DOJ Scam Center Strike Force Seizes $702M in Crypto: What Pig-Butchering Means for Your AML Program
Table of Contents
TL;DR
- The DOJ’s Scam Center Strike Force restrained $701.9 million in cryptocurrency tied to pig-butchering scams — one of the largest crypto seizures in DOJ history
- OFAC sanctioned 29 entities, including Cambodian Senator Kok An’s network and Heng Feng Cambodia Bank, creating immediate screening obligations for US financial institutions
- 503 fake investment websites and a Telegram recruitment channel were seized; two Chinese nationals were charged with wire fraud conspiracy for running the Myanmar Shunda compound
- US compliance teams must update SDN screening, SAR typologies, and transaction monitoring rules immediately — the Chainalysis and TRM Labs guidance is already out
On April 23, 2026, the Justice Department’s Scam Center Strike Force announced it had restrained over $701.9 million in cryptocurrency linked to Southeast Asian pig-butchering operations — and alongside that, Treasury’s OFAC sanctioned a Cambodian senator and 28 entities including a foreign bank that funneled fraud proceeds.
For US financial institutions, this isn’t background noise. A foreign bank just hit the Specially Designated Nationals list. That creates real blocking and reporting obligations right now.
What the DOJ Strike Force Actually Did
The Scam Center Strike Force — launched in November 2025 — exists for one purpose: dismantling the criminal infrastructure of Southeast Asian scam centers that have stolen billions from Americans.
The April 23 announcement was the Strike Force’s largest action to date:
- $701.9 million in cryptocurrency restrained from wallets tied to money laundering from pig-butchering victims
- 503 fake cryptocurrency investment websites and mobile apps seized and taken offline
- One Telegram channel shut down — it had been used to recruit human trafficking victims to the Cambodia scam compound
- Two Chinese nationals criminally charged with wire fraud conspiracy
The two charged individuals — Huang Xingshan (also known as “Ah Zhe”) and Jiang Wen Jie (also known as “Jiang Nan”) — allegedly managed the Shunda compound in Min Let Pan, Burma (Myanmar). The Shunda compound operated roughly from early 2025 through November 2025, when it was seized. Trafficked workers at Shunda were coerced into running pig-butchering scams: building fake romantic or investment relationships with US victims, then steering them into fraudulent crypto platforms.
Both men were arrested in Thailand on immigration charges and US prosecutors are seeking extradition to Washington. They face charges of wire fraud conspiracy under 18 U.S.C. § 1349.
US Attorney Jeanine Ferris Pirro described the scope: “These networks have stolen billions from Americans.” That’s not an exaggeration. The FBI’s Internet Crime Complaint Center reported $7.2 billion in US victim losses from pig-butchering and crypto investment scams in 2025 alone — making it one of the fastest-growing categories of financial crime in IC3 history.
The OFAC Piece Is What Actually Requires Action Today
Criminal charges against overseas nationals make news. OFAC designations require immediate compliance action.
Treasury’s OFAC simultaneously designated 29 individuals and entities connected to Cambodian Senator Kok An, who OFAC identified as controlling scam compounds throughout Cambodia.
The designations hit across multiple sectors:
| Designated Entity | Type | OFAC Basis |
|---|---|---|
| Kok An | Cambodian Senator | Controls scam center network |
| Crown Resorts / Anco Brothers Co Ltd | Casino operations | Linked to compound infrastructure |
| K99 Group | Casino operator, Sihanoukville | Facilitates scam operations |
| Bolai/Brilliancy Sihanoukville Investment and Development Co Ltd | Real estate | Network infrastructure |
| Heng Feng Cambodia Bank plc | Financial institution | Controlled by Sai Aung Linn; branches in Phnom Penh and Sihanoukville |
| Sai Aung Linn | Individual | Controls Heng Feng Cambodia Bank |
The Heng Feng Bank designation is the most operationally significant piece for US financial compliance teams. A bank is now on the SDN list. That creates blocking requirements, not just screening requirements.
Any US financial institution — bank, broker-dealer, money services business, crypto exchange — that has a correspondent relationship with Heng Feng Cambodia Bank, processes transactions for Heng Feng customers, or holds any assets in which Heng Feng has an interest must:
- Immediately block those transactions and assets
- File a report with OFAC within 10 business days (for blocked transactions)
- Review any prior transactions for OFAC exposure
Beyond the bank, the 28 additional designations span casinos, real estate, and construction in the Sihanoukville area — meaning any US firm with Cambodian business counterparties in those sectors should run enhanced screening now.
