Bitcoin News Today: Europe-Wide Operation Shatters 1.3B EUR Crypto Crime Network, Seizing 25M EUR in Bitcoin

Generated by AI AgentCoin WorldReviewed byAInvest News Editorial Team
Monday, Dec 1, 2025 11:45 pm ET2min read
Speaker 1
Speaker 2
AI Podcast:Your News, Now Playing
Aime RobotAime Summary

- Swiss and German authorities, with Europol support, dismantled Cryptomixer, seizing €25M in

and 12TB of data linked to €1.3B in illicit crypto transactions since 2016.

- The platform used complex mixing techniques to obscure funds for ransomware gangs, dark-web markets, and cybercriminals, operating via both clear and dark web access.

- Seized data including transaction logs and communication records could connect cybercrime networks, aligning with EU's MiCA framework banning mixing services.

- The takedown reflects global enforcement trends against crypto-laundering, following precedents like Tornado Cash sanctions and intensifying cross-border cooperation.

Switzerland and Germany, supported by Europol, have dismantled Cryptomixer, one of Europe's largest cryptocurrency-laundering platforms, seizing EUR 25 million in

and 12 terabytes of data linked to cybercrime networks. The takedown, conducted between Nov. 24 and 28 in Zurich, marked a coordinated effort to disrupt a service that had facilitated over EUR 1.3 billion in illicit transactions since its 2016 launch . Authorities seized three servers, the cryptomixer.io domain, and critical infrastructure used to obscure the origins of funds through complex mixing techniques . The operation, part of a broader crackdown on crypto-facilitated crime, has drawn comparisons to Europol's 2023 takedown of ChipMixer, another major mixer .

Cryptomixer operated by pooling user deposits and redistributing them at randomized intervals, effectively breaking blockchain traceability. This made it a preferred tool for ransomware gangs, dark-web marketplaces, and cybercriminals seeking to launder proceeds from drug trafficking, weapons sales, and payment-card fraud

. The platform's hybrid design-accessible via both the clear and dark web-amplified its reach, enabling users to obfuscate transactions before converting "cleaned" cryptocurrency into fiat or transferring it to exchanges . German federal investigators noted that the service generated "billions of euros in revenues," underscoring its role in enabling large-scale financial crime .

The seizure of 12 terabytes of data is expected to provide critical leads for ongoing investigations. Swiss authorities highlighted that the data includes transaction logs, operational documentation, and communication records, which could link multiple cybercrime groups

. Europol's Joint Cybercrime Action Taskforce (J-CAT) played a central role in coordinating the operation, deploying forensic specialists and facilitating cross-border intelligence sharing. The agency emphasized that the takedown aligns with EU efforts to combat money laundering under the Markets in Crypto-Assets (MiCA) framework, which explicitly bans mixing services .

Regulators and law enforcement agencies have increasingly targeted crypto mixers, which they argue enable illicit flows. High-profile precedents include U.S. sanctions against

developers and recent convictions of Samourai Wallet co-founders for operating a mixing service . Privacy advocates, however, contend that such tools also protect legitimate users and support financial autonomy in decentralized systems. The Cryptomixer operation reflects a global enforcement trend, with U.S. and European authorities intensifying efforts to dismantle infrastructure enabling cybercrime .

Both Switzerland and Germany have signaled that further actions against crypto-laundering networks may follow as forensic teams analyze the seized data. The takedown underscores the growing capacity of international law enforcement to disrupt digital crime ecosystems, even as cybercriminals adapt with increasingly sophisticated methods. With the seized servers and domain now under control, investigators anticipate uncovering additional links to ransomware operations and dark-web networks in the coming months

.