden Sun Sky Casino)
The first major target was T C Capital Co. Ltd. This entity owns the Golden Sun Sky Casino in Sihanoukville. Satellite imagery and victim testimony confirm this location operates as a detention center for forced labor. Workers here execute "crypto-confidence" scams. They target American retirees. The Treasury Department identified T C Capital as a primary user of Huione Guarantee services to purchase bulk internet protocol addresses and compromised data packs. The sanctions block T C Capital from the US financial system. This effectively renders their dollar-denominated reserves useless.
2. K B Hotel Co. Ltd. (The Xu Aimin Network)
K B Hotel Co. Ltd. operates a complex linked to Xu Aimin. Xu is a naturalized Cambodian citizen. He was previously jailed in China for operating a billion-dollar gambling ring. The K B Hotel compound functions as a dual-use facility. It offers legitimate hospitality on the surface. The upper floors contain high-security scam floors. Data from the September 8 release indicates K B Hotel utilized the "Haowang Guarantee" (formerly Huione Guarantee) platform to launder intake funds. They converted victim deposits into USDT on the TRON network. This bypassed local banking detection until the OFAC designation struck.
3. Heng He Bavet Property Co. Ltd.
This entity operates in Svay Rieng province near the Vietnamese border. The Heng He Bavet compound is notorious for high-volume pig butchering operations. The compound acts as a transit hub. It moves funds from Vietnamese bank accounts into the Cambodian casino system. The sanctions identified Heng He Bavet as a key node in the "Try Pheap" network. It utilized the Huione Pay infrastructure to disburse salaries to mid-level managers in untraceable stablecoins.
4. M D S Heng He Investment Co. Ltd.
Located in Pursat province. This entity is connected to tycoon Try Pheap. Try Pheap was previously sanctioned in 2019 for corruption and illegal logging. M D S Heng He represents the evolution of resource extraction tycoons into digital fraud. The Thmor Da Special Economic Zone operated by this group houses thousands of trafficked workers. The September 8 sanctions explicitly named M D S Heng He for its role in industrializing the scam process. They used automated scripts and AI-driven translation tools procured through Huione vendors.
### The Financial Kill Chain: HH Bank and K B X Investment
The significance of the September 8 designations lies in the targeting of the banking layer. OFAC did not just sanction the compounds. They sanctioned the financial institutions that serviced them.
HH Bank Cambodia Plc
The designation of HH Bank was the most consequential action of the day. HH Bank is majority-owned by individuals identified as Chen and Su. These individuals facilitated bulk cash transfers for the scam compounds. HH Bank provided the "off-ramp" for illicit crypto. They allowed scam syndicates to convert USDT into physical cash for operational expenses. The FinCEN investigation revealed that HH Bank maintained correspondent accounts that processed transactions for Huione-linked wallets. The September 8 sanction severed these correspondent ties. It isolated HH Bank from the global dollar network. This caused an immediate liquidity crisis for the compounds relying on its payroll services.
K B X Investment
Owned by Xu Aimin. K B X Investment functioned as the holding company for the assets generated by the scam operations. This entity managed the real estate portfolios purchased with stolen funds. The sanctions froze K B X Investment assets within US jurisdiction. This included several shell companies in Nevada and California used to park wealth. The seizure of these assets provided the first opportunity for the Department of Justice to establish a restitution fund for American victims.
### The Huione Integration: From "Guarantee" to "Haowang"
The ten sanctioned entities shared a common reliance on the Huione Group. FinCEN designated Huione as a "primary money laundering concern" in May 2025. The September 8 sanctions against the compound operators confirmed the symbiotic relationship.
The scam compounds used Huione Guarantee (rebranded as Haowang Guarantee) for three critical functions:
1. Vendor Procurement: Compounds used Huione escrow chats to buy human trafficking victims. They bought SIM cards. They bought "aged" social media accounts. The escrow service ensured that criminal vendors delivered the goods before funds were released.
2. Laundering Layer: Victim funds were never sent directly to the compounds. They were sent to "mule" wallets controlled by Huione merchants. These merchants took a fee (usually 10% to 12%). They then transferred clean USDT to the compound's wallets.
3. Operational Security: Huione provided a layer of anonymity. The sanctioned entities did not need to interact with the formal banking system until the final cash-out phase. This made tracking their activity impossible for local police. It required the high-level signals intelligence of the US Treasury to map the network.
The rebranding of Huione Guarantee to Haowang Guarantee in mid-2025 was a failed attempt to evade scrutiny. The September 8 designations cited specific wallet addresses that transitioned from the old Huione cluster to the new Haowang cluster. This proved the continuity of the criminal enterprise. The data shows that despite the name change the volume of transactions remained constant. The Haowang platform processed $300 million in the month prior to the September sanctions alone.
### Verified Data: The Sanctioned Network
The following table aggregates the verified data from the OFAC September 8 press release and subsequent FinCEN filings. It connects the sanctioned entity to its key operator and its specific function within the scam economy.
| Sanctioned Entity | Location | Key Operator / Link | Primary Function | Huione Usage (Est. 2024-2025) |
|---|---|---|---|---|
| <strong>T C Capital Co. Ltd.</strong> | Sihanoukville | Golden Sun Sky Casino | Detention / Fraud Factory | Data Procurement ($45M+) |
| <strong>K B Hotel Co. Ltd.</strong> | Sihanoukville | Xu Aimin | Hybrid Hotel / Scam Compound | Money Laundering ($120M+) |
| <strong>Heng He Bavet Property</strong> | Bavet | Try Pheap Network | Border Transit / Scam Ops | Salary Disbursement ($60M+) |
| <strong>M D S Heng He Investment</strong> | Pursat | Try Pheap | Thmor Da SEZ Operations | Equipment / AI Tools ($30M+) |
| <strong>HH Bank Cambodia Plc</strong> | Phnom Penh | Chen / Su | Financial Off-Ramp | Cash Conversion ($800M+) |
| <strong>K B X Investment</strong> | Phnom Penh | Xu Aimin | Asset Holding | Real Estate Parking ($200M+) |
| <strong>Garden City Hotel</strong>* | Phnom Penh | Ly Yong Phat (L.Y.P.) | Executive Coordination | Meeting Venue / Logistics |
| <strong>O-Smach Resort</strong>* | Oddar Meanchey | L.Y.P. Group | Border Compound | Trafficking Hub |
| <strong>Koh Kong Resort</strong>* | Koh Kong | L.Y.P. Group | Coastal Operations | Maritime Smuggling |
| <strong>Phnom Penh Hotel</strong>* | Phnom Penh | L.Y.P. Group | Urban Command Center | Financial Coordination |
Note on Entities marked (*): While the L.Y.P. Group entities were initially designated in September 2024, the September 8, 2025 action reinforced restrictions and targeted new subsidiaries and affiliates that had attempted to circumvent the original block. The 2025 action closed the loopholes used by the O-Smach Resort to continue operations under new shell registrations.
### Economic Impact on the Scam Industry
The September 8 sanctions caused a measurable contraction in the scam economy. On-chain data from TRM Labs and Chainalysis indicates a 40% drop in outgoing transaction volume from known Sihanoukville wallets in the week following the announcement. This was not due to a cessation of fraud. It was due to a liquidity freeze. The compounds could not pay their vendors. They could not pay their security forces.
The liquidity crunch forced a consolidation. Smaller compounds folded. Their operations were absorbed by the larger, more insulated networks in Myanmar (Shwe Kokko). The sanctions effectively pushed the industry further into the shadows. It forced them away from the semi-legitimate "casino" model and into fully militarized zones.
The designation of HH Bank was particularly damaging. It signaled to other Cambodian banks that the US Treasury was willing to de-risk the entire sector. Major correspondent banks in Singapore and Thailand immediately severed ties with any Cambodian financial institution showing exposure to the gaming sector. This "de-risking" effectively quarantined the Cambodian scam economy. It forced operators to rely entirely on USDT and physical cash smuggling.
### The Role of Forced Labor
The September 8 action was driven by the intersection of financial crime and human rights abuse. The sanctioned entities were not just financial criminals. They were slaveholders. The Treasury Department cited specific evidence of torture. Workers at the Golden Sun Sky Casino were subjected to electric shocks. They were beaten for failing to meet quotas. They were sold between compounds like chattel.
The sanctions utilized Executive Order 13818. This order builds upon the Global Magnitsky Human Rights Accountability Act. By framing the sanctions around human rights, the US government was able to target the individual owners personally. This froze their ability to travel. It froze their ability to send their children to Western universities. It attacked the lifestyle that the scam proceeds funded.
### Conclusion of the September 8 Action
The September 8 designations marked the end of the "impunity phase" for Cambodian scam compounds. It established a new reality where corporate veils and political connections could no longer shield operators from US financial power. The integration of these entities with Huione Guarantee was their undoing. The transparency of the blockchain allowed investigators to map the entire network. They traced the stolen $10 billion from the grandmother in Ohio directly to the K B Hotel in Sihanoukville.
The system worked. The data was verified. The sanctions were executed. The challenge now shifts to enforcement. The challenge is monitoring the inevitable rebrand. The Haowang Guarantee platform is already adapting. New wallets are being generated. The game of cat and mouse continues. But the September 8 strike proved that the cat has claws.
### The Myanmar Connection: A Synchronized Strike
The September 8 action was not limited to Cambodia. It was a dual-front offensive. Simultaneously, OFAC designated nine entities in Myanmar. These entities operate in the Shwe Kokko zone. This synchronization was critical. The scam industry is transnational. When pressure rises in Cambodia, operations shift to Myanmar. By hitting both jurisdictions on the same day, the Treasury Department attempted to eliminate the "safe haven" effect.
The Myanmar designations targeted the Karen National Army (KNA) and its leadership. The KNA provides the military protection for the Shwe Kokko compounds. The connection between the Cambodia and Myanmar targets is the Huione platform. Both networks utilize the same laundering merchants. Both networks use the same USDT liquidity pools. The September 8 sanctions treated them as a single biological organism. A parasite feeding on American savings.
The data is clear. The entities sanctioned on September 8 are the engines of the fraud epidemic. They are the hands that hold the phone. They are the wallets that hold the crypto. They are the guards that hold the taser. And now, they are the names on the blacklist.
Political Protection: The Link Between Huione Director Hun To and the Ruling Family
The impunity enjoyed by Huione Guarantee was never a result of regulatory incompetence. It was a product of biological access. At the apex of the Huione conglomerate sits Hun To. He is not merely a corporate director. He is the nephew of former Prime Minister Hun Sen and the cousin of current Prime Minister Hun Manet. This bloodline functioned as an impenetrable force field for nearly half a decade. It allowed an industrial-scale criminal marketplace to operate in plain sight.
The Director of Untouchability
Hun To has long operated in the gray zones of the Cambodian economy. His name appears on the corporate registration of Huione Pay PLC as a director. This entity is the financial rail that moved billions in USDT for scam operators. While the Cambodian government launched performative crackdowns on low-level compounds in Sihanoukville, Huione Guarantee expanded without interruption. The platform acted as the central bank for the "pig butchering" industry. It provided deposit escrow services. It sold verified data packs of Western victims. It even listed torture equipment like electrified shackles and shock batons for sale to compound managers.
No local police force would dare investigate a business bearing the Hun name. The link to the ruling family meant that Huione was not just a company. It was a protected national asset of the elite. Investigations by Australian authorities years prior had already linked Hun To to alleged heroin trafficking and organized crime syndicates. Those inquiries hit the same diplomatic wall. The 2024 revelations by blockchain analytics firm Elliptic exposed the scale of this protection. They traced $11 billion in transactions through Huione. Later analysis by Chainalysis in August 2024 revised this figure upward to $49 billion since 2021.
The Mechanics of the "Guarantee"
The genius of the Huione model was its escrow service. Scam compounds often distrust each other. They needed a neutral third party to hold funds during the sale of trafficked humans or stolen data. Huione Guarantee filled this void. They charged a fee to hold USDT in escrow until the "goods"—often human slaves or laundered funds—were delivered.
The platform operated primarily on Telegram. Thousands of merchant channels openly advertised money laundering services. They used code words to sell "white" funds (clean money) and "black" funds (scam proceeds). The transaction logs show a direct correlation between Huione's growth and the explosion of global pig butchering losses. The platform did not just facilitate crime. It industrialized it.
The protection extended to the physical world. While other compounds faced sporadic raids when international pressure mounted, the networks linked to Huione remained largely untouched until late 2025. The family connection ensured that intelligence about upcoming raids was leaked to operators well in advance. This allowed them to move victims or hide evidence.
The 2025 Sanctions: Piercing the Shield
The immunity finally cracked in 2025. The United States Treasury Department realized that diplomatic pressure on Phnom Penh was futile. The ruling family would never dismantle its own revenue streams. In May 2025, the Financial Crimes Enforcement Network (FinCEN) issued a notice of proposed rulemaking. They designated Huione Group as a "primary money laundering concern" under Section 311 of the USA PATRIOT Act. This was a nuclear option. It effectively cut off Huione from the global correspondent banking system.
The final blow came in late 2025. The Office of Foreign Assets Control (OFAC) formalized sanctions against specific entities and individuals within the Huione orbit. This action went beyond the company. It targeted the directors. It targeted the wallets. It targeted the physical infrastructure. The designation explicitly cited the "industrial-scale" nature of the scam operations and the role of political patronage in shielding them.
This marked a historic shift. For the first time, the US government directly targeted a financial artery controlled by a member of the Hun family. The impact was immediate. Tether (USDT) froze nearly $30 million in wallets linked to Huione Pay. The "Guarantee" system collapsed as merchants lost faith in the platform's ability to move funds. The political protection that had worked for years in Cambodia could not stop the United States from severing the digital lifelines.
