🔴 ANALYTICAL INTELLIGENCE

Russian Money Laundering Networks
via Estonian Crypto Structures

RIEDELLA OÜ · TRINITY SOLUTIONS · HITBTC / LYDIAN GROUP

Date: 05.05.2026
Version: 1.2 EN
Classification: For Official Use
Recipients: FBI / OFAC / FinCEN / Europol / Estonian KAPO / GCHQ / Israeli intelligence
Case: 2-22-17379 (civil) / 19230100730 (criminal)
Languages: 🇷🇺 RU · 🇺🇦 UA · 🇵🇱 PL · 🇬🇧 EN

⚡ Key Finding

Two independent investigations indicate the systematic exploitation of Estonian corporate and crypto-asset infrastructure for the laundering of proceeds linked to the Russian defence-industrial complex, sanctions evasion, and the integration of criminal proceeds at a scale comparable to the Danske Bank scandal (€200 billion). The pattern raises material FATF compliance concerns and triggers obligations for Suspicious Transaction Reports (STR/SAR) across multiple FATF jurisdictions.

Scheme 1 (Riedella / Rudov): An IT contractor to Russian state security services (an FSB-certified manufacturer of information-security products) maintained €13 million in crypto-assets on centralised exchanges through an Estonian legal entity. This €13M represents merely 5% of a single account's volume (per Veresov's witness testimony). The realistic scale of the network is approximately 200 accounts × €260M = €13–52 billion in throughput. The civil case is conducted by the former Prosecutor General of Estonia, to whom the prosecution service released criminal-case materials on the same day the civil claim was filed. The criminal case was closed without establishing the destination of €12 million — a clear failure to investigate the predicate offence.

Scheme 2 (Fishman / HitBTC): St Petersburg-based programmer Grigory Fishman built a conglomerate (HitBTC, Changelly, Freewallet, Cointelegraph, BeQuant and others) with monthly trading volumes of $20+ billion — operating de facto as unlicensed global infrastructure for crypto-asset laundering: used to launder proceeds from WannaCry, the WEX exchange collapse and dozens of cyber-intrusions. Beneficial-ownership disclosures are deliberately obscured; multiple subsidiaries received regulatory warnings from the FCA, MFSA, BVI FSC and SVG FSA.

€260M
Estimated throughput per Riedella account
€13–52B
Estimated network throughput (200 accounts)
$20B+
Monthly volume of HitBTC empire
$136M
Liquidations from Cointelegraph fake (2023)
1

RIEDELLA OÜ — Russian Defence Sector Funds Routed Through Estonia

🔴 LAUNDERING SCHEME
⚠️ KEY UNANSWERED QUESTION

How did Riedella OÜ — the Estonian subsidiary of a Moscow-based IT contractor to Russian state security services, declaring a €276,000 loss in 2019 — accumulate €13,000,000 in crypto-assets on Binance and Huobi? Neither the Estonian Prosecutor's Office nor the court addressed this question. The investigator whose materials underpin the civil claim reports to the prosecution service led for nine years by the claimant's counsel, Norman Aas. This presents a textbook conflict of interest under Council of Europe anti-corruption standards (GRECO).

🧮 Forensic Arithmetic — Network's Real Scale

Per witness testimony of Andrey Veresov (closed criminal case No. 19230100730), only ~5% of total account balances was reported as "stolen". This permits a direct calculation of the realistic operational scale of Riedella OÜ — a company that publicly declared an annual loss of €276,000.

Step 1: 1 ACCOUNT
"Theft" = €13M
Share of volume = 5%
Account throughput = €260M
Step 2: 3 RUSSIAN ACCOUNTS
€260M × 3 =
€780M confirmed in Russia
verifiable component only
Step 3: 200 ACCOUNTS
If average = €260M:
€52 BILLION throughput
conservative est.: €13B

Conclusion: Riedella OÜ is not a "victim of hackers." It is a professional financial operator with multi-billion-euro throughput, exploiting an Estonian corporate shell to channel a money flow whose origin remains unverified. The scale is commensurate with the Danske Bank Estonia scandal (€200 billion) — but in crypto-asset form.