Treasury’s press release on the sanctions is at home.treasury.gov/news/press-releases/sb0469.
Pig-Butchering: What the Fraud Pattern Looks Like at the Account Level
The reason pig-butchering is so hard for traditional AML programs to catch: the fraud doesn’t look like fraud at the bank. It looks like a customer voluntarily wiring money.
Here’s the pattern compliance programs need to detect:
Phase 1 — Victim cultivation (invisible to the bank) The scammer makes contact via dating apps, social media, or wrong-number texts. Weeks or months of relationship-building happen before any money moves. The bank sees nothing.
Phase 2 — “Investment” begins Victim makes a small initial “investment” — often $1,000–$10,000 — wired or sent via crypto to what looks like a legitimate exchange. Early “returns” are shown on the fake platform to build confidence.
Phase 3 — Escalation The victim begins moving significantly larger amounts — often draining savings, liquidating retirement accounts, or taking out loans. The bank sees large outgoing wires or ACH to crypto on-ramps.
Phase 4 — Exit When the victim tries to withdraw, the platform demands “taxes” or “fees.” Then it disappears entirely. Funds have already flowed through multiple wallets into the broader pig-butchering laundering network — some of which is now represented in the $701.9M restrained.
What Your SAR Program Is Probably Missing
The FBI and FinCEN have issued pig-butchering SAR guidance, but most financial institution transaction monitoring systems weren’t built with this typology in mind. Here’s what the pattern actually looks like in monitoring alerts:
High-value, out-of-pattern crypto transfers — A customer with a standard retail profile begins sending $10,000–$50,000 to crypto exchanges. Each transfer just under CTR threshold. Multiple over 30–60 days.
Liquidation before transfer — Customer closes long-term savings accounts or sells securities to fund crypto purchases. The sequence of liquidation → crypto on-ramp is a red flag.
Transfer to unknown or high-risk VASPs — Funds going to virtual asset service providers that lack robust KYC, or to wallet addresses flagged by blockchain analytics tools as connected to known scam clusters.
Customer statements inconsistent with behavior — When asked, the customer describes “investment opportunities” from an online contact. They may be resistant or dismissive when branch staff raises concerns.
Inbound “profit” returns followed by larger outflows — This is the “showing the fish the bait” phase. Small inflows hit the account, which the customer withdraws and reinvests in larger amounts. This sequence should trigger enhanced review.
FinCEN has previously published advisory FIN-2023-A008 on virtual currency investment scams (pig-butchering) with specific SAR filing guidance. If your transaction monitoring rules haven’t been updated to incorporate that advisory’s typologies, this enforcement action is the prompt to do it now.
Control Failure Analysis: Where AML Programs Break Down on Pig-Butchering
| Control Gap | What’s Missing | What to Fix |
|---|---|---|
| Transaction monitoring rules | Rules tuned for traditional structuring/layering; don’t catch the liquidation → crypto transfer sequence | Add rule: account liquidation + crypto transfer within 30 days |
| VASP risk assessment | Most banks don’t maintain updated risk ratings for VASPs their customers use | Map your crypto on-ramp exposure; apply enhanced monitoring to high-risk VASPs |
| OFAC screening | SDN list not refreshed after new designations; Cambodia not in high-risk country framework | Force SDN list refresh immediately; add Sihanoukville-linked entities to geographic screening |
| Front-line training | Tellers and bankers don’t know pig-butchering scripts; can’t identify a victim in distress | Update training with specific scenario: elderly customer liquidating CDs to wire to crypto exchange |
| SAR narrative quality | SARs filed but narratives lack specificity on the investment scam context; not usable by law enforcement | Use FinCEN’s pig-butchering SAR narrative guidance; name the platform, describe the relationship history |
| Blockchain analytics for crypto exchanges | Analytics rules tuned for darknet; don’t catch fake investment platform flows | Update to include addresses in DOJ’s seized domains list; subscribe to Strike Force indicator feeds |
Five Things to Do Monday Morning
1. Run the new designations against your SDN screening system. Pull the OFAC SDN list update from April 23, 2026. Confirm Heng Feng Cambodia Bank plc and the 28 other entities from press release sb0469 are loaded. Check for any existing customer or counterparty matches.
2. Review correspondent banking relationships for Cambodia exposure. If your institution has correspondent banking relationships that touch Cambodian financial institutions, flag them for enhanced review. The Heng Feng designations signal that Treasury views Cambodian financial infrastructure as compromised in the Sihanoukville area.