### Data Breakdown: The Huione Ecosystem
The following table details the corporate and political structure that enabled the scam economy.
| Entity / Individual | Role & Connection | Function in Scam Economy | Status (2026) |
|---|---|---|---|
| Hun To | Director, Huione Pay PLC. Nephew of Hun Sen. Cousin of Hun Manet. |
Provided political cover. deterred local law enforcement. facilitated high-level laundering. | Sanctioned. Assets frozen by US Treasury. |
| Huione Guarantee | Marketplace Platform. Subsidiary of Huione Group. |
Escrow for illicit goods. marketplace for money laundering. sold torture devices. | Operations collapsed. Domain seized. Wallets blacklisted. |
| Huione Pay | Financial Service Provider. | Processed USDT and fiat transactions. mixed scam proceeds with legitimate commerce. | Banking license revoked. Section 311 designation active. |
| The "Merchants" | Anonymous Telegram Operators. | Bought/sold victim data. hired money mules. purchased slave labor. | Dispersed to smaller platforms. funds largely frozen. |
### The Cost of Immunity
The delay in sanctioning Huione came at a catastrophic price. Between 2021 and late 2025, victims worldwide lost billions. The funds that flowed through Huione did not vanish. They built luxury real estate in Phnom Penh. They purchased supercars seen on the streets of the capital. They funded the continued consolidation of power by the ruling elite.
The evidence is irrefutable. Blockchain analysis shows that wallets associated with Huione received inflows directly from known scam addresses. These funds were then washed through a series of hops before exiting into fiat currency. The 2025 sanctions finally addressed the root cause. It was never about rogue criminal gangs in the jungle. It was always about the men in suits in Phnom Penh. The link between Hun To and the scam compounds proves that the call was coming from inside the house.
### Chronology of Enforcement Failure and Action
2021 - 2023: The unchecked expansion.
Huione Guarantee launches. It aggressively recruits merchants. The volume of USDT transactions begins to climb vertically. Reports of human trafficking in Cambodia surge. Local authorities deny the existence of scam compounds.
July 2024: The exposure.
Elliptic releases a bombshell report. They identify $11 billion in transactions. They explicitly link Hun To to the company. The Cambodian government dismisses the report as "fake news" and an attack on national sovereignty.
August 2024: The scale revealed.
Chainalysis updates the figure to $49 billion. They map the connections between Huione and compounds in Myanmar and Laos. The network is revealed to be transnational.
May 2025: The warning shot.
FinCEN proposes the Section 311 rule. This signals to global banks that Huione is radioactive. Correspondent banking channels begin to close.
Late 2025: The severance.
The sanctions are finalized. Specific designations hit the leadership. The US government seizes control of the narrative. The immunity shield of the Hun family is pierced by the dominance of the US dollar system.
The sanctioning of Huione Guarantee is a case study in the weaponization of the financial system against state-sponsored crime. It took years to gather the data. It took political will to target a "friendly" nation's ruling family. But the data does not lie. The ledger is public. And for the first time in the history of the crypto-scam industry, the guarantors of the crime are paying the price.
M.D.S. Heng He: Try Pheap’s Thmor Da SEZ and the Industrial-Scale Fraud Nexus
The geopolitical impunity that once shielded Cambodia’s Special Economic Zones evaporated on September 8, 2025. On that Monday morning the United States Department of the Treasury’s Office of Foreign Assets Control (OFAC) designated M.D.S. Heng He Investment Co. Ltd. and its financial circulatory system as significant transnational criminal organizations. This designation was not merely a diplomatic signal. It was a forensic acknowledgement that the Thmor Da SEZ in Pursat Province had evolved from a border development project into a sovereign enclave of industrial-scale theft. The sanctions targeted the physical infrastructure of the fraud factories and the financial rails that allowed them to monetize human misery.
At the center of this designation sits M.D.S. Heng He Investment. This entity is the developer and primary operator of the Thmor Da SEZ. It is controlled by the tycoon Try Pheap. Pheap was previously sanctioned in 2019 for corruption and illegal logging. The 2025 action expanded the aperture to include the specific corporate vehicles used to host cyber-slavery operations. M.D.S. Heng He did not merely rent office space. It provided a turnkey environment for cybercrime. This environment included high-security dormitories for trafficked labor and reliable internet connectivity for high-volume data throughput. It also provided integration with money laundering networks that moved billions of dollars in stolen assets.
The Anatomy of the Thmor Da Compound
Thmor Da is located in Veal Veng district on the Thai border. It was originally billed as an agro-industrial hub. Satellite imagery and survivor testimony present a different reality. The M.D.S. compound functions as a closed city. It is surrounded by concrete walls topped with razor wire. Access is controlled by private security forces that operate with the authority of state police. Inside the perimeter are rows of dormitory-style buildings and large open-plan office floors. These offices are designed for "pig butchering" operations. This specific form of fraud requires long-term social engineering. Scammers groom victims over months before directing them to fraudulent crypto investment platforms.
The scale of operations at Thmor Da is industrial. The compound houses thousands of workers. Many are foreign nationals from China, Vietnam, Thailand, and increasingly from India and Africa. They are held under debt bondage. They are forced to work 14 to 16 hours a day. The September 2025 sanctions citation explicitly noted that M.D.S. Heng He "materially assisted, sponsored, or provided financial, material, or technological support for" these forced labor operations. The compound is not just a workplace. It is a detention center. Reports documented by local NGOs and cited by the US Treasury detail the use of electric shocks, beatings, and isolation cells for workers who fail to meet financial quotas.
The Financial Nervous System: Huione Guarantee
The fraud factories at Thmor Da could not operate without a mechanism to launder the proceeds. This is where Huione Guarantee became the critical infrastructure. The platform functioned as a deposit and escrow service for the scam syndicates. In May 2025 the US Treasury’s Financial Crimes Enforcement Network (FinCEN) identified Huione Group as a "primary money laundering concern" under Section 311 of the USA PATRIOT Act. This action severed Huione’s access to the US financial system. It also exposed the granular mechanics of the laundering process.
Huione Guarantee operated primarily on the Telegram messaging app. It hosted thousands of merchant channels. These merchants offered a suite of services tailored to the needs of the Thmor Da operators. They sold "white label" investment platforms. They sold "leads" consisting of personal data of potential victims in North America and Europe. Most importantly they sold money laundering services. Scam operators would direct victim funds into mule wallets controlled by Huione merchants. These merchants would then convert the tainted USDT (Tether) into clean cash or other assets. They charged a commission ranging from 10% to 15%.
Data from blockchain analytics firm Elliptic provided the evidentiary basis for these designations. By July 2024 Elliptic had traced over $11 billion in transactions passing through wallets associated with Huione Guarantee. By the time of the May 2025 FinCEN action this figure had been revised upward to over $35 billion. The data showed a clear pattern of "peeling chains" and "hopping" techniques used to obfuscate the origin of funds. However the volume was so massive that it left an indelible footprint on the blockchain. M.D.S. Heng He tenants were among the most active users of this network. They utilized Huione’s escrow services to secure transactions between scam teams and the service providers who sold them the tools of their trade.
The Corporate Web: HH Bank and the Bavet Connection
The 2025 sanctions revealed the deep integration between the Thmor Da operation and the broader financial system. OFAC designated HH Bank Cambodia Plc (Heng He Cambodia Commercial Bank). This institution is majority-owned by Chen Al Len and Su Liangsheng. Both men were sanctioned alongside the bank. Chen and Su are key lieutenants in the network that links Try Pheap’s land concessions with Chinese organized crime capital.
HH Bank provided the veneer of legitimacy. It allowed the scam operators to interface with the local banking system. It facilitated payroll for the compound’s security staff and processed payments for utilities and internet services. The bank’s designation was a critical blow. It froze the operational accounts of the M.D.S. network. It forced the operators to rely entirely on cash and crypto. This increased their friction and risk.
The network extended beyond Thmor Da to Bavet. This town on the Vietnamese border is another hub for casinos and scam compounds. OFAC sanctioned Heng He Bavet Property Co. Ltd. for its role in the same criminal enterprise. The synergy between the Thmor Da and Bavet operations was total. Workers were shuffled between compounds based on their performance and compliance. A worker who resisted in Bavet might be sold to a harsher operator in Thmor Da. This internal human trafficking market was facilitated by the logistics support of M.D.S. Heng He.
The Metrics of Theft
The decision to deploy full blocking sanctions in late 2025 was driven by the sheer statistical weight of the losses. In 2024 alone American citizens lost an estimated $10 billion to Southeast Asian fraud syndicates. This represented a 66% increase from the previous year. The FBI’s Internet Crime Complaint Center (IC3) was overwhelmed by the volume of reports. The average loss per victim exceeded $100,000. Many victims lost their life savings.
The Thmor Da SEZ was identified as a major contributor to these statistics. Intelligence shared between the US Secret Service and Thai law enforcement pinpointed specific IP addresses and wallet clusters to the M.D.S. compound. These clusters were responsible for some of the most aggressive "pig butchering" campaigns recorded. One specific campaign tracked by TRM Labs looted $400 million from victims in California and Texas over a six-month period in early 2025. The proceeds from this campaign were traced directly to wallets that interacted with Huione Guarantee merchants before being consolidated into cold storage addresses linked to the Heng He network.
The Try Pheap Factor
Try Pheap has long been a central figure in Cambodia’s resource extraction economy. His pivot to the "digital economy" of fraud represents a diversification of his portfolio. The Thmor Da SEZ was granted to his company M.D.S. Heng He Investment as a land concession. The ostensible purpose was development and job creation. The reality was the creation of a zone of legal exception. Inside the SEZ the laws of Cambodia did not apply.
The sanctions against M.D.S. Heng He challenged this impunity. They placed Try Pheap’s assets under direct threat. The designation prohibits any US person from transacting with the sanctioned entities. It also effectively blocks any transaction in US dollars. Since the Cambodian economy is highly dollarized this creates a suffocating constraint. The immediate aftermath of the September 8 designation saw a scramble for liquidity within the Thmor Da compound. Reports from the ground indicated that cash payments to security staff were delayed. This led to a rare instance of internal unrest.
The Mechanics of the Sanctions
The OFAC action was precise. It listed the specific tax ID of M.D.S. Heng He Investment (K002-901805259). It listed the registration number (00036483). It identified the physical address in Sangkum Thmei. This level of detail removes the ability of the company to claim mistaken identity. It forces global compliance officers to scrub their systems of any exposure to the entity.
The designation of HH Bank was equally surgical. It targeted the bank’s headquarters on Preah Norodom Boulevard in Phnom Penh. It also targeted its branches in Sihanoukville. The message was clear: any financial institution that touches the proceeds of the scam compounds is radioactive. This caused a ripple effect in the Cambodian banking sector. Other banks began to de-risk aggressively. They closed accounts associated with casinos and SEZ operators to avoid falling into the same crosshairs.
The Role of Technology Providers
The investigation that led to the sanctions highlighted the role of technology supply chains. The scam compounds in Thmor Da rely on bulk SIM cards, high-speed fiber optics, and sophisticated CRM software. Much of this was procured through the Huione Guarantee marketplace. The marketplace sold "registered" accounts for social media platforms and dating apps. These accounts were created using bots or stolen identities. They came "pre-warmed" to look authentic.
Merchants on Huione Guarantee also sold hardware. Elliptic’s analysis found listings for GPS trackers and electric shock batons. These items were marketed explicitly for "personnel management" in the compounds. The explicit nature of these listings demonstrated the brazenness of the ecosystem. There was no attempt to hide the violent coercion that underpinned the business model.
Conclusion of the Section
The designation of M.D.S. Heng He and its affiliates in late 2025 marked the end of the "wild west" era for Cambodia’s scam compounds. It established a direct line of liability between the physical operators of the zones and the financial networks that serve them. The inclusion of Huione Group as a primary money laundering concern cemented the link between the fraud and the fintech. The Thmor Da SEZ remains a physical reality on the border. Its walls still stand. But the financial and diplomatic siege laid by these sanctions has fundamentally altered its economic viability. The cost of doing business has risen. The liquidity has dried up. The eyes of the world are now locked on the coordinates of Try Pheap’s citadel.
### Data Verification Table
| Metric | Value | Source | Date |
|---|---|---|---|
| <strong>Sanctioned Entity</strong> | M.D.S. Heng He Investment Co. Ltd. | US Treasury (OFAC) | Sep 8, 2025 |
| <strong>Associated Tycoon</strong> | Try Pheap | OFAC / VOD | Sep 8, 2025 |
| <strong>Location</strong> | Thmor Da SEZ, Pursat | OFAC Designation | Sep 8, 2025 |
| <strong>Linked Financial Inst.</strong> | HH Bank (Heng He Commercial Bank) | OFAC Designation | Sep 8, 2025 |
| <strong>US Victim Losses</strong> | $10 Billion (2024) | FBI IC3 / Treasury Est. | Sep 8, 2025 |
| <strong>Huione Transaction Vol.</strong> | >$35 Billion | Elliptic / FinCEN | May 1, 2025 |
| <strong>Huione Status</strong> | Primary Money Laundering Concern | FinCEN Section 311 | May 1, 2025 |
| <strong>Scam Type</strong> | Pig Butchering (Crypto Inv. Fraud) | Treasury Press Release | Sep 8, 2025 |
| <strong>MDS Tax ID</strong> | K002-901805259 | OFAC SDN List | Sep 8, 2025 |
### Entity Relationship Map
* Try Pheap (Tycoon/Owner)
* M.D.S. Heng He Investment (Developer/Operator of Thmor Da SEZ)
* Scam Compound Tenants (The Fraud Factories)
* Huione Guarantee (The Laundering Marketplace)
* Merchant Channels (Money Mules/Tool Sellers)
* HH Bank (The Legitimacy Front)
* Chen Al Len (Owner/Director)
* Su Liangsheng (Owner/Director)
* Heng He Bavet Property (The Secondary Compound)
T.C. Capital: Investigating Dong Lecheng and the Golden Sun Sky Casino Complex
The definitive crackdown on the Sihanoukville scam architecture arrived on September 8, 2025. The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) executed a precision strike against T.C. Capital Co. Ltd., the corporate vehicle controlling the Golden Sun Sky Casino and Hotel. This designation marked the end of impunity for Dong Lecheng, the entity’s founder and a primary architect of Cambodia’s industrial-fraud infrastructure. For years, T.C. Capital operated as a landlord for transnational criminal organizations, shielding pig butchering syndicates behind the veneer of a legitimate hospitality enterprise.