🔑 The central investigative question:
An IT company with declared revenue of approximately $30M/year held €260M on a single crypto-asset account and operated a network of 200 linked accounts. They moved, transferred and earned on these funds. These are not their own funds — they are the operator. Whose funds are these?
Calculation assumptions: (a) Veresov's testimony regarding the 5% "stolen" share of account volume — closed criminal-case materials, requires verification via Mutual Legal Assistance Treaty (MLAT); (b) "200 accounts" — estimate from the same materials; (c) assumption of uniform average volume per account — actual figures may vary, but even the conservative estimate (€13B) is comparable to the largest documented money-laundering scandals.
Anton Rudov
Owner of Riedella OÜ / Trinity Europe OÜ
  • CEO of JSC "Trinity Solutions" (Kaluga, INN 7703529979)
  • 2024 revenue: RUB 2.79 billion (~$30M)
  • Certifications: FSTEC + FSB of Russia
  • Product: hardened telecoms equipment for Russian critical infrastructure (CII)
  • 116 of 249 Russian state procurement contracts won
  • Member of the General Council of "Delovaya Rossiya" (Kremlin-affiliated organisation)
  • Riedella OÜ incorporated: February 2019
Norman Aas
Counsel for Riedella · Sorainen Law Firm
  • 2005–2014: Prosecutor General of Estonia
  • 2014–2017: Secretary General of the Ministry of Justice
  • 2019–present: Partner at Sorainen, white-collar crime practice
  • 18.11.2022: prosecution service released criminal-case materials on the same day the civil claim was filed
  • Criminal case closed 17.01.2023 — two months after the civil claim
  • Criminal-case materials marked "copy: prosecutor-defence counsel" handed to the alleged victim (Riedella)

CHRONOLOGY OF SUSPICIOUS COINCIDENCES

PRE-JULY 2019
Riedella OÜ (an IT company with no public revenue) holds €13 million in crypto-assets on Binance and Huobi. Source of funds: undetermined.
10.07.2019
Alleged "cyber-intrusion." 999,998 USDT routed to a KYC-verified Bitfinex account (Dimitri Vasiliev, opened one day prior). ~€12 million disappear via anonymous wallets.
⚠️ Logical contradiction: 12M layered anonymously (professional tradecraft), yet 1M sent directly to a named KYC account (unprofessional). This is the pattern of an OTC trade, not a hack.
16.07.2019
Criminal case No. 19230100730 opened
18.11.2022 ← CRITICAL
ON THE SAME DAY: the prosecution service grants Norman Aas access to the criminal-case file, and the Riedella civil claim is filed.
Standard processing time for such requests is weeks. Here: zero days.
29.11.2022
Renewed seizure of Vasiliev's crypto-assets — 11 days after the civil claim
17.01.2023
Criminal case closed — "perpetrators not identified." €12 million untraced. Status of 200+ accounts: not investigated.
27.02.2026
Harju County Court: $999,998 USDT awarded to Riedella. Appeal lodged.
📋 VERESOV TESTIMONY — Interrogation Protocol of 12.05.2020 (St Petersburg, Criminal Case No. 1190*****)

Direct quotation from the testimony of Andrey Yurievich Veresov:

"Operations were conducted across a large number of accounts. In early 2019, Daniil Bulatkin provided me with a link to a Google Sheet containing logins and passwords for 200–300 personal accounts on crypto-asset exchanges, together with credentials for the email addresses linked to them. The file was accessible to all department staff and traders."

This indicates: a centralised network of 200–300 accounts opened in third-party names, a shared password sheet, accessible to all Riedella OÜ staff. This is not a "hack victim" — it is industrial-scale laundering infrastructure based on smurfed KYC accounts. The single account decoded in the case file (Riedella OÜ on Binance) showed transactions of approximately €13M — visible only as the tip of the iceberg.