3. Add pig-butchering transaction monitoring rules if you haven’t already. Two specific rules: (a) account liquidation events (CD early withdrawal, securities sale, HELOC draw) followed by first-time crypto transfer within 30 days; (b) inbound small crypto transfer followed by larger outbound crypto transfer within 14 days (the “showing profits” pattern).
4. File a 30-day SAR lookback if you have customers who sent funds to any of the 503 seized domains. The DOJ press release will eventually include a list. TRM Labs and Chainalysis are already publishing blockchain analytics on the seized wallets — your BSA team should pull those reports.
5. Update your front-line training scenario library. Add: “Customer age 50+ with no prior crypto history suddenly liquidating retirement savings to wire to crypto exchange, describing an ‘investment opportunity’ from a friend they’ve never met in person.” That’s your pig-butchering victim profile. Branch staff intervention at this stage can prevent six-figure losses.
The Compliance Signal This Enforcement Sends
The DOJ launched the Scam Center Strike Force in November 2025. By April 2026 — five months in — it has restrained $702M and coordinated with OFAC to sanction a foreign bank.
That operational tempo tells you something: this is not a one-off press release. The Strike Force is actively building cases and will continue to generate intelligence, seizures, and SDN additions tied to this network. Your screening and SAR programs are now on notice.
For crypto exchanges specifically, the seizure of 503 fake investment websites means the government has a list of digital infrastructure tied to pig-butchering. Blockchain analytics firms will be publishing wallet addresses and transaction flow maps. That’s actionable data for transaction monitoring updates.
For banks, the Heng Feng designation means correspondent banking risk has a new data point. Any Cambodian-connected correspondent should get a fresh risk review.
If you’re tracking enforcement actions and building the documentation trail your regulators want to see — which enforcement actions you reviewed, what you changed in your program as a result, who signed off — the Issues Management Tracker makes that process systematic instead of ad hoc.
Related reading:
- FinCEN’s Record $80M BSA Fine Against Canaccord Genuity: What Every Broker-Dealer Needs to Fix
- DOJ Extradites Ivorian National for $14M BEC Credential Phishing Scheme
- DOJ National Fraud Enforcement Division: Compliance Implications
Sources:
- DOJ Press Release: Scam Center Strike Force Takes Major Actions Against Southeast Asian Scam Centers
- Treasury OFAC Press Release: Sanctions Against Cambodian Senator Kok An and Network (sb0469)
- Chainalysis: US Crackdown on Southeast Asian Crypto Scam Centers
- TRM Labs: OFAC Sanctions Cambodian Senator and Scam Center Network
- FBI IC3: 2025 Internet Crime Report
Frequently Asked Questions
What is a pig-butchering scam and why does it matter for bank compliance?
Which entities did OFAC sanction in the April 2026 Cambodia scam center action?
What are the compliance obligations when OFAC adds a foreign bank to the SDN list?
What SAR typologies should compliance teams use to detect pig-butchering?
How does the DOJ Scam Center Strike Force affect crypto exchange compliance programs?
What is the scale of pig-butchering fraud losses in the US?
Rebecca Leung
Rebecca Leung has 8+ years of risk and compliance experience across first and second line roles at commercial banks, asset managers, and fintechs. Former management consultant advising financial institutions on risk strategy. Founder of RiskTemplates.
Don't Wait for Your Own Enforcement Action
Every case like this started with a gap someone knew about but hadn't documented. The template below gives you the framework to get ahead of it.
Issues Management Tracker & Template
End-to-end issues tracking and remediation management for risk and compliance teams.
Keep Reading
SEC Bars "Dr. Cash" After $5M Ponzi Scheme — And What It Signals for Adviser Compliance in 2026
Terrence Chalk, aka Dr. Cash, ran a Ponzi scheme targeting retirees for three years before the SEC and FBI caught up. Here's what compliance teams need to know.
Apr 26, 2026
Regulatory ComplianceThe $50 Million Cookie Jar: SEC Charges PE Firm Founder Jay Lucas with Investment Adviser Fraud
SEC filed a civil complaint against Jay Lucas and Lucas Brand Equity LLC on April 24, 2026, alleging he raised $50M from investors and spent it on his wife's skincare company, alimony, and luxury expenses.
Apr 24, 2026
Regulatory Compliance$5 Million Final Judgment: SEC's Forex Ponzi Case Against John Fernandez Shows How Unregistered Offerings Collapse
A federal court entered a $5 million final judgment against John Fernandez, Avail Progression LLC, and Elite Generators LLC for running unregistered forex Ponzi schemes targeting 100+ investors.
Apr 24, 2026