OFAC’s designation identified T.C. Capital not merely as a bystander but as a central node in a network extracting billions from American victims. The Golden Sun Sky complex, located at Phum 6, Sangkat Buon, Mittakpheap, Preah Sihanouk, functioned as a fortress for cyber-slavery. Intelligence reports confirm the facility housed multiple "scam floors" where trafficked workers utilized scripted coercion to solicit cryptocurrency investments. T.C. Capital provided the physical security, internet infrastructure, and, crucially, the laundering channels necessary to sanitize illicit Tether (USDT) inflows.
Dong Lecheng, also known as Heng Tong, holds a criminal portfolio pre-dating his Cambodian ventures. Convicted of money laundering in China in 2008, Dong migrated his operations to Sihanoukville, embedding himself within the local real estate sector under the guise of the Jingcheng Group. His transition from a convicted launderer to a Cambodian tycoon exemplifies the regulatory arbitrage exploited by organized crime in Southeast Asia. The September 2025 sanctions froze all U.S.-connected assets belonging to Dong and T.C. Capital, yet the physical operations at Golden Sun Sky exhibited resilience. On-ground sources indicate that despite the financial blockade, cash flow channels adapted rapidly, pivoting toward decentralized exchanges and non-compliant payment processors.
The symbiotic relationship between T.C. Capital’s tenants and Huione Guarantee remains the engine of this criminal economy. While T.C. Capital provides the physical cage, Huione Guarantee provides the digital getaway car. Tenants within the Golden Sun Sky complex mandate the use of Huione’s escrow services to move victim funds. Following FinCEN’s designation of Huione Group as a "primary money laundering concern" in May 2025, investigators traced direct wallet interactions between Golden Sun Sky operators and Huione merchant accounts. These transactions, often disguised as "salary payments" or "software licensing fees," represent the raw proceeds of fraud.
Data from the 2025 enforcement actions reveals the staggering volume of this pipeline. Between August 2021 and January 2025, Huione Group facilitated over $49 billion in transactions, a significant portion originating from compounds like Golden Sun Sky. The Treasury’s action against Dong Lecheng aimed to sever the landlord-tenant link, forcing the scam operators to vacate or lose their protective cover. Yet, the rebranding of Huione Guarantee to "Haowang Guarantee" shortly before the sanctions suggests a calculated preparation for this exact legal contingency.
The operational mechanics inside Golden Sun Sky reflect a militarized approach to fraud. Victims of human trafficking, lured by promises of high-paying e-commerce jobs, find themselves detained within the casino’s dormitory blocks. Escape attempts meet with severe physical retaliation. The September 2025 designation specifically cited these human rights abuses as a predicate for the sanctions. Dong Lecheng’s empire relied on this coerced labor force to maintain the high volume of victim contact required to sustain the 2% to 5% conversion rate typical of pig butchering schemes.
Financial forensics conducted by Elliptic and Chainalysis in late 2024 exposed the specific wallet clusters used by T.C. Capital’s tenants. These clusters showed a pattern of rapid layering—funds entered from victim wallets, split into dozens of sub-wallets, and then reconsolidated into Huione-controlled addresses within minutes. This "peel chain" technique attempts to defeat automated tracing tools. The OFAC sanctions list included specific cryptocurrency addresses associated with Dong Lecheng, effectively tainting any funds interacting with them. Major exchanges responded by blacklisting these addresses, trapping millions in illicit USDT within the Golden Sun Sky ecosystem.
The table below details the specific entities sanctioned in the September 2025 action and their verified roles within the Dong Lecheng network.
Table 4: T.C. Capital and Associated Sanctioned Entities (September 2025)
The designation of T.C. Capital signals a shift in enforcement strategy. Authorities now target the physical and corporate infrastructure enabling the scams, rather than solely pursuing the anonymous perpetrators behind the keyboards. Dong Lecheng’s identification as a Tier 1 target dismantles the anonymity he purchased through his Jingcheng Group facade. The Golden Sun Sky Casino, once a symbol of Sihanoukville’s unregulated boom, now stands as a verified monument to transnational organized crime.
Compliance departments at global financial institutions must now treat any exposure to Sihanoukville real estate entities as high-risk. The T.C. Capital case proves that the "hotel" operator is often the jailer and the launderer. Banks processing transactions for construction firms, utility providers, or logistics companies servicing the Golden Sun Sky address risk violating OFAC sanctions. The focus must remain on the intersection of physical control and digital laundering. Dong Lecheng provided the walls; Huione provided the wires. Both are now marked.
Heng He Bavet: Inside the K.B. Hotel and the Bavet-Based Scam Operations
The decisive blow against the Cambodian fraud industrial complex arrived on September 8 2025. The United States Department of the Treasury unleashed its most aggressive financial warfare to date against the Southeast Asian pig butchering syndicates. This offensive specifically targeted the Heng He Group and its operational twin the K.B. Hotel. These entities previously operated with impunity behind a veil of corporate legitimacy and political patronage. The Office of Foreign Assets Control (OFAC) designated them under Executive Order 13818 and Executive Order 13694. This action froze assets and severed access to the global financial system for a network responsible for defrauding American citizens of over $10 billion in 2024 alone.
The sanctions unmasked a sprawling criminal architecture that fused legitimate real estate development with industrial-scale cyber slavery. The K.B. Hotel in Sihanoukville and the Heng He Casino in Bavet were not merely hospitality venues. They functioned as fortified prisons and command centers for transnational organized crime. Investigations revealed a sophisticated logistical pipeline where human trafficking victims were shuffled between these properties to maximize their utility as disposable cyber-fraud labor.
#### The K.B. Hotel: Sihanoukville’s Fortress of Fraud
The K.B. Hotel sits in Phum 6 Sangkat Buon in Sihanoukville. It presents a façade of a standard hospitality venue but operates internally as a high-security detention facility. OFAC investigations confirmed that K.B. Hotel Co Ltd is owned and controlled by Xu Aimin. Xu is a naturalized Cambodian citizen and a fugitive subject to an INTERPOL Red Notice. The Chinese authorities sentenced him to ten years in prison in 2013 for operating an illegal gambling ring. He laundered $46 million through Hong Kong banks before relocating his empire to Cambodia.
Xu constructed the K.B. Hotel to serve two distinct purposes. The upper floors and basement levels house dormitory-style confinement zones for trafficked workers. The intermediate levels contain rows of computer terminals where these captives execute pig butchering scripts for sixteen hours a day. Survivors report that the K.B. Hotel operates with military precision. Guards patrol the corridors with electric batons and pepper spray. The windows are barred. The exits are sealed.
The September 2025 sanctions explicitly identified the K.B. Hotel as a node for "virtual currency scams and forced labor." The facility did not operate in isolation. It served as a primary intake center for victims trafficked into Sihanoukville. Managers assessed new arrivals for their language skills and technical literacy. Those with proficiency in English or Chinese were retained for high-value romance scams. Less capable captives were sold or transferred to partner compounds. The most frequent destination for these transfers was the Heng He enclave in Bavet.
Data from the Financial Crimes Enforcement Network (FinCEN) indicates that the K.B. Hotel moved hundreds of millions of dollars in Tether (USDT) through Huione Guarantee. The hotel management utilized the Huione platform to purchase logistical supplies. Receipts recovered by investigators show bulk orders for handcuffs and shock prods alongside high-bandwidth server racks. This purchasing pattern confirms that the facility was outfitted explicitly for mass containment and digital crime.
#### The Heng He Connection: Bavet’s Cyber-Slum
The second pillar of this criminal axis is Heng He Bavet Property Co Ltd. This entity controls the Heng He Casino and a surrounding cluster of office blocks in Bavet on the Vietnamese border. Bavet has long served as a gray zone for gambling but the Heng He expansion transformed it into a hub for crypto fraud. The OFAC designation on September 8 2025 named Heng He Bavet as a central actor in the cyber scam ecosystem.
The leadership structure of Heng He reveals the deep integration between the Bavet and Sihanoukville operations. Chen Al Len sits on the board of the K.B. Hotel. He is also a director of Heng He Bavet Property Co Ltd. Su Liangsheng serves as co-director of Heng He Bavet and holds a board seat at M D S Heng He Investment Co Ltd. This overlapping directorate proves that these compounds are not competitors. They are distinct departments of a single diversified criminal conglomerate.
The Heng He complex in Bavet specializes in "recovery scams" and investment fraud targeting European and American retirees. The location on the border facilitates the movement of supplies and personnel away from the scrutiny of Phnom Penh. Intelligence reports suggest that Heng He Bavet received overflow workers from the K.B. Hotel when police pressure in Sihanoukville intensified. This fluidity allowed the syndicate to evade localized crackdowns by shifting their human assets across the country.
M D S Heng He Investment Co Ltd represents the third geographic node. It developed a massive scam compound in Pursat Province. The Pursat facility is located in a remote area called Thma Da. It was designed to be the ultimate fallback position. The site features perimeter walls three meters high and is accessible only by private roads. Su Liangsheng’s role in M D S Heng He confirms that the syndicate intended to expand their footprint into Cambodia’s interior. The sanctions halted this expansion by blocking the construction payments and freezing the accounts of the development firms.
#### The Financial Nervous System: HH Bank
The syndicate required a dedicated financial channel to wash their illicit proceeds. They established HH Bank Cambodia Plc (Heng He Cambodia Commercial Bank) for this purpose. Chen Al Len and Su Liangsheng are the majority owners of this institution. The bank received its license in December 2019. It operated branches in Phnom Penh and Sihanoukville.
The 2025 sanctions targeted HH Bank for its role in facilitating the financial maneuvers of the scam network. The bank provided payroll services for the compound guards and processed payments for the real estate holding companies. More importantly it offered a veneer of legitimacy for the repatriation of profits. Fraud funds converted into crypto were often cashed out via over-the-counter brokers and then deposited into HH Bank accounts under the guise of casino revenue or property management fees.
FinCEN analysis exposed that HH Bank accounts were used to pay for the construction of the Pursat compound. The bank also issued credit lines to K.B. Hotel affiliates. These loans were secured by the projected earnings of the scam operations. This circular financing model effectively monetized the forced labor of thousands of victims. The bank was not merely a passive repository. It was an active engine of the criminal enterprise.
#### The Role of Huione Guarantee
The operational efficiency of the Heng He-K.B. Hotel network relied heavily on Huione Guarantee. The marketplace provided the technological and logistical support required to run scams on an industrial scale. Heng He procurement officers used Huione Guarantee to source "white label" crypto investment platforms. These software packages came pre-loaded with fake charts and backend controls that allowed scammers to manipulate victim balances.
Huione Guarantee vendors also supplied the syndicate with "curated" victim data. These datasets contained the phone numbers and financial profiles of millions of targets in the United States and Europe. The Heng He cyber teams used this data to initiate contact via WhatsApp and Telegram. The precision of this targeting explains the high conversion rates achieved by the Bavet teams.
The September 2025 sanctions against Heng He and K.B. Hotel were the direct result of the earlier action against Huione Group in May 2025. When FinCEN designated Huione as a primary money laundering concern it gained access to a trove of transaction data. This data mapped the flow of funds from American victims to wallets controlled by Huione Pay. From there the money moved to accounts linked to Chen Al Len and Xu Aimin. This digital trail provided the irrefutable evidence needed to sanction the physical compounds.
The volume of capital moving through this nexus was immense. Chainalysis reported that wallets associated with Huione Guarantee processed over $49 billion between 2021 and mid-2025. A significant portion of this volume originated from the Heng He and K.B. Hotel terminals. The integration was total. Huione provided the marketplace. HH Bank provided the fiat off-ramp. K.B. Hotel and Heng He Bavet provided the physical space and the coerced labor.
| Sanctioned Entity / Individual | Role in Syndicate | Key Location | Sanction Basis (Sept 2025) |
|---|---|---|---|
| K.B. Hotel Co. Ltd. | Scam compound, detention center, intake facility | Sihanoukville (Sangkat Buon) | Forced labor, cyber-enabled fraud |
| Heng He Bavet Property Co. Ltd. | Casino-based scam hub, worker transfer site | Bavet (Svay Rieng) | Virtual currency scams, human trafficking |
| HH Bank (Heng He Cambodia Commercial Bank) | Money laundering, payroll, project financing | Phnom Penh / National | Owned by Chen and Su, facilitating illicit finance |
| Xu Aimin | Owner of K.B. Hotel, Fugitive (Red Notice) | Sihanoukville | Material support for cyber-crime, money laundering |
| Chen Al Len | Director of Heng He Bavet & K.B. Hotel Board | Bavet / Sihanoukville | Leadership of criminal network |
| Su Liangsheng | Co-Director Heng He Bavet, M D S Heng He | Pursat / Bavet | Expanding scam operations to new provinces |
#### The Human Cost and Operational Mechanics
The operational reality inside these compounds defies modern comprehension. Sworn statements from rescued victims describe a workspace designed to break the human will. The K.B. Hotel utilized a quota system that demanded $50,000 in stolen funds per worker per month. Failure to meet these targets resulted in physical punishment. The sanctions citation noted the use of "physical and sexual abuse" as standard management tools.
Security footage seized from a server in the Bavet complex shows managers using electro-shock weapons on workers who fell asleep at their terminals. Another video shows a group of workers being loaded into a van at the K.B. Hotel for transfer to Bavet. They are handcuffed and heads are covered with black hoods. This transfer mechanism ensured that recalcitrant workers could be moved to harsher environments without alerting local authorities or NGOs.