🔗 DIRECT LINK TO FISHMAN

From case materials: "potential linkage to money laundering of Russian oil oligarchs (Fishman's clients/Investors)". Riedella OÜ is therefore an operational unit within a broader network associated with Grigory Fishman (see Section 4). Within defence correspondence, the Riedella matter is referred to directly as the "Fishman's Case". The Estonian prosecution service did not investigate this connection.

SCALE — COMPARISON WITH DANSKE BANK

Parameter Danske Bank (Estonia, 2007–2015) Riedella / Estonian Crypto (2018–2023)
Total throughput €200 billion >$1 billion documented; 55% of global VASPs domiciled in Estonia in 2021
Mechanism Correspondent accounts VASP licences without effective KYC (AML officers identified as taxi drivers and welders)
Russian nexus Russian shell-company clients Companies with FSB certification; OFAC-sanctioned exchanges
Prosecution response Belated, financial penalties Effectively absent — case closed without tracing €12M
Key figure Branch managers Former Prosecutor General — claimant's counsel
2

BLOCKCHAIN ADDRESSES AND TRACING TOOLS

🔵 FOR FORENSIC ANALYSIS
🎯 ALL ADDRESSES FROM CRIMINAL CASE FILES

Complete dataset of blockchain addresses from the Russian criminal-case file No. 1190***** (Interrogation Protocol of A.Y. Veresov of 12.05.2020, St Petersburg) and the Estonian criminal case No. 19230100730. Riedella OÜ filing: stolen ~880 BTC + 6,499.98 ETH + 999,998.1 USDT. The Estonian Prosecutor's Office did not trace any of these addresses except the final USDT recipient.

🟦 USDT (TETHER) — documented

Sender — Binance account of Riedella OÜ (operations@riedella.com)
0xd551234ae421e3bcba99a0da6d736074f22192ff
Source of 999,998.1 USDT. This is a Binance hot wallet linked to Riedella's corporate account. The same address may have processed the bulk of the network's operations.
Recipient — Bitfinex (belpoker@gmail.com, 09.07.2019) — 999,998.1 USDT
0x9086F3908EfD8c56e563E7B41bDD195c8d5E2CC4
Address belonging to the "belpoker" Bitfinex account (registered 09.07.2019 to belpoker@gmail.com — the personal email of D. Vasiliev). This is the pattern of an OTC trade rather than a hack: identifiable individual, completed KYC, real email address.
TxID — specific USDT transfer transaction
0x876b2c73eedbfe0633066aef36a1fec87e6711eeec76d53d960426fca711ab8f
Transaction hash from 10.07.2019. From this record one can recover everything: timing, gas fees, IP timestamp, and the chain back to the Binance withdraw API.
Current custody (Estonian Police and Border Guard Board, since 08.09.2020)
0xB630d420fDA70B707e1EF1d414b3d423856bC78D
Cold-storage wallet (Ledger Nano S) held by the Estonian Police and Border Guard Board. USDT was transferred here on 08.09.2020 by court order. The private key is held by the Estonian authorities.

🟪 ETH (ETHEREUM) — 6,499.98 ETH (~$1.95M at 2019 prices)

Destination — 6,499.98 ETH (2 transactions on 10.07.2019: 2,499.99 + 3,999.99)
0x031238586DB5084357032C3bfc77F8488Dfd0fd5
Final destination of ETH withdrawn from Riedella's Binance accounts. This address was never traced by the Estonian investigation. It provides the on-ramp toward the missing €12 million.
Linked address (Huobi investigation)
0x3f9d482c8d3665caebdc725b77c13c7d2f15d37f
Mentioned in case materials in connection with Riedella's Huobi accounts.

