Powered by MOMENTUM MEDIA
cyber daily logo
Breaking news and updates daily. Subscribe to our Newsletter

AFP arrests Melbourne man accused of laundering $100m in cyber crime funds

A Melbourne-based Chinese national has been charged by the Australian Federal Police (AFP) for laundering $100 million worth of cyber crime proceeds.

user icon Daniel Croft
Thu, 26 Oct 2023
AFP arrests Melbourne man responsible for laundering $100m in cyber crime funds
expand image

After executing a search warrant of the man’s Sydney and Melbourne homes on 25 October, the AFP charged the 37-year-old culprit with:

  • “One count of recklessly engaging, on two or more occasions, in conduct related to the proceeds of general crime, the value of which being greater than $10 million, contrary to section 400.2B(6) of the Criminal Code Act 1995 (Cth), and
  • “Providing remittance services while unregistered, contrary to section 74(2) of the Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (Cth).”

The man is set to appear at Downing Centre Local Court on 26 October and faces maximum penalties of 15- and two-year imprisonment for each crime, respectively.

The man was snagged by the AFP as part of a joint operation with the US Secret Service (USSS) called Operation Wickham.

============
============

The operation was first launched when the USSS advised the AFP-led Joint Policing Cybercrime Coordination Centre (JPC3) that millions generated through scams were being transferred to an Australian business bank account from the US.

Of the $160 million found to be stolen, $100 million was laundered through the Changjiang Currency Exchange or via business accounts belonging to fake Aussie businesses, which were controlled by the Long River money laundering organisation, the group believed to be behind Changjiang Currency Exchange.

AFP Commander Investigations Kate Ferry said that victims were lured into scams through an accused criminal syndicate that promised massive investment returns through a platform called MetaTrader.

“The majority of the money deposited into Australian bank accounts or remitted by Changjiang Currency Exchange was linked to the exploitation of an investment application called MetaTrader, and other platforms dealing in foreign exchange and cryptocurrencies,” she said.

The scammers would contact the victims, who were predominately in the US, via text or another application such as WhatsApp, and after some discussion, eventually convince them to invest their money into a trading platform, pushing MetaTrader specifically.

After convincing the victim that the platform was legitimate with manipulated data to show high returns, the scammers then stole the victim’s money and, in some cases, would push victims for more.

“A key feature of the scam was the alleged syndicate’s ability to produce dedicated software, compatible with the legitimate trading platform, to misrepresent the true market value of currency rates,” added Ferry.

“The AFP alleges victims were led to believe the vast majority of trades were successful in yielding significant financial returns, when in reality, the data was manipulated to show positive returns.

“The criminal syndicate did not stop there; they continued to encourage more deposits from victims.”

Ferry added that those who received unsolicited offers of high returns should respond cautiously.

“We encourage all members of the public to exercise a high degree of caution when approached by unknown entities on the internet or other online communication platforms in relation to investment opportunities, or any other type of money-making venture. If it seems too good to be true, then it probably is,” she said.

Also, on 25 October, the AFP made several other arrests of members of the same Long River money laundering syndicate behind the Changjiang Currency Exchange.

Yesterday’s operations saw the AFP execute 20 search warrants across every mainland state in Australia, with over 240 AFP personnel and an additional 92 specialist members restraining over $50 million in property and vehicles, all as part of Operation Avarus-Nightwolf.

Seven individuals were arrested, including a 37-year-old man from Balwyn and a 37-year-old man from Balwyn North, which are both in Melbourne.

Cyber Daily is yet to identify if either of the two above is the same man who was arrested as part of Operation Wickham.

Responding to a request for clarification, the AFP specified that these were different arrests, with the Operation Wickham arrest occurring at the culprits Sydney home.

Daniel Croft

Daniel Croft

Born in the heart of Western Sydney, Daniel Croft is a passionate journalist with an understanding for and experience writing in the technology space. Having studied at Macquarie University, he joined Momentum Media in 2022, writing across a number of publications including Australian Aviation, Cyber Security Connect and Defence Connect. Outside of writing, Daniel has a keen interest in music, and spends his time playing in bands around Sydney.

newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.