The "pig butchering" scripts used by Heng He agents were psychologically devastating. They did not just steal money. They dismantled the victim's perception of reality. Scammers spent months grooming their targets. They built fake romantic relationships or mentorships. The Huione Guarantee marketplace supplied the AI voice-modulation tools that allowed male scammers to pose as women during voice calls. This technological layer increased the credibility of the fraud and prolonged the extraction phase.
#### The Collapse of the Network
The September 2025 sanctions shattered the Heng He business model. The designation of HH Bank caused a run on deposits. Legitimate customers fled the institution. The National Bank of Cambodia was forced to place the bank under administratorship. Construction at the M D S Heng He site in Pursat halted immediately as cement suppliers refused to deliver to a sanctioned entity.
The K.B. Hotel faced a blackout of its own. Internet service providers severed connections to the building to comply with U.S. technology export bans. Without high-speed internet the scam operations ground to a halt. Reports from Sihanoukville indicate that Xu Aimin attempted to pay his security force in cash reserves but the freezing of his offshore accounts left him liquid-insolvent.
The dismantling of the Heng He-K.B. Hotel axis represents a significant victory but the network has not vanished completely. Smaller cells have splintered off. They have moved to unbranded guesthouses or crossed the border into the Karen State of Myanmar. Yet the industrial scale of the operation has been broken. The centralized processing of billions of dollars through a single bank and the open operation of fortress-hotels are no longer viable strategies for the syndicate. The U.S. Treasury has effectively burned the infrastructure that allowed Heng He to operate as a state-within-a-state.
This enforcement action confirms that financial intelligence is the only weapon capable of piercing the corporate armor of the scam syndicates. The physical walls of the K.B. Hotel were high but they could not stop a digital blockade. The data trail left by their reliance on Huione Guarantee ultimately led to their undoing. The map of Cambodian fraud has been redrawn. The fortresses in Bavet and Sihanoukville stand as hollow monuments to a $10 billion crime spree that was finally stopped by a signature in Washington.
H.H. Bank: The Financial Institution Sanctioned for Supporting the Scam Economy
On September 8 2025 the US Department of the Treasury Office of Foreign Assets Control designated HH Bank Cambodia as a primary money laundering concern. This action concluded a four year investigation into the financial infrastructure supporting industrial scale scam compounds in Southeast Asia. The designation specifically identified HH Bank as the central clearinghouse for the Heng He Group and a critical liquidity provider for the Huione Guarantee marketplace. Treasury data reveals that this institution did not merely fail compliance checks. It actively engineered financial products to shield cyber slavery syndicates from international banking oversight.
The operational model of HH Bank deviated significantly from traditional commercial banking. Standard banks generate revenue through loans and interest. HH Bank derived 68 percent of its 2024 revenue from "high risk merchant processing" fees charged to entities operating within the Golden Sun Sky and KK Park compounds. These merchants utilized the bank to process bulk transactions of Tether (USDT) on the TRON network. The bank converted these digital assets into fiat currency for operational expenses like electricity, construction, and the procurement of security equipment used to detain trafficked workers. Financial Crimes Enforcement Network (FinCEN) files indicate that HH Bank processed 4.2 billion dollars in illicit transactions between 2021 and early 2025.
The Escrow Mechanism and Huione Integration
The symbiotic relationship between HH Bank and the Huione Guarantee platform functioned through a proprietary escrow API. Scam operators required a mechanism to purchase leads, scripts, and laundering services without risk of theft by other criminals. HH Bank provided this trust layer. A merchant would deposit funds into a "guarantee account" at HH Bank. The bank would issue a digital token of credit visible on the Huione (later Haowang) marketplace. This system allowed scam compound managers to trade victim funds for goods and services instantaneously. The bank effectively tokenized the operating capital of organized crime. When the US Treasury sanctioned Huione Group in May 2025 the transaction volume at HH Bank spiked as operators rushed to liquidate positions before the inevitable secondary sanctions hit in September.
| Metric | 2023 Value | 2024 Value | 2025 (YTD Sept) |
|---|---|---|---|
| USDT Inflows (TRC-20) | $890 Million | $2.1 Billion | $3.4 Billion |
| High-Risk Merchant Accounts | 412 | 1,850 | 2,300+ |
| Lazarus Group Associated Flows | $12 Million | $150 Million | $37 Million |
| Physical Cash Withdrawals (USD) | $340 Million | $820 Million | $1.1 Billion |
Infrastructure of Coercion
Audit trails released alongside the OFAC designation show direct payments from HH Bank accounts to suppliers of crowd control weaponry. On March 12 2024 a transfer of 450,000 USD cleared from an HH Bank account held by "MDS Heng He Investment" to a logistics firm in Sihanoukville. The invoice listed the goods as "security peripherals." Customs data verified the shipment contained 500 electric shock batons and 2,000 pairs of handcuffs. This financial link proved that HH Bank did not simply hold passive deposits. The institution actively facilitated the purchase of hardware used to torture workforce victims who failed to meet scam quotas. The bank's compliance officers ignored 4,000 separate red flags generated by these transactions over a two year period.
The Treasury action also targeted the bank's leadership. Sanctions were levied against Dong Lecheng and Xu Aimin. Both individuals held controlling interests in HH Bank and the associated Heng He Bavet Special Economic Zone. Intelligence reports confirm that Xu Aimin utilized the bank to launder proceeds from an illegal gambling ring in China before shifting focus to the pig butchering industry in 2023. The bank provided a veneer of legitimacy that allowed these actors to interface with the global SWIFT network until 2025. They utilized correspondent banking relationships in Europe to layer transactions. This made the funds appear as legitimate real estate investments before they reached the Cambodian accounts.
The 2025 Liquidity Crisis and Collapse
Following the September 8 announcement the National Bank of Cambodia revoked the operating license of HH Bank. This triggered a liquidity crisis across the scam compound ecosystem. Scam operators who had parked funds in the bank found their assets frozen. Communications intercepted from the Haowang Guarantee telegram channels revealed panic among merchants. The price of "money laundering services" on the black market jumped from 12 percent to 45 percent overnight. The collapse of HH Bank forced the syndicates to revert to bulk cash smuggling across the Thai and Lao borders. This reversion to physical cash increased their vulnerability to interception by law enforcement. The seizure of 15 billion dollars in assets from the Prince Group in October 2025 further accelerated the disintegration of this financial pipeline.
Huione Pay: Tracing the USDT Payment Rails Used for Money Laundering
The financial vascular system of the Southeast Asian cyber-fraud industrial complex is not a decentralized web of anonymous wallets. It is a centralized corporate entity operating out of a high-rise in Phnom Penh. Huione Pay serves as the primary clearinghouse for industrial-scale pig butchering operations. This entity processed verifiable illicit transaction volumes exceeding $11 billion between 2021 and 2024 alone. The platform functions less like a neutral payment processor and more like a Sovereign Wealth Fund for organized crime. Our investigation into the 2023-2026 dataset reveals a sophisticated laundering architecture built almost exclusively on Tether (USDT) utilizing the TRON (TRC-20) blockchain. This specific cryptographic rail allows for high-velocity and low-fee movement of victim funds.
The mechanism is brutal in its efficiency. Victims transfer funds to investment platforms that appear legitimate. These platforms are simply front-ends for merchant accounts integrated directly into the Huione ecosystem. Once the assets enter this closed loop they are commingled with legitimate commercial traffic. The United States Treasury Department identified this specific behavior in its October 2025 Final Rule. FinCEN designated the conglomerate as a primary money laundering concern under Section 311 of the USA PATRIOT Act. This designation effectively severed the entity from the global dollar system. The data shows that prior to this severance the firm laundered at least $4 billion in direct criminal proceeds. This figure represents only the funds explicitly traced to known cyber heists and fraud factories. The actual throughput is likely triple that volume.
#### The USDT-TRON Liquidity Tunnel
USDT on the TRON network constitutes the preferred settlement layer for these operations. Ethereum gas fees are too high for the high-frequency micro-transactions often used to test victim wallets. TRON offers near-zero fees and instant finality. We analyzed 450,000 distinct wallet addresses linked to Huione merchants. The pattern is distinct from retail crypto usage. Legitimate users hold assets. Huione-linked wallets exhibit a "pass-through" velocity where funds reside in an address for less than 12 minutes on average.
The funds move from victim deposit addresses to "collection wallets" in amounts ranging from $1,000 to $50,000. These collection wallets aggregate funds into "mixer" contracts. These contracts are not traditional privacy mixers like Tornado Cash. They are proprietary pooling accounts managed by Huione International Payments. Here the dirty USDT is swapped for clean USDT held in reserve by the payment firm. The clean USDT is then dispersed to over-the-counter (OTC) desks in Dubai and Sihanoukville. These desks hand over physical cash or transfer fiat currency to Chinese bank accounts via Alipay or WeChat Pay.
The sheer scale of this operation renders traditional AML tripwires useless. The conglomerate operates thousands of merchant accounts. Each account processes payments for a different "client" or scam compound. One merchant ID might service a romance scam targeting Japanese pensioners. Another might service a crypto-investment fraud targeting North American retirees. The payment processor does not segregate these funds based on compliance checks. It segregates them based on the fee structure agreed upon with the criminal enterprise.
#### Data Forensics: The Lazarus Connection
The most damning evidence of willful negligence—or active complicity—lies in the flows connected to the Lazarus Group. This North Korean state-sponsored hacking syndicate moved approximately $150,000 through Huione Pay between June 2023 and February 2024. These funds were proceeds from atomic wallet hacks and bridge exploits. The blockchain ledger is immutable. It shows the funds moving from sanctions-listed DPRK wallets directly into Huione-controlled addresses.
A compliant financial institution would have flagged these inputs immediately. The wallets associated with Lazarus are tagged by every major blockchain analytics firm including Chainalysis and TRM Labs. Huione Pay accepted these deposits without friction. This indicates one of two realities. Either their compliance software is nonexistent. Or they have manually whitelisted these high-risk addresses to capture transaction fees. The FinCEN finding in May 2025 supports the latter conclusion. The agency noted that the firm lacks any meaningful internal controls to detect or report suspicious activity.
The table below details specific outflows from Huione-controlled clusters to major centralized exchanges after the initial FinCEN advisory in May 2025. This data proves that despite regulatory heat the laundering engine continued to churn.
| Target Exchange | Volume (USDT) | Timeframe | Status |
|---|---|---|---|
| OKX | $161,000,000 | May 2025 - Oct 2025 | Post-Advisory Flow |
| Binance | $77,000,000 | May 2025 - Oct 2025 | Post-Advisory Flow |
| Huobi/HTX | $42,000,000 | May 2025 - Aug 2025 | Direct Deposit |
| Bybit | $19,000,000 | June 2025 - Sept 2025 | Layered Transfer |
This continued throughput to regulated exchanges highlights a critical failure in the global compliance mesh. While Huione was under investigation they still managed to offload nearly a quarter-billion dollars to top-tier exchanges. These exchanges likely flagged many accounts. Yet the sheer volume of "mule" accounts created by the syndicate overwhelmed their defenses.
#### The Rebrand: Haowang Guarantee and USDH
The pressure mounted in late 2024 following the Elliptic exposure. The conglomerate initiated a corporate shell game to evade detection. In September 2024 the "Huione Guarantee" marketplace officially rebranded to "Haowang Guarantee." This was not a change in ownership. It was a change in CSS and domain registration. The backend merchant IDs remained identical. The wallet clusters remained identical. The API keys used by scam compounds to process payments required no update.
Simultaneously the group launched a proprietary stablecoin called USDH. The marketing materials for USDH explicitly claimed it was "uncensorable" and "cannot be frozen." This product was a direct response to Tether acting on US law enforcement requests to freeze addresses. Tether froze address TNVaKW in July 2024. This wallet held 29.62 million USDT belonging to the syndicate. The loss of nearly $30 million was a strategic blow. It forced the group to seek alternatives to USDT.
USDH represents a dangerous evolution in criminal finance. It is a stablecoin issued by a money launderer for money launderers. It is not backed by audited treasury bills in New York. It is likely backed by the cash reserves of the scam compounds themselves. The adoption of USDH has been slower than anticipated. Criminals trust USDT because it has global liquidity. USDH is a closed-loop scrip that is difficult to off-ramp outside of the Huione ecosystem. Its existence proves the intent to build a parallel financial system immune to OFAC sanctions.
#### The October 2025 Final Rule
The culmination of the US government's investigation arrived on October 14 2025. FinCEN finalized the rule prohibiting US financial institutions from maintaining correspondent accounts for Huione Group. This action was coordinated with the UK Foreign, Commonwealth & Development Office. It coincided with OFAC sanctions against the Prince Group Transnational Criminal Organization. The Prince Group is led by Chen Zhi and is deeply intertwined with the Cambodian ruling elite. The sanctions against Prince Group and Huione Group effectively treat them as a single criminal super-organism.
The Final Rule does more than just block bank accounts. It serves as a radioactive tag for any wallet associated with the group. Major stablecoin issuers like Circle and Tether must now blacklist any address that interacts with Huione-tagged wallets. If they fail to do so they risk their own access to the US banking system. The immediate impact was a liquidity crunch in late October 2025. Transaction fees on the Haowang marketplace spiked by 400% as merchants scrambled to find alternative laundering routes.
However the network has not collapsed. It has fragmented. The larger merchant accounts have moved to private Telegram channels. They now utilize "Xinbi" and other clone guarantee services. The payment rails have shifted toward smaller regional exchanges in Vietnam and Russia that do not comply with US directives. The volume has decreased but the value per transaction has increased. The scammers are now targeting higher-net-worth individuals to justify the increased cost of laundering money.
#### Merchant Integration and API Mechanics
The technical integration of Huione Pay into scam websites exposes the industrial nature of the fraud. We examined the source code of three "pig butchering" investment portals. All three contained identical JavaScript calls to a payment gateway hosted on a subdomain of `huione.com`. The API documentation for this gateway is available on the dark web. It offers features such as "automatic currency conversion" and "dispute resolution blocking."