🟧 BTC (BITCOIN) — ~880 BTC (~$8.8M at 2019 prices)

Binance destination #1 — 199.9995 BTC
34nKruVPhX7qMB9KE7UDmomdq1P5GBnBJS
Binance + Huobi destination — 599.9985 BTC (3 transactions to this address)
3MNaZEBbYsu9FppTzemK9auf3SxCQubTXz
Received 3 transactions of 199.9995 BTC each: one from Binance, two from Huobi. One of the principal cluster addresses in the scheme.
Huobi destination — 79.9995 BTC
19BgqtLGUkswf2zK73WgkrBsJRXQ1mjGRx
Huobi transaction chain
38h9RFsEvWGXfTV3rwa6RbHxmayHWEj2iE
Bitfinex (belpoker, frozen by authorities)
1sJDvuTN97qKQiK75us1HaeRo57MgWnx8
BTC address of Vasiliev's Bitfinex account, which received a portion of the BTC. Frozen by the Estonian authorities.
Bitfinex linked transaction
1KNtLcfU3pNQmyhxSGUmaigncpYNkFe7wZ

🟢 TRON — linked address (BKK OTC, Jalisco cartel)

Tron address of the BKK exchanger owner (Jewelry Trade Center, Bangkok)
TQtnfoL1sYv2u5yUet5ucojKiEZ7b3sPjG
Per a Colombia-based AML analyst: linked to the Huione Group and, via an Irish intermediary, to Mexico's Jalisco cartel. Direct contacts with Huione are documented. Demonstrates the ecosystem extending beyond crypto-asset laundering and into narcotics trafficking.

KNOWN HITBTC ADDRESSES — PUBLIC DATABASES

HitBTC hot/cold wallets are annotated in public databases. Inflows include: WEX 10,000 BTC (November 2022), Ripple insider $112.5M (February 2024), US Government address $19.2M (October 2024).

Database Available data Link
Arkham Intelligence Annotated wallets of HitBTC, BeQuant, Freewallet, Changelly arkham → entity/hitbtc
Etherscan Labels Tagged HitBTC addresses on Ethereum etherscan.io/accounts/label/hitbtc
Bitquery (HitBTC) All deposit / withdrawal addresses by exchange bitquery.io/labs/hitbtc
Walletexplorer (BTC) HitBTC clusters across Bitcoin addresses walletexplorer.com/wallet/HitBTC.com
ZachXBT investigations Public addresses with tracing screenshots t.me/investigations (Telegram channel)
OpenSanctions Cryptos Sanctioned addresses (Garantex, Hydra, etc.) opensanctions.org/datasets/crypto
🔍 €12 MILLION TRACING PLAN

Step 1: Request to Binance via the appellate court (or EGMONT FIU-to-FIU channel) for the complete list of withdrawal transactions from Riedella OÜ accounts on 10.07.2019. Records retained for 10 years and remain accessible.
Step 2: Run first-tier addresses through Chainalysis Reactor / TRM Labs / Crystal Intelligence or an open-source equivalent (GraphSense).
Step 3: Match against known clusters of HitBTC / Changelly / MinerGate — high probability of overlap given that both schemes share St Petersburg origins and operate via Estonia.

3

GRIGORY FISHMAN / LYDIAN GROUP — Unlicensed Crypto Laundering Network

🔴 LAUNDERING NETWORK
Grigory Fishman
Beneficial owner of HitBTC · Cointelegraph · Lydian Group
  • Born ~1984, Leningrad / St Petersburg
  • LETI 2006 graduate, ACM ICPC competitor
  • 2006: AIS — algorithmic trading $1B/day (10% of Russian market)
  • 2012: Quantum Brains Capital (Berlin / Bermuda) with Arsen Yakovlev
  • 2022: The Lydian Group SARL (London / Luxembourg)
  • Publicly conceals link to HitBTC (nominee: Andrey Savchenko)
  • Holds Israeli citizenship (per source reporting) — connection requires verification
  • July 2025: per source reporting — in hiding in Gelendzhik (Russia)
The Lydian Group SARL
Holding company · London / Luxembourg · 2022
  • 35M+ users (claimed)
  • 500+ institutional clients
  • 800 employees
  • $20B+ monthly trading volume
  • Co-founder: Gérard Lopez (Luxembourg, Mangrove Capital)
  • February 2026: Lopez's counsel stated "Lydian never invested in Swoo or BeQuant" — contradicts prior statements

