Bitcoin Fog Cryptocurrency Mixer

🔴 High Risk

Bitcoin Fog was a pioneering and notorious cryptocurrency mixer that operated for nearly a decade, primarily facilitating the laundering of illicit Bitcoin funds from darknet markets and cybercriminal activities. By obfuscating the origin and destination of transactions, it enabled criminals worldwide, including those in the United States, to conceal billions in criminal proceeds. The takedown and conviction of Bitcoin Fog’s operator marked a landmark moment in the fight against cryptocurrency-enabled money laundering, demonstrating the power of advanced blockchain analytics and international law enforcement collaboration to dismantle sophisticated financial anonymity tools.

Bitcoin Fog was among the most notorious cryptocurrency mixers globally, operating from 2011 until its takedown in 2021. It was engineered and publicized as a service explicitly designed to provide financial anonymity for criminal users by mixing users’ Bitcoin with those of others to obscure transaction history. Over a decade, Bitcoin Fog was instrumental in laundering more than $400 million in proceeds from global narcotics trafficking, cybercrime, identity theft, and child exploitation markets concentrated largely in the United States, but with extensive international reach. U.S. law enforcement, using advanced financial forensics and blockchain analytics, broke through the pseudonymity of Bitcoin Fog, directly tying the administrator and its operations to large-scale darknet market laundering. The case set a major precedent for the prosecution of technical money laundering services on the blockchain, affirming not only U.S. jurisdiction but also the ability to pierce cryptocurrency anonymity through coordinated international law enforcement and cutting-edge analytical methods. Ultimately, the case demonstrated the inability of even the most sophisticated mixers to fully protect criminals in the face of determined, global cooperation and regulatory pressure.

Countries Involved

The Bitcoin Fog case primarily centered in the United States, with direct investigative cooperation and criminal proceedings taking place in Washington, D.C. However, its operator, Roman Sterlingov, was a dual Russian-Swedish citizen. International cooperation included law enforcement and financial investigations involving Sweden, Romania, and Europol—demonstrating the transnational scope of the operation. The illicit mixing service was also globally accessible and used by individuals from various countries, reflecting the global nature of cryptocurrency-enabled crime and the need for cross-border financial crime enforcement.

Bitcoin Fog operated from October 2011 until its takedown and the arrest of Sterlingov in April 2021. The formal indictment and unsealing of charges against Sterlingov occurred after his arrest at Los Angeles International Airport on April 27, 2021. The jury convicted him in March 2024, and sentencing was scheduled subsequently.

Bitcoin (BTC), Ethereum (ETH), Monero, Stellar

The operation centered on Money Laundering Conspiracy, direct money laundering (concealing origins of criminal proceeds), operation of an unlicensed money transmitting business, and violations of local (D.C.) money transmission licensing laws. The criminal activities facilitated by Bitcoin Fog included anonymizing proceeds from darknet marketplace narcotics sales, cybercrime, identity theft, as well as child sexual abuse material (CSAM), showcasing the severity of related predicate offenses.

Roman Sterlingov (Russian-Swedish national; sole operator)
Bitcoin Fog cryptocurrency mixing service (the illicit platform)
Darknet markets (including Agora, Silk Road, Silk Road 2.0, Evolution, and AlphaBay), whose customers funneled proceeds through the service
U.S. Department of Justice, IRS Criminal Investigation, FBI, Europol, Swedish police and other international law enforcement bodies

No involvement by Politically Exposed Persons (PEPs) has been cited in public filings and government statements. The investigation focused on cybercriminals, darknet vendors, and technical enablers rather than state or high-level political actors.

Bitcoin Fog operated as a classic cryptocurrency mixer/tumbler. The service obfuscated the origins of Bitcoin by pooling coins from many users, then redistributing ‘clean’ coins to destination wallets at random intervals and in varying amounts, charging users a fee. This severed direct transactional connections, making it extremely difficult to trace the flow of funds from criminal sources to their final holders. The service specifically advertised its ability to anonymize funds for users attempting to evade law enforcement and blockchain tracing. Sterlingov also used exchange accounts in his own name to convert and further conceal proceeds, often crossing across multiple cryptocurrency platforms.

Bitcoin Fog processed more than 1.2 million Bitcoin, with values approximated at nearly $400 million at the time of those transactions. Evidence at trial directly found more than $78 million in transactions linked to known darknet markets, with commissions and related profits further increasing the value of funds laundered through the platform. These amounts reflect only the provable illicit activity—actual figures may be higher due to the technical sophistication and long-term operation of Bitcoin Fog.

Investigators used advanced blockchain analysis (notably Chainalysis and IRS CI tracing methods) to identify and cluster more than 900,000 addresses associated with Bitcoin Fog. This analysis proved that the vast majority of incoming funds originated from darknet marketplaces, while outgoing flows similarly dispersed to other darknet addresses or back to criminal users. Sterlingov’s mixing operations consistently obscured the origins and destinations of proceeds, but law enforcement was able to de-anonymize patterns through digital forensics, undercover transactions, and analysis of exchange account records, showing a deliberate, large-scale effort to hide and launder criminal proceeds. Direct and indirect flows between major criminal marketplaces and Bitcoin Fog were crucial in demonstrating the mixer’s integral role in the laundering ecosystem.

Sterlingov was arrested in April 2021 and remained detained pending trial.
Convicted on all charges of money laundering conspiracy, operating an unlicensed money transmitting business, and procedural violations.
Sentenced in November 2024 to 12.5 years (150 months) in prison by a U.S. federal judge, together with a forfeiture order of $395 million and seizure of over $103 million in Bitcoin and other assets.
U.S. regulatory authorities, particularly FinCEN, clarified that mixers and tumblers are covered under the Bank Secrecy Act (BSA), and that running such a service without licensure is a prosecutable crime.
International cooperation featured prominently, with Swedish and Romanian authorities assisting the U.S.

Bitcoin Fog Cryptocurrency Mixer
Case Title / Operation Name:
Bitcoin Fog Cryptocurrency Mixer
Country(s) Involved:
Romania, Russia, Sweden, United States
Platform / Exchange Used:
Multiple cryptocurrency exchanges including Binance (used for conversion)
Cryptocurrency Involved:

Bitcoin (BTC), Ethereum (ETH), Monero, Stellar

Volume Laundered (USD est.):
Approximately $400 million
Wallet Addresses / TxIDs :
Over 900,000 Bitcoin addresses linked to Bitcoin Fog operations
Method of Laundering:

Cryptocurrency mixing/tumbling, layering, anonymizing transactions

Source of Funds:

Darknet markets (narcotics, cybercrime, identity theft, CSAM)

Associated Shell Companies:

None publicly identified

PEPs or Individuals Involved:

Roman Sterlingov (Operator; Russian-Swedish national), no PEPs

Law Enforcement / Regulatory Action:
Arrest, conviction, 12.5-year prison sentence, $395M forfeiture, seizures
Year of Occurrence:
2021 (arrest), 2024 (conviction and sentencing)
Ongoing Case:
Closed
🔴 High Risk