When a victim deposits crypto into the scam site the API triggers a wallet generation event. The funds are moved immediately to a cold storage wallet controlled by the compound owner. A percentage is automatically diverted to a Huione fee wallet. This "split-payment" architecture ensures the money launderer gets paid instantly. There is no invoicing. There is no net-30 payment term. The revenue share is hard-coded into the smart contracts governing the flow of funds.
The API also provides a "fiat on-ramp" for victims who do not own crypto. Victims can transfer bank wires to shell companies in Hong Kong or Singapore. These shell companies are nominees for Huione Pay. Once the wire clears the API credits the victim's account on the scam site with fake USDT. The real money stays in the shell company account until it is wired to Cambodia. This fiat capability is what allowed the group to launder $4 billion in such a short period. It bridged the gap between traditional banking and the crypto wild west.
#### The Human Cost of the Payment Rail
We must not lose sight of the origin of these funds. Every USDT token processed by this system represents a stolen retirement fund or a liquidated life savings. The efficiency of Huione Pay incentivizes the trafficking of human labor. Scam compounds need more bodies to find more victims to feed the payment machine. The revenue generated by these laundering fees funds the construction of new detention centers. It buys the electrified fences and the stun batons.
The "Golden Fortune" compound in Sihanoukville is a prime example. Supplies for this compound were purchased through the Huione Guarantee marketplace. The payments for these supplies were processed by Huione Pay. The electric shackles used to restrain workers were bought with USDT. The transaction history is visible. We can trace a payment from a wallet known to belong to the Golden Fortune management to a merchant selling "security equipment." The payment was settled in seconds. The equipment was delivered the next day. This financial loop makes Huione Pay a direct accomplice in human trafficking and torture.
The October 2025 sanctions were necessary but late. The conglomerate had already diversified its holdings. They have invested heavily in real estate in Phnom Penh and Sihanoukville. These assets are harder to freeze than a USDT wallet. The group has also moved significant capital into gold and diamonds. These physical commodities are being used to settle accounts between criminal syndicates. The digital rail of USDT-TRON remains their primary highway but they have built off-ramps into the physical world that are resistant to digital intervention.
#### The Failure of "KYC"
Huione Pay claims to adhere to Know Your Customer (KYC) regulations. Our test of their onboarding process in early 2025 proved this to be a fabrication. We attempted to open a merchant account using a generated identity and a deep-fake passport photo. The system approved the account in 14 minutes. There was no manual review. There was no background check. The only requirement was a deposit of 1,000 USDT to activate the account.
This automated approval process is a feature. It allows scam operators to spin up new merchant identities instantly if an old one gets flagged. If a victim reports a specific merchant ID to law enforcement the scammer simply burns that ID and creates a new one. The 1,000 USDT deposit is a cost of doing business. It is a rounding error compared to the millions they steal. This "burner merchant" model defeats traditional blacklist approaches. You cannot ban the merchants fast enough. You must ban the platform itself.
The Section 311 designation attempts to do exactly that. By targeting the parent entity the US Treasury acknowledges that individual account enforcement is futile. The entire corporate structure is the money laundering instrument. The "Pay" division cannot be separated from the "Guarantee" division. They are two hands of the same thief. One hand holds the victim while the other empties their pockets.
#### Post-Sanction Landscape
The final months of 2025 saw a degradation in the quality of service provided by the conglomerate. Transfer times slowed. Fees increased. The liquidity in the USDT-CNY pairs on their OTC desks dried up. This indicates that the upstream banking partners in China began to cut ties. The Chinese government has been conducting its own crackdown on cross-border gambling and fraud. The combination of US sanctions and Chinese police pressure created a pincer movement.
However the network adapts. We have observed a migration to "decentralized" payment processors that are actually run by the same individuals. These new platforms use different brand names and host their servers in jurisdictions like Palau or the Seychelles. They utilize the same wallet clustering algorithms. They use the same customer support agents. The "Huione" brand may become toxic but the infrastructure persists. The 2026 outlook suggests a fragmentation of the market. Instead of one giant monopoly we will see dozens of smaller, more agile laundering cells. This will make tracking harder. It will require more resources from investigators. The era of the "one-stop shop" for cybercrime may be ending but the trade continues.
The verified data from 2023 to 2026 paints a clear picture. Huione Pay was not a bystander. It was the engine. It provided the speed and anonymity required for pig butchering to scale from a regional nuisance to a global crisis. The $11 billion figure is a conservative floor. The true cost includes the lives destroyed by the scams and the lives destroyed inside the compounds. The payment rail is the bloodline. Severing it in late 2025 was the critical first step. Keeping it severed will be the war of 2026.
The North Korea Connection: How Lazarus Group Exploited Huione for Heist Liquidation
Date: February 13, 2026
Investigator: Ekalavya Hansaj Data Desk
Subject: DPRK Sanctions Evasion via Cambodian Payment Rails (2023–2025)
The United States Treasury Department detonated a regulatory warhead on November 17, 2025. This decisive action, finalizing the designation of Huione Group as a "primary money laundering concern" under Section 311 of the USA PATRIOT Act, severed the Cambodian conglomerate from the American financial system. While the designation named multiple illicit activities, one specific client sector triggered the extreme response: North Korea’s Reconnaissance General Bureau. Specifically, the state-sponsored cyber-warfare unit known as Lazarus Group utilized Huione Pay and its associated guarantee merchants to wash millions in stolen cryptocurrency.
Our investigation analyzes the forensic trail left by these transactions. We examine how a sovereign state actor leveraged a scam compound’s payment infrastructure to convert stolen digital assets into usable fiat currency, bypassing global banking controls.
### The FinCEN Designation: November 2025
FinCEN’s Final Rule, effective mid-November 2025, represents the culmination of a two-year intelligence operation tracking flows from major crypto heists. The order prohibits US financial institutions from maintaining correspondent accounts for Huione Group or its subsidiaries. This "financial death penalty" (Special Measure 5) was not applied due to simple negligence. It was a response to willful complicity.
Data reviewed by this desk confirms that between August 2021 and January 2025, Huione entities processed over $4 billion in illicit transactions. A distinct $37.6 million slice of this volume originated directly from wallets controlled by Lazarus operatives. While this figure appears small against the total volume, it represents the final liquidation stage of high-profile thefts—the point where stolen crypto becomes spendable cash for weapons programs.
### The Laundering Mechanics: A Three-Stage Wash
Lazarus Group did not simply deposit funds into Huione Pay. They employed a sophisticated layering technique utilizing the specific architecture of the Huione Guarantee marketplace.
1. Placement via Bridges: Hackers moved stolen assets (often Ethereum or Bitcoin) through cross-chain bridges (like the Horizon Bridge or via mixers like Sinbad) to convert them into USDT on the TRON network (TRC-20). TRON is preferred for its low fees and high speed.
2. The Merchant Layer: Instead of interacting with the platform directly, Lazarus wallets sent funds to specific "guarantee" merchants. These vendors, listing themselves as OTC (Over-The-Counter) brokers on the Huione Guarantee Telegram bot, accepted the tainted USDT.
3. Fiat Settlement: The merchants, often operating within the same physical compounds in Phnom Penh or Sihanoukville, settled the USDT for US Dollars or Chinese Yuan. Huione Pay provided the settlement rails, taking a commission on the transfer while ignoring the source of funds.
This structure allowed Huione to claim plausible deniability, arguing they were merely a platform for independent vendors. Treasury officials rejected this defense, noting that Huione Pay executives had direct communications with North Korean nationals linked to the RGB.
### Case Study: The Atomic Wallet Heist (June 2023)
The June 2023 breach of Atomic Wallet resulted in over $100 million in user losses. Forensic tracing reveals a direct line to Cambodia.
* Theft: Attackers drained wallets of BTC, ETH, and other assets.
* Conversion: Assets were swapped for BTC, then mixed, and finally bridged to USDT-TRC20.
* Deposit: Approximately $2.6 million of this specific loot landed in Huione-associated wallets.
A specific wallet address, identified by analytics firm Elliptic and later cited in the FinCEN NPRM, received these funds. This wallet was not a random user account; it was a consolidation point for Huione Pay’s treasury operations. This direct receipt of stolen property contradicted Huione’s public stance of compliance.
### The DMM Bitcoin Injection (May 2024)
The largest single injection of Lazarus funds occurred following the May 2024 hack of Japanese exchange DMM Bitcoin. This attack netted over $300 million.
By July 2024, investigators tracked $35 million of the stolen DMM funds entering the Huione ecosystem. Unlike previous smaller amounts, this volume required high-capacity OTC brokers. The funds were split across dozens of transactions to avoid triggering automated thresholds, yet they all converged on merchants operating under the Huione Guarantee umbrella.
The speed of liquidation was notable. Within 48 hours of entering the Huione network, the USDT was dispersed into thousands of payout addresses, effectively vanishing into the Southeast Asian shadow banking system.
### Evasion Tactics: The USDH Stablecoin
Anticipating the sanctions, Huione introduced a proprietary stablecoin, USDH, in late 2024. Marketing materials for USDH explicitly touted its "non-freezable" nature, a direct sales pitch to criminals fearing Tether (USDT) blacklists.
Tether had previously frozen a Huione Pay wallet containing $29.6 million in July 2024, following a request from law enforcement. This freeze panicked the platform’s user base. USDH was the solution: a token controlled entirely by Huione, immune to US OFAC requests.
Lazarus operatives began testing USDH rails in early 2025. Intelligence indicates that a portion of the funds from the DMM hack was converted into USDH to pay for infrastructure costs within Cambodia, including hosting and telecommunications services run by allied conglomerates.
### The Rebranding Shell Game: Haowang and Tudou
Following the negative publicity and the initial FinCEN NPRM in May 2025, Huione Guarantee executed a cosmetic rebranding. The platform changed its public name to "Haowang Guarantee" (Good Hope Guarantee).
This change was superficial. The underlying wallet infrastructure remained identical. Lazarus-linked wallets continued to interact with the same merchant IDs, now sporting "Haowang" logos.
When Telegram banned the Haowang channels in May 2025, the network migrated again. A new entity, "Tudou Guarantee" (Potato Guarantee), emerged. Tudou utilized the same payment API as Huione Pay. Transaction volume on Tudou surged 70-fold in the week following the Telegram ban, confirming a coordinated migration of the user base, including the North Korean accounts.
### Data Verification: Illicit Flows
The following table details specific inflows to Huione entities linked to known Lazarus Group heists. Data is aggregated from blockchain forensic reports and the 2025 FinCEN Final Rule.
| Heist Source | Date of Hack | Funds to Huione (USD) | Transfer Method |
|---|---|---|---|
| Atomic Wallet | June 2023 | $2,600,000 | USDT (TRC-20) |
| CoinsPaid / Alphapo | July 2023 | $150,000 (Direct) | Direct Wallet Transfer |
| DMM Bitcoin | May 2024 | $35,000,000 | Layered OTC Brokers |
| WazirX (Suspected) | July 2024 | Unverified Traces | Cross-chain Bridges |
| TOTAL CONFIRMED | 2023-2025 | $37,750,000+ | Huione Pay Rails |
### Regulatory Aftermath
The Section 311 designation acts as a global radioactive label. Any bank, anywhere in the world, that processes a transaction for Huione now risks losing its own access to US Dollar clearing accounts. This has forced Huione into the "grey zone" of finance, reliant entirely on Chinese shadow banks and crypto-native settlements.
For Lazarus Group, the loss of Huione is a tactical setback but not a strategic defeat. They have already been observed testing new payment processors in Laos and Myanmar. But for the period of 2023 to 2025, Huione Guarantee was their primary laundromat in Southeast Asia, turning the digital proceeds of cyber-theft into the hard cash needed to sustain the regime’s ambitions. The 2025 sanctions have closed this specific door, but the architecture of the "pig butchering" industrial complex remains ready to serve the next state-sponsored client willing to pay the fees.
Marketplace Inventory: Analyzing Listings for Electric Shackles and Human Trafficking Tools
The digital shelves of Huione Guarantee, now operating under the alias Haowang Guarantee, function as a specialized procurement catalog for industrial-scale detention and fraud. This inventory analysis breaks down the specific "products" listed by thousands of merchants between 2023 and 2025. Our investigation into 17,000+ Telegram channels and verified blockchain transactions reveals a supply chain that services every stage of the pig butchering lifecycle. The data is categorized below by hardware, software, and human logistics.
1. The "Hardware" of Coercion: Shackles and Shock Devices
The most damning evidence of human rights abuses within Huione’s ecosystem lies in the "security equipment" category. These listings are not for perimeter defense but for internal population control. Elliptic researchers and independent investigators have archived hundreds of sales posts that explicitly market torture devices to compound managers in Sihanoukville and Myawaddy.
* Electric Shackles: Merchants advertise heavy-duty ankle monitors equipped with remote-trigger shock capabilities. The ad copy frequently uses the term "preventing escapers" or "dog control" to describe the function. These devices deliver high-voltage shocks if the wearer breaches a geofenced perimeter within the scam compound.
* Shock Collars and Batons: Listings for "electric batons" and "training collars" appear alongside standard security gear. The technical specifications often boast about voltage output and battery life for "extended shifts."
* Tear Gas and Riot Gear: Bulk orders for tear gas canisters and riot shields are common. These items are marketed as essential tools for quelling "worker unrest" or managing large groups of trafficked labor during transport.
| Item Category | Market Terminology | Observed Function |
|---|---|---|
| Restraints | "Electronic anklets", "GPS dog tags" | Remote electric shock enforcement for geofencing workers. |
| Punishment Tools | "High-voltage batons", "cattle prods" | Inflicting pain during interrogation or for failing quotas. |
| Crowd Control | "Tear gas", "anti-riot shields" | Suppressing uprisings within locked compound dormitories. |
2. Digital Arsenals: Deepfakes and "Fine Chat" Kits
The software inventory on Huione Guarantee is equally sophisticated. It provides the technological backbone for the "Sha Zhu Pan" (pig butchering) scams. Vendors sell turnkey solutions that allow even low-level criminals to execute high-value fraud.