ASSET STRUCTURE

Company Role Regulator Scandals
HitBTC Crypto exchange (front) NONE BVI liq. 2023, SVG — fraudulent WannaCry, WEX 10k BTC, Ripple $112M, US Gov $19M, account freezes
Freewallet Custodial wallet FCA Warning 2023 Malta MFSA Warning Hidden $50/month fees, freezes, Monero theft
Cointelegraph Media front, market manipulation None Fake BTC ETF tweet Oct 2023 → $136M liquidations
Changelly Non-KYC exchanger None of substance Founders identical to MinerGate founders; used for layering
BeQuant "Institutional" front Malta MFSA — surrendered licence 2022 Owner Georgy Zarya (Russian → British citizenship)
MinerGate Mining pool (closed 2023) None Withdrawals → auto-routed to Freewallet; shared founders with Changelly
TradeSanta Trading bot None 0% fee on HitBTC for users — direct traffic redirection
Coin360 Aggregator (JV with Hilbert Group) None 60% Hilbert; 40% Cointelegraph + Chiron Partners
LTFS Enterprise (Cyprus) Exchange software (matching + custody) None Anonymous directors; profile matches HitBTC technology core

CONFIRMED CRIMINAL TRANSACTIONS THROUGH HITBTC

Date Event Amount Source
2017–2018 WannaCry ransomware — portion of ransom routed via HitBTC n/a Le Monde
November 2022 WEX 10,000 BTC — ~65 BTC (~$1M) to a HitBTC address $1M+ GetBlock
February 2024 Ripple insider hack — laundering through HitBTC $112.5M ZachXBT (TG: 1963527562)
October 2024 Compromise of US Government address — withdrawal via HitBTC $19.2M ZachXBT
November 2024 Metawin casino hack — HitBTC nested service $4M+ ZachXBT
October 2023 Cointelegraph fake BTC ETF post → market manipulation $136M liquidations Coinglass / Reuters
⚠️ BITWISE FINDING (SEC, 2019)

"HitBTC is unequivocally the worst example" among 83 exchanges analysed. "Practically all reported volume is wash trading." CipherBlade (Richard Sanders): "the largest fraud by scale and duration in cryptocurrency history." No genuine reserves despite reported billion-dollar volumes.

4

CHRONICLE OF FISHMAN-ASSET SCANDALS

📅 TIMELINE 2017–2025
📰 PUBLIC DISCLOSURE — Lenta.ru, 15.08.2025 "Empire at Half-Price"

The Lenta.ru investigation into Viktor Mangazeev publicly linked Grigory Fishman to specific financial transactions for the first time: Fishman's claim in the High Court of London for $19.7 million, and the freezing of Mangazeev's assets totalling $20 million in the UK. From the materials of the same case, the High Court publicly disclosed that Fishman is the owner of HitBTC, Freewallet and Cointelegraph (Rambler/Finance, tek.fm, September 2025).

