22-Year-Old Sentenced in $263M Bitcoin Laundering Scheme After Massive BTC Theft
A 22-year-old Newport Beach man has been sentenced to 70 months in federal prison for laundering millions tied to a massive $263 million Bitcoin theft scheme built on hacking, social engineering, and physical burglaries.
- Evan Tangeman sentenced to 70 months
- At least $3.5 million laundered
- Over 4,100 Bitcoin stolen from a single victim
- Luxury homes, watches, cars, and nightclub blowouts used to wash the loot
Evan Tangeman, 22, admitted to laundering at least $3.5 million for a multi-state criminal group responsible for stealing more than 4,100 Bitcoin from a single victim. The case, handled by the U.S. Attorney’s Office for the District of Columbia, is part of a broader crypto crime network prosecutors say operated from October 2023 to May 2025 and spread across state lines, online channels, and real-world break-ins. California Man Sentenced to 70 Months for Role in _263M Bitcoin Laundering Scheme
This was not some lone hacker in a hoodie fantasy. Prosecutors say the operation included hackers, organizers, social engineers, and people involved in physical burglaries. That mix is the key detail. The theft side depended on trickery and access; the laundering side depended on moving the money, hiding the source, and turning stolen Bitcoin into things criminals could actually spend. Crime is always the same old swamp with new branding.
The group’s reported roots trace back to online gaming platforms, which is a neat little reminder that “community” on the internet can be a two-edged sword. Some people find friends, teams, and startups there. Others find a pipeline into fraud, theft, and a future fed-prison lunch menu. Tangeman used aliases including “E,” “Tate,” and “Evan|Exchanger” while converting stolen crypto into fiat currency — government-issued money like U.S. dollars. That conversion step is the boring part of the crime, but it is also the part that makes the whole machine work.
For readers new to the term, social engineering means tricking people into giving up access, credentials, or sensitive information. It is basically hacking the wetware, not just the software. In these schemes, that can be just as effective as exploiting code flaws. And once attackers get access to wallets, accounts, or private keys, the clock starts ticking on the victim’s chance of getting anything back.
Tangeman also allegedly worked with Los Angeles real estate agents to secure luxury homes for people in the network. Some of those involved were reportedly under 20 and unemployed, yet they were living in houses valued between $4 million and $9 million. That should tell you everything you need to know about how “careful” this crew was. Nothing screams low profile like teenagers with no jobs in multimillion-dollar homes. Subtle as a brick through a window.
The spending spree was as brazen as it was stupid. Prosecutors say the stolen funds were used for nightclub bills of up to $500,000 in a single night, Rolex watches worth as much as $500,000, and exotic cars priced as high as $3.8 million. Tangeman allegedly received a customized Lamborghini Urus, while authorities also seized a Rolls-Royce Ghost and a Porsche GT3 RS from his residence. That is not stealth. That is a rolling, revving, diamond-encrusted confession.
RICO conspiracy also matters here. RICO stands for the Racketeer Influenced and Corrupt Organizations Act, a law used when prosecutors believe they’re dealing with an organized criminal enterprise rather than a one-off theft or isolated fraud. Tangeman pleaded guilty to that charge in December 2025, and his plea was the ninth guilty plea in the case. That tells you federal investigators are not chasing one random opportunist. They believe they are unwinding a coordinated network.
Prosecutors say Tangeman also instructed an associate to destroy digital evidence after earlier arrests started closing in. Nice try, but deleting files is not a magic wand. Once investigators begin piecing together exchange records, blockchain transactions, device data, bank activity, vehicle purchases, and property records, the whole “just erase it” approach tends to collapse into a pile of nonsense.
“Tangeman admitted to laundering at least $3.5 million for a multi-state group responsible for stealing over 4,100 Bitcoin from a single victim.”
“The operation, which ran from October 2023 to May 2025, reportedly originated from connections formed through online gaming platforms.”
“Many of those involved were reportedly unemployed individuals under 20 years old, yet they lived in homes valued between $4 million and $9 million.”
“Federal prosecutors continue to pursue additional suspects linked to the crypto laundering network.”
The bigger lesson for Bitcoin and crypto readers is not that Bitcoin is broken. It is that criminals will use any liquid asset they can get their hands on, then wrap it in a laundering chain and hope the mess holds long enough to enjoy the money. Bitcoin is just the asset that moved. The real criminal engine was human greed, deception, and the willingness to spend like an idiot while pretending nobody would notice.
This case also cuts against the lazy “Bitcoin is anonymous so crime is easy” talking point. Bitcoin is pseudonymous, not invisible. Transactions are public on the blockchain, and the trail often becomes clearer once criminals try to cash out into fiat or convert stolen funds into homes, cars, jewelry, and other real-world assets. Once you bridge from on-chain activity to off-chain spending, you invite banks, exchanges, real estate records, and law enforcement into the picture. That’s where the wheels start coming off.
It is also worth noting the ugly evolution of crypto crime: it is increasingly a hybrid of cyber theft, social manipulation, and old-school physical intimidation. The fact that this group allegedly mixed online gaming connections, digital laundering, and burglaries shows how messy modern criminal networks can be. The technology may change, but the underlying playbook is still the same: steal, wash, brag, repeat, and eventually get caught because somebody got too greedy or too loud.
What happened here?
Evan Tangeman was sentenced for helping launder proceeds from a massive Bitcoin theft tied to a multi-state criminal network.
How much was stolen?
More than 4,100 BTC, valued at about $263 million.
What did Tangeman do?
He admitted to laundering at least $3.5 million and helped convert stolen Bitcoin into spendable cash and luxury assets.
Was this just a hacking case?
No. Prosecutors say the group also used social engineering and physical burglaries, making it a hybrid cybercrime operation.
Why is RICO important?
RICO signals prosecutors believe this was an organized criminal enterprise, not a random one-off theft.
Did the money go into real luxury assets?
Yes. Reports include luxury homes, Rolex watches, exotic cars, and huge nightclub bills.
Is the investigation over?
No. Federal prosecutors say more suspects are still being pursued.
What does this say about crypto crime?
It shows that crypto crime is often a mix of digital theft, laundering, and real-world asset conversion — and that flashy spending makes criminals easier to catch, not harder.
Bitcoin keeps proving the same uncomfortable truth: the protocol is not the villain, but it also does not protect people from their own stupidity, coercion, or sloppy criminal behavior. The chain is public. The trail exists. And when thieves get greedy enough to buy the kind of stuff that screams “please investigate me,” federal agents usually do not need much encouragement.