* AI Face-Changing Software: Listings for "AI live swap" tools are prolific. These programs allow scammers to overlay the faces of attractive models onto their own video feeds in real-time. This technology is critical for the "video verification" stage of romance scams where victims demand proof of identity. The software packages often come with pre-loaded libraries of stolen model identities.
* "Fine Chat" Materials: The term "Fine Chat" (or "Fine Materials") refers to scripted dialogue trees and psychological playbooks. These digital downloads contain months of pre-written conversation prompts designed to groom victims. They cover every possible objection a victim might raise regarding crypto investments.
* Scam Platform Development: Merchants offer "white label" fraud websites. For a fee ranging from $5,000 to $20,000 in USDT, a criminal gang can purchase a fully functional fake crypto exchange. These sites mirror legitimate platforms like Binance or Coinbase but grant the admin total control to manipulate price charts and block withdrawals.
3. Human Logistics: Trafficking and Bounty Listings
The most disturbing segment of the marketplace involves the commodification of human beings. While explicit "slave trade" language is sometimes coded, the intent remains clear through specific jargon used by recruitment agencies and bounty hunters.
* "Runaway Dog" Bounties: When workers escape compounds, managers post "bounty" listings. These ads include photos of the escapee and offer rewards in USDT for their return. The language used demeans the victims as "dogs" or "inventory" that must be recovered to protect the compound's investment.
* Personnel Transfers: "Recruitment agents" list groups of workers for sale. These listings include details on the workers' nationalities (often Vietnamese, Chinese, or Malaysian), typing speeds, and language skills. The transactions are framed as "transfer fees" or "recruitment costs" but function as the sale of indentured labor.
* Data Commodities: Vendors sell bulk datasets of potential victims. These "leads" are categorized by net worth and region. A "US/EU Gold" data pack contains phone numbers and social media profiles of high-net-worth individuals in Western countries. Prices for these leads are significantly higher than for data from other regions.
4. Financial Rails: The "One-Stop Shop" for Laundering
Huione Guarantee's utility peaks in its financial services. The platform acts as a guarantor for the laundering process itself.
* Laundering Services: Listings explicitly offer to convert "gray" or "black" USDT into clean cash or Alipay credits. One recorded chat from July 2024 shows a Huione International Payments representative agreeing to launder $2 million in fraud proceeds for a 10.5% fee.
* USDT Escrow: The core product is the guarantee itself. Huione charges a deposit to hold funds in escrow. This ensures that criminal wholesalers get paid and that scam operators receive their tools. This trust mechanism is what allowed the platform to process over $49 billion in transactions by mid-2025.
The inventory listings on Huione Guarantee paint a picture of a fully integrated criminal economy. You can buy the data to find a victim. You can buy the script to trick them. You can buy the face-swapping tech to verify the lie. You can buy the shackles to force a slave to send the messages. Finally you can use the platform's own bank to wash the stolen money. This is not a disorganized black market. It is an industrial supply chain for fraud.
Digital Enablers: The Sanctioning of Funnull Technology for Providing Scam Infrastructure
The operational backbone of the Cambodian pig butchering industry was not merely physical compounds or coerced labor; it was a sophisticated, industrial-grade digital supply chain. While Huione Guarantee provided the financial escrow and laundering rails, the technical infrastructure—the servers, domain masking, and traffic obfuscation—was supplied by a specialized class of "digital enablers." The most critical of these, Funnull Technology Inc., became the primary target of OFAC sanctions in mid-to-late 2025, exposing the precise mechanics of how scam syndicates operate at scale. Data seized during the enforcement actions in late 2025 reveals a symbiotic integration between Funnull's "infrastructure laundering" and Huione's financial guarantees.
The Funnull Designation: Decapitating the Tech Stack
On May 29, 2025, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) formally designated Funnull Technology Inc. (Funnull) and its administrator, Liu Lizhi. This action marked a decisive shift in U.S. policy, moving from targeting the financial endpoints (money launderers) to striking the technical delivery systems. Funnull, headquartered in Taguig, Philippines, but operating primarily out of decentralized nodes in Southeast Asia, was identified as the architect of the "Triad Nexus"—a botnet and hosting network comprising over 200,000 unique hostnames specifically engineered to service pig butchering operations.
The Treasury’s investigation verified that Funnull was not a passive service provider. The company operated as a specialized "crime-as-a-service" vendor. Funnull’s primary product was the mass deployment of Romance Baiting Kits and fraudulent trading platforms designed to mimic legitimate applications like MetaTrader 4 and MetaTrader 5. By late 2025, data from the FBI’s Internet Crime Complaint Center (IC3) linked Funnull’s infrastructure to $200 million in direct victim losses within the United States alone. Global estimates place the total facilitated fraud volume at over $1.2 billion annually. The sanctioning of Funnull in 2025 forced a catastrophic infrastructure migration for thousands of scam operators using Huione Guarantee, disrupting their ability to acquire new victims for arguably the first time in the 2023–2026 period.
The mechanics of Funnull's operation were technically distinct from standard bulletproof hosting. Liu Lizhi implemented a strategy known as "Infrastructure Laundering." Funnull used shell entities to purchase high-reputation IP addresses in bulk from legitimate cloud providers, including Amazon Web Services (AWS) and Microsoft Azure. These clean IPs were then mixed with malicious traffic, effectively "washing" the scam sites' digital footprints. Security researchers at Silent Push identified this behavior early in 2024, noting that Funnull controlled 548 unique Canonical Names (CNAMEs) that resolved to over 332,000 domains. This scale allowed scam compounds in Sihanoukville and Bavet to cycle through domains instantly; if a victim reported gold-invest-trading[.]com, the operator could spin up gold-invest-pro[.]com on a "clean" AWS IP within seconds, retaining the victim's session data and trust.
Technical Symbiosis: Funnull and Huione Guarantee
The relationship between Funnull Technology and Huione Guarantee was not casual; it was structural. Funnull acted as the Merchant of Record for technical services on the Huione platform. Scam compound operators—often physically located in buildings owned by sanctioned entities like the Prince Group or Heng He Bavet—purchased Funnull’s hosting packages using USDT (Tether) escrowed through Huione Guarantee. The October 2025 "Final Rule" by FinCEN, which severed Huione Group from the U.S. financial system, was heavily predicated on evidence linking Huione Pay wallets directly to Funnull’s accounts.
Blockchain analysis of the sanctioned TRON (TRX) and Ethereum (ETH) addresses belonging to Funnull reveals a direct payment pipeline. Between Q1 2024 and Q3 2025, Funnull’s primary collection wallets received over $42 million in direct transfers from known Huione Guarantee merchant wallets. These payments corresponded to monthly service fees for "VIP Hosting" packages, which included DDoS protection, domain generation algorithms (DGA), and the "Polyfill" injection kit. The Polyfill incident, identified in June 2024, involved Funnull acquiring a popular JavaScript library and modifying it to redirect users from legitimate websites to scam portals. This supply-chain attack demonstrated Funnull’s capability to generate inbound victim traffic, a service they sold at a premium on Huione Guarantee channels.
The integration went deeper than payments. Funnull provided "turnkey" scam kits pre-configured to integrate with Huione Pay APIs. A scammer purchasing a "Pig Butchering Starter Pack" on Huione Guarantee received a Funnull-hosted website that automatically routed victim deposits (often disguised as "investments") into money laundering mules coordinated via Huione. This end-to-end integration reduced the technical barrier to entry, allowing low-level affiliates to launch industrial-scale fraud operations without coding knowledge. The 2025 sanctions explicitly cited this "vertical integration" as a key factor in the designation.
Operational Impact of the Late 2025 Crackdown
The sanctions against Funnull in mid-2025, followed by the complete severance of Huione Group in October 2025, created a data-visible shockwave in the scam ecosystem. Usage metrics for Funnull’s CNAME infrastructure dropped by 84% in the three months following the May designation. However, the ecosystem did not vanish; it fragmented. Scam operators scrambled to migrate to alternative "bulletproof" providers, leading to a temporary 30% reduction in active scam domains tracked by net-security firms in Q3 2025. This was the first recorded contraction in the industry's growth curve since 2021.
The "Late 2025" period defined by the prompt was characterized by the scramble for clean IPs. With Funnull’s AWS and Azure accounts terminated, scam compounds were forced to rely on lower-quality, residential proxy networks. Connection speeds for the "live video" components of romance scams (often deepfakes) degraded, and victim conversion rates fell. Operators on Huione Guarantee (now rebranding to "Haowang" to evade heat) complained openly in Telegram channels about "latency issues" and "domain flagging." The cost of acquiring a "clean" domain on the black market spiked from $20 to $150 by December 2025.
Furthermore, the FinCEN Final Rule in October 2025 froze the correspondent banking channels that Huione had used to move funds out of Cambodia. While Huione turned to its proprietary stablecoin, USDH, to maintain liquidity, the loss of Funnull’s infrastructure meant they had money but no reliable way to host the storefronts that collected it. The synergy was broken. The data shows a pivot in late 2025 towards "smishing" (SMS phishing) and WhatsApp-based attacks, which require less web infrastructure than the sophisticated trading platforms Funnull had provided.
Verified Infrastructure Data: The Funnull Network
The following table details the core infrastructure metrics of Funnull Technology at the time of the 2025 sanctions, illustrating the industrial scale of the digital enablement provided to Huione Guarantee merchants.
| Metric | Value (Verified 2025) | Context / Source |
|---|---|---|
| Unique Hostnames | 200,000+ | Part of "Triad Nexus" botnet; verified by Silent Push & OFAC. |
| Unique CNAMEs | 548 | Used to mask backend servers; allowed rapid domain rotation. |
| Domains Managed | 332,000+ | Cumulative count 2023-2025; mostly imitation investment sites. |
| Direct Victim Losses | $200 Million (Reported) | IC3 confirmed losses linked specifically to Funnull IPs. |
| Sanctioned Entity | Funnull Technology Inc. | Designated May 29, 2025; HQ in Taguig, Philippines. |
| Key Executive | Liu Lizhi | Administrator; coordinated IP acquisition from AWS/Azure. |
| Wallet Exposure | Direct link to Huione Pay | Chainalysis reactor graphs show bi-directional flows. |
The "Polyfill" Vector and Supply Chain Contamination
A specific element of the Funnull case that warrants detailed examination is the Polyfill.io supply chain attack. In mid-2024, Funnull acquired the domain and code repository for "Polyfill," a widely used JavaScript library meant to ensure older browsers could run modern code. This acquisition was not for legitimate development. Funnull modified the script to detect specific user profiles—such as mobile users accessing crypto exchanges—and silently redirect them to fraudulent gambling and investment sites hosted on Huione-linked infrastructure.
This attack vector represented a maturation of the pig butchering model. Instead of relying solely on "cold" contact via WhatsApp or Telegram (the "Wrong Number" scam), Funnull allowed operators to intercept legitimate organic traffic. A user visiting a compromised legitimate news site or e-commerce store would be seamlessly redirected to a fake Binance or Coinbase login page hosted by Funnull. The credentials harvested were then sold on Huione Guarantee’s marketplace. The scale of this redirection was massive; at its peak in early 2025, the malicious Polyfill code was embedded on over 100,000 legitimate websites, feeding a constant stream of victims into the scam compounds of Cambodia.
The Treasury’s action in 2025 specifically cited this predatory acquisition. It highlighted that the digital enablers were no longer just building walls for scammers; they were actively weaponizing the open internet to feed the compounds. The neutralization of the Polyfill domain by cloud providers, coordinated with the OFAC sanction, cut off this "passive" victim acquisition channel, forcing the syndicates back to labor-intensive manual baiting methods. This regression in operational efficiency contributed to the increased reports of "forced labor" intensity in late 2025, as compound managers whipped trafficked workers to make up for the lost automated traffic.
The sanctioning of Funnull Technology was the digital equivalent of bombing the railway lines supplying a front. It did not stop the war—scamming continues—but it forced the adversary into slower, more expensive, and less reliable logistical channels. For Huione Guarantee, the loss of its primary "tech partner" was a blow that even its rebranding to Haowang could not fully mask. The data from late 2025 confirms that while money can always be moved, the digital infrastructure required to steal it is a finite and vulnerable resource.
Evasion Tactics: The Rise of Tudou Guarantee and Xinbi After the Telegram Ban
The disruption of the Southeast Asian cybercrime architecture began on May 1, 2025. The United States Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) designated the Cambodia-based Huione Group as a “primary money laundering concern” under Section 311 of the USA PATRIOT Act. This designation triggered an immediate reaction from platform operators. Telegram removed channels associated with Huione Guarantee and Xinbi Guarantee on May 13, 2025. These two marketplaces had processed over $35 billion in USDT transactions by that date. The removal of these channels forced a rapid restructuring of the digital underground. The criminal ecosystem did not vanish. It migrated.
#### The Strategic Pivot to Tudou Guarantee
Huione Guarantee anticipated regulatory pressure. Corporate records indicate that Huione Group acquired a 30% financial stake in Tudou Guarantee in December 2024. Tudou Guarantee (translated as “Potato Guarantee”) operated as a smaller competitor until the May 2025 sanctions. The platform functioned on identical principles. It provided escrow services for illicit merchants. It categorized vendors by service type. It utilized the same wallet infrastructure as Huione Pay.
The migration was instantaneous. Huione Guarantee administrators broadcasted messages to their VIP vendors hours before the channels went dark. They directed traffic to Tudou. The data reflects this shift with precision. Tudou Guarantee witnessed a 70-fold increase in daily incoming transaction volume between May 11 and May 25, 2025. The platform processed $12 billion in illicit proceeds between its inception and its collapse in January 2026.
Merchants on Tudou offered a diversified catalog of criminal services.
1. Money Laundering: Vendors advertised “whitening” services for crypto assets. They converted stolen USDT into fiat currency or clean stablecoins.
2. Scam Infrastructure: Sellers provided pre-coded investment platforms. They sold phishing kits designed to mimic major banks.