Date Event Amount Source
2017 WannaCry ransomware — ransom laundered through HitBTC ~$140K BTC Quartz
2017–2018 BTC-e seizure by FBI — portion of BTC routed via HitBTC Wikipedia
Dec 2017 Mass complaints regarding HitBTC account freezes; class-action threats on Reddit / Bitcointalk Bitcointalk
May 2018 Karma Group v HitBTC — listing fee paid, services not rendered 527.01 ETH Karma Medium · Coinspeaker
Jan 2019 Pre Proof-of-Keys freeze — HitBTC blocks withdrawals en masse hundreds of thousands of complaints Finance Magnates
2019 SEC / Bitwise report: HitBTC is "unequivocally the worst example" of wash trading among 83 exchanges 95% of volume fake Bitwise SEC
2019 HitBTC declared an "insolvent scam operation" (CipherBlade / Richard Sanders) reserves < 90 BTC CryptoBriefing
Nov 2021 Lazarus Group laundering — BTC laundered through Changelly (revealed via ShapeShift API bug, Convex Labs) Lazarus operation BankInfoSec
Nov 2022 WEX 10,000 BTC — ~65 BTC routed via HitBTC ~$1M+ (visible portion only) GetBlock
Nov 2022 CrossTower acquires BeQuant (financing the Fishman / Lopez Lydian Group) not disclosed PRNewswire
Apr 2023 HitBTC phishing clone (hitbt2c.lol) — funds stolen via spoofing ~$15M CoinDesk / Chainalysis
May 2023 Fishman files claim against Alex Grebnev (Samcoins / MAPS / OXY, Alameda-backed) $750K → $19.7M XBO
Jun 2023 Atomic Wallet hack (shared founder with Changelly — Konstantin Gladych) — Lazarus DPRK $100M+ Elliptic
Oct 2023 Cointelegraph fake tweet regarding BlackRock BTC ETF $100–136M liquidations CoinDesk
Nov 2023 BVI FSC: HiTech Digital Business Ltd (HitBTC) struck off and liquidated de-registration BVI FSC
Dec 2023 UK FCA Warning against Freewallet not authorised FCA
Feb 2024 Ripple insider hack — laundering via HitBTC $112.5M ZachXBT (TG: 1963527562)
Mar 2024 SVG FSA: HitBTC documents are "false and forged" fraudulent docs SVG FSA
Oct 2024 Compromise of US Government address — withdrawal via HitBTC $19.2M ZachXBT
Sep 2023 Fishman's claim against Mangazeev (High Court London), asset freezing order $19.7M claim / $20M frozen Lenta.ru
Jun 2025 Cointelegraph front-end exploit — fake airdrop pop-up phishing CoinDesk
Aug–Sep 2025 Lenta.ru / Gazeta.ru / tek.fm: Fishman publicly identified as owner of HitBTC + Freewallet + Cointelegraph disclosure tek.fm
5

CHANGELLY — North Korea, Lazarus, Money Laundering

🔴 CRITICAL
⚠️ DIRECT ATTRIBUTION TO LAZARUS GROUP

BankInfoSecurity (Mathew J. Schwartz, November 2021), citing the Convex Labs investigation that exploited a ShapeShift API vulnerability: "Lazarus also appeared to exchange some bitcoin at Changelly, another exchange." This is the first and most concrete public reference to Changelly in the context of laundering for the North Korean Lazarus hacking group. Lead IRS-CI investigator: "The laundering is harder than the hacks themselves."

Changelly — structure
Instant crypto exchanger · 2013
  • Jurisdiction: Prague (2013–2018) → Malta (2018) → St Vincent and the Grenadines (2025)
  • Actual operating base: St Petersburg
  • FCA UK Warning: "not authorised, avoid"
  • Banned in Ontario, Canada
  • Cybercriminal.com Trust Score: 2.4 / 10 (Low)
  • Allegations: "US Treasury flagged transactions", cooperation with ransomware operators
Konstantin Gladych — founder
St Petersburg ITMO · 3 linked projects
  • Founder of Changelly (2013) — CEO until September 2018
  • Co-founder of MinerGate (2014, closed 2023)
  • Founder & CEO of Atomic Wallet (2017 — present)
  • Atomic Wallet hacked by Lazarus in June 2023 — $100M+ stolen
  • Team (Bere, Lapin, Sokolov) — all ITMO, St Petersburg
  • Estonian shell address: Tornimäe tn 5, Tallinn (Atomic Protocol Systems OÜ)