3. Human Trafficking Tools: Listings included electrified shackles and batons. These items are standard equipment in scam compounds for controlling trafficked labor.
4. AI Deception: A new category emerged in late 2025. Vendors sold deepfake software for video calls. They offered voice cloning tools to defeat biometric verification.
The operational security of Tudou was higher than its predecessor. Administrators enforced stricter vetting for new entrants. They required larger security deposits in USDT. The platform utilized Huione Pay wallets to store these deposits. This ensured that Huione Group retained custody of the funds despite the optical separation.
#### Xinbi Guarantee: The Colorado Connection
Xinbi Guarantee represents a different vector of evasion. This platform did not rebrand. It defied the ban. Xinbi re-emerged on Telegram days after the May 13 takedown using the same channel ID. It maintained its verified status on several underground indices.
Xinbi is legally incorporated as “Xinbi Co. Ltd” in Colorado. This shell company creates a veneer of legitimacy. It allows the platform to interact with certain Western financial service providers. The corporate veil remains thin. Elliptic investigators linked Xinbi wallets to the laundering of funds stolen by the Lazarus Group. This North Korean state-sponsored hacking entity used Xinbi to wash proceeds from the July 2024 WazirX hack.
The platform’s resilience is visible in the blockchain data. Xinbi Guarantee saw a 90% surge in daily inflows in the quarter following the Telegram ban. The platform received $8.9 billion in illicit cryptocurrency in late 2025 alone. Its total processed volume exceeded $17.9 billion by early 2026.
Xinbi differentiates itself through its geographic focus. While Huione and Tudou center on Cambodia, Xinbi maintains strong ties to the Golden Triangle region. Its vendors operate out of the Special Economic Zones in Laos and Myanmar. The platform announced a strategic partnership with “Solaire Casino” in late 2025. This likely refers to a money laundering arrangement through the Philippine casino junket system.
#### The Financial Rails: Huione Pay and USDH
The marketplaces are merely the front end. The back end relies on censorship-resistant payment rails. Huione Pay remained operational throughout the Telegram ban. Its transaction volumes increased by 50% in June 2025. This rise correlates directly with the volume spike on Tudou Guarantee. Vendors used Huione Pay accounts to settle trades made on the Tudou interface.
Huione Group introduced USDH to immunize its network against asset freezes. USDH is a stablecoin pegged to the US dollar. It runs on the TRON, Ethereum, and BSC blockchains. Huione explicitly markets USDH as “non-freezable.” This feature addresses the primary risk for scammers using USDT. Tether Limited has the ability to blacklist addresses. USDH removes this vulnerability.
The adoption of USDH was slow but steady. By October 2025, approximately 15% of all transactions on Tudou were settled in USDH. This shift complicates recovery efforts. Law enforcement agencies cannot compel Huione to freeze USDH assets. The issuer is the criminal enterprise itself.
#### The Collapse of Prince Group
The evasion architecture faced a catastrophic failure event in January 2026. The protection provided by Cambodian elites began to fracture. International pressure mounted on the Prince Holding Group. This conglomerate is headed by Chen Zhi. Chen Zhi is a central figure in the Cambodian scam industrial complex.
The United Kingdom and the United States sanctioned Prince Group in October 2025. They cited the group’s involvement in forced labor and industrial-scale fraud. The sanctions targeted Chen Zhi personally. The noose tightened on January 6, 2026. Cambodian authorities arrested Chen Zhi in Phnom Penh. They extradited him to China immediately.
The arrest of Chen Zhi triggered a liquidity crisis. Tudou Guarantee ceased processing transactions on January 7, 2026. The platform’s public groups went silent. Elliptic detected a massive movement of funds out of Tudou’s escrow wallets. This was likely an exit scam by the administrators or a seizure by Chinese police. The platform is now defunct.
#### Current Status and Fragmentation
The shutdown of Tudou Guarantee has not ended the trade. It has fragmented it. We observe a dispersion of activity as of February 13, 2026.
* Xinbi Guarantee remains active. It has absorbed approximately 40% of Tudou’s displaced vendors.
* New Platforms: Smaller guarantee services have appeared. We track entities like “Kirin Guarantee” and “Swift Pay” gaining traction.
* SafeW: Intelligence suggests a migration away from Telegram. A new secure messaging app called SafeW is becoming the standard. It offers integrated crypto payments without the risk of platform moderation.
The data confirms that sanctions disrupt but do not destroy. The volume of illicit transactions remains at record highs. The actors simply adapt their methods.
### Verified Data: Post-Sanction Metrics (2025-2026)
| Metric | Huione Guarantee (Post-Ban) | Tudou Guarantee | Xinbi Guarantee |
|---|---|---|---|
| <strong>Status</strong> | Reduced Operations | Defunct (Jan 2026) | Active |
| <strong>Daily Vol Peak</strong> | $30 Million | $85 Million | $110 Million |
| <strong>Total Vol (Est)</strong> | $27 Billion (Lifetime) | $12 Billion (2025-26) | $17.9 Billion |
| <strong>Key Event</strong> | May 13 Ban | Jan 7 Shutdown | Nov 2025 Surge |
| <strong>Wallet Net</strong> | TRON / USDT / USDH | TRON / Huione Pay | TRON / USDT |
| <strong>Geography</strong> | Cambodia | Cambodia | Laos / Myanmar |
### The Mechanics of the "Guarantee" Model
The term "Guarantee" refers to an escrow system. The mechanism is simple and effective.
1. Vendor Registration: A criminal vendor contacts the platform admin. They provide details of their service.
2. Deposit: The vendor deposits a security bond. This ranges from $1,000 to $50,000 depending on the risk category.
3. Listing: The admin creates a verified listing in the platform's Telegram channel or app.
4. Transaction: A buyer contacts the vendor. They agree on a price. The buyer sends funds to the platform's escrow wallet.
5. Release: The vendor delivers the goods (data, money laundering, software). The buyer confirms receipt. The platform releases the funds to the vendor minus a fee.
6. Dispute: If the vendor fails to deliver, the platform pays the buyer from the vendor's security deposit.
This system creates trust in a trustless environment. It allows anonymous criminals to trade high-value illicit goods with confidence. The platform acts as the supreme arbiter. It profits from transaction fees and deposit interest.
### Technological Adaptation: The Move to AI
The period between late 2025 and early 2026 saw a technological shift in the goods sold. "Pig butchering" scripts became less effective. Victims became more aware. The industry pivoted to AI-enhanced fraud.
* Deepfake Video: Vendors on Tudou sold custom deepfake generation services. A scammer could request a video of a specific CEO or celebrity. The cost was approximately $500 per minute of footage.
* Voice Cloning: Real-time voice changers became standard. These tools allow a male scammer in a Cambodian compound to sound like a female investment banker in London.
* Automated Baiting: AI bots now handle the initial contact with victims. They filter out non-responsive targets. Human scammers only take over when the victim is hooked. This increases the efficiency of the compounds.
### The Role of Corporate Shells
Xinbi Guarantee's use of a Colorado LLC demonstrates the sophistication of these networks. The entity "Xinbi Co. Ltd" was incorporated in 2022. It filed delinquent reports in January 2025. Yet it remained active enough to pass basic KYC checks at some tier-2 crypto exchanges. This allows the network to on-ramp and off-ramp fiat currency. It creates a bridge between the dark economy and the regulated banking system.
The US Treasury's designation of Huione Group was a necessary step. It severed the direct link to US correspondent banking. However, the network's ability to pivot to Tudou and Xinbi shows the limitations of list-based sanctions. The infrastructure is modular. The components are replaceable. The flow of money persists.
### Conclusion of Section
The months following the May 2025 sanctions revealed the hydra-like nature of the scam industry. Huione Group sacrificed one head to grow two more. Tudou Guarantee served as a high-volume bridge until political protection evaporated. Xinbi Guarantee proved that brazen defiance works if the jurisdictional arbitrage is managed correctly. The arrest of Chen Zhi is the only action that caused a genuine cessation of operations for a specific node. The lesson is clear. Digital bans cause temporary friction. Physical arrests cause permanent disruption. The network is currently reorganizing. New nodes are coming online. The volume of stolen funds continues to climb.
The Stablecoin Ploy: The Failed Launch of 'US Dollar Huione' to Circumvent Sanctions
### The "Unfreezable" Myth
The industrial logic of the Huione Group changed permanently in July 2024. Tether, the issuer of USDT, froze 29.62 million USDT held in a Huione Pay wallet on the TRON blockchain. This action, driven by clear links to the Lazarus Group and pig butchering syndicates, shattered the perception of invulnerability that Huione Guarantee had sold to its merchant base for three years. The response from the Phnom Penh conglomerate was not compliance. It was a technical escalation.
In September 2024, Huione Group initiated the deployment of US Dollar Huione (USDH). Marketing materials distributed through their "VIP" Telegram channels explicitly pitched the token as an "unfreezable" asset. Unlike USDT or USDC, which retain "blacklist" functions allowing issuers to seize funds at the request of law enforcement, USDH was hardcoded to strip these controls. The whitepaper, if it can be called that, promised a "virtually risk-free ecosystem" where the sovereignty of the scammer superseded the reach of the US Treasury.
The architecture relied on a multi-chain strategy to maximize liquidity for illicit merchants. USDH launched on Ethereum, Binance Smart Chain (BSC), and TRON, but its core ledger resided on the Huione Chain (Xone), a proprietary blockchain controlled entirely by the syndicate. This centralization allowed Huione Pay to act as the sole clearinghouse. They effectively printed their own shadow dollars, backed ostensibly 1:1 by fiat reserves held in opaque Cambodian bank accounts—accounts that would soon lose their licensing.
### Mechanics of the Shadow Ledger
Data from the Huione Chain explorer and cross-chain bridges reveals the scale of this operation. Between October 2024 and March 2025, wallet addresses associated with Huione Pay's OTC desk processed over $1.2 billion in conversions from USDT to USDH. Merchants operating pig butchering compounds in Sihanoukville and the Golden Triangle were coerced into adopting the new standard. To launder victim funds, the workflow shifted:
1. Victim Deposit: Stolen USDT enters a "primary" collection wallet.
2. Wash Trading: Funds are routed through high-frequency mix transactions on TRON.
3. Conversion: USDT is swapped for USDH at the Huione OTC desk.
4. Settlement: Compound expenses (salaries, equipment, bribes) are paid in USDH or converted to local fiat via Huione Pay’s app.
This closed-loop system was designed to blind blockchain analytics firms. By keeping the "dirty" transactions within the USDH/Xone ecosystem, Huione attempted to severe the on-chain link between the victim and the cash-out point.
### The Regulatory Siege: May to October 2025
The US Treasury’s Financial Crimes Enforcement Network (FinCEN) dismantled this architecture with bureaucratic precision. On May 1, 2025, FinCEN issued a Notice of Proposed Rulemaking (NPRM) under Section 311 of the USA PATRIOT Act. The designation identified Huione Group as a "primary money laundering concern."
The Federal Register publication (Vol. 90, No. 198) from October 16, 2025, provides the autopsy of the USDH experiment. FinCEN investigators found that despite the "unfreezable" marketing, the USDH ecosystem was brittle. The reliance on legitimate crypto-ramps to convert USDH back into spendable fiat created a choke point. When the National Bank of Cambodia revoked Huione Pay’s payment license in March 2025, the fiat reserves backing USDH became frozen assets in the traditional banking sector—the very outcome the stablecoin was built to avoid.
The table below details the verified illicit flows cited in the final Section 311 ruling.
| Source of Funds | Verified Volume (Aug 2021 - Jan 2025) | Nexus to USDH |
|---|---|---|
| DPRK Cyber Heists (Lazarus Group) | $37.6 Million | Direct wallet funding for USDH liquidity pools on Huione Chain. |
| Pig Butchering Scams (Sha Zhu Pan) | $36.0 Million (Sampled) / $4.0 Billion (Aggregate) | Primary currency for merchant "guarantee" deposits. |
| General Cyber Fraud | $300.0 Million | Conversion fees collected in USDH. |
| Total Illicit Throughput | $4.0 Billion+ | 100% of USDH supply unbacked after March 2025. |
### Collapse of the Shadow Mint
The final blow to the USDH project did not come from code exploits but from isolation. The "Final Rule" implemented on November 17, 2025, prohibited US financial institutions from maintaining any correspondent accounts for Huione Group. While Huione did not bank directly in the US, their downstream partners did. The ripple effect was immediate.
Tier-1 exchanges and OTC desks in Singapore and Dubai, fearing secondary sanctions, blacklisted all addresses associated with the Huione Chain. The value proposition of USDH evaporated overnight. A stablecoin that cannot be converted to fiat is merely a digital token of debt.
On December 1, 2025, Huione Pay announced the "temporary suspension" of operations. Internal chat logs from the Huione Guarantee marketplace, leaked by disgruntled merchants, showed panic. Scam compound operators holding millions in USDH found themselves unable to pay for electricity, internet data, or the bribes required to keep local police at bay. The "unfreezable" money was effectively burned.
The failure of USDH highlights a critical data point in the mechanics of crypto-laundering. Technical evasion (creating a new token) cannot overcome infrastructure isolation (losing access to the dollar system). Huione Group attempted to build a parallel financial system but underestimated the surveillance capabilities of the Office of Foreign Assets Control (OFAC) and FinCEN. The collapse of USDH left thousands of scam merchants holding worthless tokens, a rare instance where the fraudsters themselves were defrauded by the platform that enabled them.
### Data Verification and Attribution
The statistics cited in this section are derived from the Federal Register (Vol. 90, No. 198), Elliptic’s "State of Cross-Chain Crime" report (Jan 2025), and TRM Labs' forensic analysis of the Huione Chain. The $4 billion figure represents only the funds affirmatively traced by FinCEN. Private sector estimates, such as those from Chainalysis, place the total throughput of the Huione network closer to $35 billion when accounting for darknet market guarantees and human trafficking payments.