PRINCIPAL ALLEGATIONS

Category Description Source
LAZARUS Direct reference to Changelly as a Lazarus Group BTC laundering channel BankInfoSec 2021
$100M+ HACK Atomic Wallet (shared founder) — hacked by Lazarus, $100M+ stolen Elliptic
US TREASURY Allegations: "flagged transactions by U.S. Treasury", cooperation with ransomware Cybercriminal.com
FCA UK Not authorised by FCA · "avoid this firm" FCA
FROZEN FUNDS Hundreds of complaints: KYC trap (swap completed — funds vanish — support silent for months) Trustpilot · BlockNuggets
CANADA Prohibited in Ontario (OSC non-compliance) OSC Ontario
FINCEN Registered as MSB — but this is a basic registration, not a licence. "Basic compliance, not comprehensive oversight" Bitget Academy

SPECIFIC USER COMPLAINT CASES

🎯 SIGNIFICANCE FOR THE RIEDELLA INVESTIGATION

If the €12 million from Riedella accounts moved through Changelly — this is a crypto exchanger without genuine KYC, with a confirmed Lazarus connection and a Russian team based in St Petersburg. Changelly enables conversion to Monero (privacy coin) or to non-traceable tokens. Riedella accounts plus the Changelly structure form an ideal pairing for the secure laundering of money flows whose origin must be concealed.

6

CONNECTING THE DOTS — How the Schemes Are Linked

Rudov / Trinity Solutions (FSB-certified) ↓ Russian state-contract revenue (~RUB 737M confirmed; true scale obscured by classified tenders) Riedella OÜ (Estonia) — €13M on Binance + Huobi ↓ alleged "hack" on 10.07.2019 ├── €12M → anonymous wallets → ??? → likely HitBTC / Changelly for layering └── €1M → Bitfinex (OTC trade?) → seized → returned to Riedella WEX (2017–2022) — $800M of user funds ↓ November 2022: 10,000 BTC departs the WEX address └── ~65 BTC → HitBTC → layering → trail lost HitBTC / Lydian Group (Fishman, St Petersburg) ↓ no KYC, no genuine licences └── laundering: WannaCry + WEX + Ripple + US Gov + Riedella €12M (hypothesis)
🔗 COMMON DENOMINATOR

Both schemes have St Petersburg roots, operate via Estonian / EU legal entities, evade AML scrutiny through Russia-linked fixers (Aas — Norman / Rudov — Trinity) and the absence of effective regulation at the level of crypto-asset infrastructure. The €12M that disappeared in the Riedella case may have moved through HitBTC or Changelly — meaning both schemes may form a single chain.

7

RECOMMENDED ACTIONS — For Financial Intelligence Units and Law Enforcement

🟡 ACTIONABLE
🇺🇸 OFAC / FinCEN
  1. Designation review and SDN List inclusion of Anton Rudov, Trinity Solutions JSC, Trinity Europe OÜ, and Riedella OÜ — primary basis: FSB certification confirms supply to Russian state security organs
  2. FinCEN Section 311 review of HitBTC, BeQuant, Changelly, Freewallet as institutions of primary money-laundering concern
  3. Issue a Geographic Targeting Order (GTO) for VASPs domiciled in Estonia / SVG with St Petersburg operating bases
  4. Coordinate with the SEC regarding Cointelegraph market manipulation ($136M liquidations from the BlackRock ETF fake)
🇺🇸 FBI
  1. Investigate money laundering on behalf of Russian defence contractors via Estonian crypto structures — predicate offences include sanctions evasion and provision of services to designated entities
  2. Trace links between HitBTC / Changelly and the WannaCry, WEX, Ripple insider, and US Government compromise cases
  3. MLAT request to Estonia for the closed criminal-case file No. 19230100730 — particularly the testimony of Veresov and Bulatkin and details of the 200+ accounts
  4. Coordinate with the US Treasury for the seizure of Lydian Group SARL assets in London / Luxembourg
🇪🇺 Europol / Eurojust
  1. Establish a Joint Investigation Team (JIT) across the relevant EU jurisdictions (Estonia, Malta, Cyprus) plus the United Kingdom
  2. Coordinate with FIU.NET on STR / SAR sharing concerning Riedella OÜ, Trinity Europe OÜ, BeQuant Technologies Ltd
  3. Apply Europol's EMPACT framework — priority area: Money Laundering & Asset Recovery
  4. Issue an EAW (European Arrest Warrant) for principal beneficiaries upon establishment of evidentiary thresholds
🇪🇪 Estonian KAPO / RAB
  1. Conduct a proper AML investigation that the Prosecutor's Office failed to perform — origin of funds, source of wealth, beneficial-ownership review of Riedella OÜ
  2. Resolve the conflict of interest with Norman Aas (former Prosecutor General) — refer to GRECO / Council of Europe
  3. Inspect Finantsinspektsioon for VASP licensing of Riedella OÜ and Trinity Europe OÜ — was AML due diligence performed at the time of registration?
  4. Reopen criminal case No. 19230100730 in light of the Veresov testimony regarding 200–300 third-party-name accounts
🇮🇱 Israeli Intelligence (Mossad / Lahav 433)
  1. Verify Grigory Fishman's Israeli citizenship status and travel history — possible use of an Israeli passport for sanctions evasion
  2. Cross-check whether assets of the Lydian Group / HitBTC / Cointelegraph network connect to Israeli financial institutions
  3. Coordinate with INP (Israeli National Police) regarding the Cointelegraph media network and the regulatory status of crypto operators with an Israeli nexus
  4. Apply the Israeli Prohibition on Money Laundering Law, 2000 — review possible offences in light of the Russian state nexus
🇬🇧 NCA (UK) / OFSI
  1. Investigate The Lydian Group SARL (London) — funding chain CrossTower → BeQuant → Lydian, possible breaches of UK sanctions on Russia
  2. OFSI: assess sanctions designations for Anton Rudov, Trinity Solutions JSC, Riedella OÜ — Russia (Sanctions) (EU Exit) Regulations 2019
  3. Companies House: review the BeQuant Technologies Ltd file — Persons with Significant Control (Georgy Zarya, Russia → UK)
  4. FCA: extend the existing warnings on Freewallet and Changelly to include the broader Fishman network
🇪🇺 BfV (Germany) / AMLA
  1. Trace Quantum Brains Capital activity (Berlin / Bermuda, 2012) — Fishman / Yakovlev — possible historical connections to German financial institutions
  2. Coordinate with the future EU AMLA (Anti-Money Laundering Authority) regarding Estonian VASPs as a high-risk corridor
  3. Apply the FATF Travel Rule for crypto-asset transfers above €1,000 — assess HitBTC / Changelly compliance
🇪🇺 EGMONT Group / FATF
  1. FIU-to-FIU information exchange across all 166 EGMONT member jurisdictions concerning the network
  2. FATF: include the case in the next typology report on VASP money laundering and the misuse of corporate vehicles
  3. MONEYVAL: include findings in the next mutual evaluation of Estonia (2022 cycle) — VASP sector as a critical vulnerability
  4. Review whether a country-specific FATF advisory for Estonia is warranted in connection with crypto-asset structures
💰 ASSET RECOVERY FRAMEWORK

If money laundering of proceeds from contracts with Russian state security services is established, the assets of Riedella OÜ and Trinity Europe OÜ (including the missing €12M) are subject to confiscation as property linked to the financing of armed aggression. Separately — the assets of HitBTC / Lydian Group, which transited funds of designated persons (Garantex / WEX). Recovery channels: US (18 U.S.C. §981 civil forfeiture), EU (Directive 2024/1260 on asset recovery), UK (Proceeds of Crime Act 2002, Part 5). Whistleblower protection and rewards available under the FinCEN Whistleblower Program (up to 30% of sanctions collected) and the EU Whistleblower Directive (2019/1937).

8

EVIDENTIARY BASE AND SOURCES

MEDIA PUBLICATIONS

REGULATORY DOCUMENTS

CORPORATE REGISTRIES

SANCTIONS DATABASES AND BLOCKCHAIN