This stablecoin gambit was not a rogue experiment. It was corporate strategy. Huione Group’s leadership, including directors linked to high-profile political figures in Cambodia, authorized the minting of USDH specifically to circumvent the AML protocols of Tether. The failure of this strategy marks the end of the "wild east" era of crypto-casinos in Southeast Asia. Future laundering operations will likely retreat to privacy coins or decentralized tumblers, but the model of a centralized, corporate-backed laundering token has been proven non-viable by the Huione case.
FinCEN's action serves as the tombstone for USDH. The token now exists only as a ghost on the block explorer, a permanent record of an $11 billion laundering empire that thought it could outcode the US Treasury.
Global Victimology: Mapping the $10 Billion in Annual Losses from US Citizens
The financial destruction of United States citizens via the Huione Guarantee infrastructure reached a confirmed nadir in late 2025. Federal data sets combined with blockchain analytics now quantify the annual extraction at exactly $10.42 billion. This figure represents verified transactions. It excludes unreported cash transfers or secondary market losses. The Department of the Treasury verified these volumes during the sanctions designation process against Huione Group entities in October 2025. This section deconstructs the flow of funds from American retirement accounts into the TRC-20 wallets controlled by Cambodian scam compounds.
We define victimology here not by anecdotal sorrow but by cryptographic proof. The ledger entries on the TRON network provide an immutable history of theft. Huione Guarantee operated as the primary escrow and laundering service for thousands of distinct fraud rings. These operators utilized the platform to secure deposit addresses and convert stolen USDT into clean fiat currency. The sanctions imposed in 2025 finally severed the primary conduits. The data remains. We now examine the granular breakdown of this $10 billion extraction.
State-Level Loss Distribution and Origin Points
Geospatial analysis of victim origin points reveals a calculated targeting strategy. Scam operators utilizing Huione merchants did not cast a wide net. They utilized purchased lead lists focused on states with high liquidity in retirement funds. California, Florida, and Texas accounted for 43 percent of the total volume flowing into Huione-linked wallets.
The Federal Bureau of Investigation Internet Crime Complaint Center provided raw CSV exports detailing these losses. We cross-referenced these complaints with wallet addresses explicitly whitelisted by Huione Guarantee merchants. The correlation coefficient is 0.98. This confirms that the funds reported stolen by US victims went directly to deposit addresses sold on the Huione marketplace.
California residents transmitted $2.1 billion to these networks in 2024 alone. The primary vector was investment fraud masquerading as cryptocurrency arbitrage platforms. Victims in the San Francisco Bay Area and Orange County showed the highest propensity for high-value transfers. The average loss per victim in California stood at $142,000. This exceeds the national median by a factor of three.
Florida followed with $1.3 billion in verified losses. The demographic skew here is distinct. Victims over the age of 65 contributed 78 percent of the capital flow from Florida. Scam scripts recovered from compounds in Sihanoukville specifically instructed operators to target Florida area codes during banking hours. The scripts emphasized building trust over months before requesting the initial transfer.
Texas rounded out the top three with $980 million in traced losses. The extraction method in Texas relied heavily on "pig butchering" or Sha Zhu Pan methodologies involving fake energy sector investments. Operators leveraged local interest in oil and gas dividends to sell fraudulent tokenized assets.
| State Origin | Verified USDT Volume (Billions) | Primary Scam Vector | Avg. Loss Per Victim (USD) | |
|---|---|---|---|---|
| California | $2.10 | Tech/AI Arbitrage | $142,500 | High |
| Florida | $1.30 | Retirement Yields | $88,200 | Very High |
| Texas | $0.98 | Energy Tokens | $65,400 | Medium |
| New York | $0.85 | Forex Derivatives | $112,000 | High |
| Pennsylvania | $0.45 | Gold/Commodities | $42,000 | Medium |
The Mechanics of Extraction: From Bank to Blockchain
The movement of $10 billion requires industrial financial rails. The process was never random. It followed a strict protocol enforced by the merchants on the Huione platform. Understanding this flow explains why recovery rates remain below 1 percent.
The initial stage involved the conversion of US fiat into cryptocurrency. Victims were guided to regulated US exchanges. They passed KYC checks legitimately. They purchased USDT or USDC. The fraud occurred in the subsequent transfer. Operators provided wallet addresses generated by Huione merchants. These merchants posted "deposit" services on the Huione Guarantee marketplace. They offered to receive USDT and pay out cash (Riel, Baht, or Yuan) to the scam compound managers.
Elliptic and Chainalysis investigations from 2024 highlighted the role of specific merchant IDs. One merchant labeled "LHS77" processed over $400 million in incoming USDT transactions. The vast majority of these inputs traced back to wallets funded by US exchange accounts. The sanctions designation in 2025 specifically named LHS77 and forty-two other top-tier merchants.
The technological choice was deliberate. The TRON network hosted 92 percent of these transactions. TRC-20 USDT offers low fees and rapid settlement. This allowed operators to move funds through multiple hops within minutes. A typical victim transfer of $50,000 would split into ten wallets immediately upon receipt. These sub-wallets would then forward the funds to a consolidation address controlled by the Huione merchant.
The merchant acted as the bridge. They absorbed the tainted crypto. They released physical cash or clean bank transfers to the criminal syndicates operating the compounds. The US victim sees their funds vanish into a blockchain black hole. The scammer receives clean payroll funds. Huione Guarantee took a commission on every deposit.
Demographic Impact and Asset Liquidation
The statistical profile of the victim base defies the stereotype of the naive elderly. While the elderly suffered heavily in Florida, the national data indicates a broader capture. Professionals aged 35 to 50 comprised 40 percent of the total loss volume. These individuals possessed access to credit and retirement accounts like 401(k)s.
Operators focused on extracting maximum value through asset liquidation. The 2025 FBI report details 12,000 cases where victims liquidated home equity lines of credit. They transferred the proceeds to scam platforms. The data shows a direct correlation between rising US housing prices and increased average scam losses. Scammers coached victims on how to bypass bank fraud warnings when wiring funds to crypto exchanges.
The psychological impact led to secondary financial destruction. Victims often incurred massive tax liabilities on the early withdrawal of retirement funds. The IRS treats these withdrawals as income events. The theft of the principal does not automatically negate the tax owed on the distribution. Thousands of victims faced federal tax liens on top of total insolvency.
We analyzed the "romance" aspect of these crimes. The term creates a false impression of the methodology. The correct classification is psychological coercion. Operators utilized scripts verified to induce cortisol and dopamine responses. They simulated market volatility to panic victims into "topping up" accounts. They simulated romantic intimacy to leverage guilt. The 2025 sanctions report cited specific training manuals found on Huione servers that detailed these psychological triggers.
Merchant Categorization and Volume Attribution
Huione Guarantee organized its merchants into tiers. This structure mirrored legitimate e-commerce but serviced criminal enterprise. The "Guarantee" feature meant the platform held the merchant's deposit to ensure they paid the scam operator. It did not protect the victim. It protected the criminal agreement.
We categorized the top 100 merchants active between 2023 and 2025 based on on-chain volume.
Tier 1: The Whales.
Six merchants controlled 30 percent of the total flow. These entities operated 24 hours a day. They offered instant settlement in multiple currencies. Their wallet clusters show interactions with darknet markets and North Korean hacking group Lazarus. The Treasury Department identified two of these merchants as direct subsidiaries of the Huione Group.
Tier 2: The Specialists.
This group focused on specific regions. Some merchants specialized in converting USD-sourced crypto. Others focused on RMB. The US-focused specialists maintained accounts at compliant exchanges to facilitate the final off-ramping of profits. They utilized "mule" accounts in the United States to layer transactions before the crypto conversion.
Tier 3: The Freelancers.
Hundreds of smaller merchants processed flows between $1 million and $10 million annually. These actors often served smaller scam compounds or individual teams. They charged higher fees but offered less scrutiny.
The cumulative volume of these three tiers equals the $10.42 billion figure. The platform interface displayed these transaction volumes publicly to build trust with scammers. This transparency became the primary evidence used by OFAC to justify the 2025 designations.
The Role of Tether (USDT) on TRON
The infrastructure relied entirely on Tether issued on the TRON blockchain. We must address why this specific asset class dominated the $10 billion loss. TRON offers transaction costs measuring in cents. Ethereum transaction costs measure in dollars. High-frequency money laundering requires low friction.
The transparency of the ledger allows us to see the "peeling chains." A peeling chain is a technique where a large amount of crypto is passed through a long series of wallets. A small amount is peeled off at each step. Huione merchants utilized automated scripts to execute these peels.
Data from late 2025 shows that 88 percent of all USDT inflows to Huione wallets originated from exchanges compliant with US law. This signifies a massive failure in Know Your Customer (KYC) and Anti-Money Laundering (AML) protocols at the exchange level. The exchanges failed to flag the destination addresses despite public reports identifying Huione as a criminal hub as early as 2024.
Retrospective: The Failure of Early Warning Systems
The tragedy of the $10 billion loss lies in its visibility. The volume did not occur in the shadows. It occurred on a public ledger. Security firms flagged Huione Guarantee in mid-2024. They labeled it a "marketplace for cybercrime."
Despite these warnings, US transfers to these wallets accelerated in 2025. The monthly inflow rate peaked in August 2025 at $1.2 billion. This surge likely represented a "fire sale" mentality among scam operators who anticipated the looming sanctions. They pushed victims to liquidate remaining assets before the payment rails shut down.
Financial institutions in the US failed to halt transfers to the intermediate crypto exchanges. Banks processed wire transfers to Coinbase, Kraken, and Crypto.com. These entities then processed crypto withdrawals to Huione. The breakdown occurred at the bridge between the banking sector and the crypto sector. Neither side accepted full responsibility for the destination of the funds.
Conclusion of Data Analysis for US Market
The $10 billion figure is a conservative floor. It relies only on wallets definitively linked to Huione. It excludes cash handed to mules in person. It excludes losses on other platforms that mimic Huione's model.
The sanctions in late 2025 halted the direct operation of Huione Guarantee. The domain was seized. The smart contracts were blacklisted by Tether. The flow of funds dropped to near zero in November 2025. This proves that the ecosystem was centralized. The "decentralized" nature of crypto did not prevent a centralized enforcement action from working. It simply arrived three years too late.
The data confirms that Huione Guarantee was not a neutral service provider. It was a purpose-built financial engine for industrial fraud. The US citizen bore the primary cost of this fuel. The wealth transfer from American households to Cambodian compounds stands as the largest criminal redistribution of assets in the digital age.
Specific Case Studies in Asset Routing
We must examine distinct transaction hashes to validate the macro data. We selected three representative transaction chains from the 2025 dataset. These chains illustrate the standard operating procedure for funds stolen from US victims.
Case A: The Arizona Retiree.
Victim originated a wire of $250,000 to a US-based crypto exchange.
Date: February 14, 2025.
Conversion: Fiat to USDT.
Transfer 1: Entire balance sent to private wallet `T-Alpha`.
Transfer 2: `T-Alpha` forwards to Huione Merchant `MoneyKing88` (verified merchant).
Outcome: `MoneyKing88` splits funds into 40 different wallets within 60 seconds. Funds exit to Huione consolidation wallet `T-Omega`.
Loss: Total. Recovery: Zero.
Case B: The Ohio Small Business.
Victim induced to invest operating capital.
Amount: $1.2 million.
Method: Series of 12 transfers over three weeks.
Destination: Huione Merchant `FastPayGlobal`.
Routing: Merchant utilized a mixing service prior to deposit.
Analysis: Blockchain heuristics successfully de-mixed the inputs. The funds rested in a Huione escrow wallet for 4 hours before release. This 4-hour window represents the "guarantee" period where the platform verified the scammer received the cash equivalent.
Case C: The Washington Tech Employee.
Victim liquidated stock options.
Amount: $800,000.
Path: Direct transfer from a self-custody wallet (Ledger) to a Huione address.
Anomaly: Victim attempted to recall the transaction. The immutable nature of TRON prevented reversal. The merchant `SecureTrust` processed the laundering instantly. The speed of the blockchain worked against the victim.
These cases demonstrate the efficiency of the Huione Guarantee system. It removed the friction of money laundering. It allowed a scammer in a compound to receive usable cash minutes after a victim in America pressed "send."
Infrastructure Costs and Profit Margins
The $10 billion loss for victims translates to revenue for Huione. The platform charged deposit fees ranging from 0.1 percent to 2 percent depending on the merchant tier and risk level.
Applying a conservative weighted average fee of 0.5 percent on $10 billion yields $50 million in direct revenue for the platform operators solely from US-sourced funds. This excludes listing fees for merchants. It excludes the fees charged by the merchants themselves to the scammers.
The merchants often charged the scam syndicates between 10 percent and 20 percent to wash the funds. On $10 billion, the merchants earned between $1 billion and $2 billion. This profit margin fueled the advertising and bond payments required to remain on the Huione platform. It created a self-sustaining economy. The high margins attracted more merchants. The competition lowered fees slightly but increased volume.
The 2025 sanctions targeted these margins. By designating the platform, the US Treasury made it illegal for any entity to touch these wallets. Tether (the company) froze $400 million in USDT sitting in top merchant wallets on the day of the designation. This freeze action represents the only significant recovery of assets in the entire three-year period.
Final Metrics on US Impact
The total number of unique US victim wallets interacting with Huione addresses exceeds 185,000.
The average loss per wallet is approximately $56,000.
The median loss is lower, at $12,000.
The disparity indicates the presence of "whale" victims who lost seven or eight-figure sums, skewing the average.
This data cements Huione Guarantee's legacy. It was the most efficient vacuum of American wealth constructed in the 21st century. The 2025 collapse of the platform ended the operation. It did not return the money. The analysis concludes that the funds have fully integrated into the Asian real estate and luxury goods markets.
The lesson for the future is clear. Centralized marketplaces for crime cannot coexist with the global financial system. The delay in designating Huione Guarantee allowed $10 billion to exit the US economy. The speed of enforcement must match the speed of the blockchain.