U.S. DOJ: Cryptocurrency Fraudster Tangeman Used Stolen Funds for Lavish Lifestyle, Ninth Convicted in Case

by Anika Shah - Technology
0 comments

Evan Tangeman Sentenced to 70 Months in Prison for Role in $263 Million Cryptocurrency Laundering Scheme

On April 24, 2026, Evan Tangeman, 22, of Newport Beach, California, was sentenced in U.S. District Court for the District of Columbia to 70 months in prison for his role in a multi-state conspiracy that used social engineering to steal hundreds of millions of dollars in cryptocurrency.

According to court documents and statements from the U.S. Attorney’s Office for the District of Columbia, Tangeman pleaded guilty on December 8, 2025, to participating in a RICO conspiracy and admitted to laundering at least $3.5 million for the criminal enterprise. The scheme, which operated from October 2023 through at least May 2025, involved stealing cryptocurrency from victims across the United States through tactics including stolen databases, hacking, and residential burglary targeting digital currency wallets.

Background of the Social Engineering Enterprise

The criminal network, referred to as the Social Engineering Enterprise (SE Enterprise), began forming through friendships developed on online gaming platforms. The enterprise included individuals based in California, Connecticut, New York, Florida, and abroad, with roles ranging from database hackers and organizers to target identifiers, callers, and residential burglars.

From Instagram — related to Tangeman, District

Tangeman served as a money launderer for the group, processing funds obtained through illegal cryptocurrency thefts. The Second Superseding Indictment, unsealed following his guilty plea, charged three additional defendants—Nicholas Dellecave (also known as “Nic” and “Souja”), Mustafa Ibrahim (also known as “Krust”), and Danish Zulfiqar (also known as “Danny” and “Meech”)—with RICO conspiracy.

Legal Proceedings and Sentencing

Tangeman was the ninth defendant to enter a guilty plea in this investigation. His sentencing hearing took place on April 24, 2026, before U.S. District Court Judge Colleen Kollar-Kotelly, who had previously scheduled the hearing following his guilty plea in December 2025.

The 70-month sentence reflects the severity of his role in laundering proceeds from a scheme that caused substantial financial harm to numerous victims. The U.S. Attorney’s Office emphasized that the sentence underscores the commitment to holding accountable those who facilitate cryptocurrency-related fraud and money laundering operations.

Impact and Significance

This case represents one of the largest cryptocurrency theft and money laundering prosecutions in recent years, highlighting the growing threat of social engineering tactics in digital asset crimes. The investigation and prosecution involved coordination between federal agencies, including the Internal Revenue Service Criminal Investigation (IRS-CI) division, which played a key role in uncovering the financial trail of the stolen funds.

Impact and Significance
Tangeman Evan

As cryptocurrency adoption continues to grow, cases like this serve as a critical reminder of the importance of robust security practices for digital asset holders and the ongoing efforts by law enforcement to combat sophisticated cyber-enabled financial crimes.

DOJ investigating cryptocurrency Tether for bank fraud: Report

Evan Tangeman Sentenced to 70 Months in Prison for Role in $263 Million Cryptocurrency Laundering Scheme

On April 24, 2026, Evan Tangeman, 22, of Newport Beach, California, was sentenced in U.S. District Court for the District of Columbia to 70 months in prison for his role in a multi-state conspiracy that used social engineering to steal hundreds of millions of dollars in cryptocurrency.

According to court documents and statements from the U.S. Attorney’s Office for the District of Columbia, Tangeman pleaded guilty on December 8, 2025, to participating in a RICO conspiracy and admitted to laundering at least $3.5 million for the criminal enterprise. The scheme, which operated from October 2023 through at least May 2025, involved stealing cryptocurrency from victims across the United States through tactics including stolen databases, hacking, and residential burglary targeting digital currency wallets.

Background of the Social Engineering Enterprise

The criminal network, referred to as the Social Engineering Enterprise (SE Enterprise), began forming through friendships developed on online gaming platforms. The enterprise included individuals based in California, Connecticut, New York, Florida, and abroad, with roles ranging from database hackers and organizers to target identifiers, callers, and residential burglars.

Tangeman served as a money launderer for the group, processing funds obtained through illegal cryptocurrency thefts. The Second Superseding Indictment, unsealed following his guilty plea, charged three additional defendants—Nicholas Dellecave (also known as “Nic” and “Souja”), Mustafa Ibrahim (also known as “Krust”), and Danish Zulfiqar (also known as “Danny” and “Meech”)—with RICO conspiracy.

Legal Proceedings and Sentencing

Tangeman was the ninth defendant to enter a guilty plea in this investigation. His sentencing hearing took place on April 24, 2026, before U.S. District Court Judge Colleen Kollar-Kotelly, who had previously scheduled the hearing following his guilty plea in December 2025.

Legal Proceedings and Sentencing
Tangeman District Court

The 70-month sentence reflects the severity of his role in laundering proceeds from a scheme that caused substantial financial harm to numerous victims. The U.S. Attorney’s Office emphasized that the sentence underscores the commitment to holding accountable those who facilitate cryptocurrency-related fraud and money laundering operations.

Impact and Significance

This case represents one of the largest cryptocurrency theft and money laundering prosecutions in recent years, highlighting the growing threat of social engineering tactics in digital asset crimes. The investigation and prosecution involved coordination between federal agencies, including the Internal Revenue Service Criminal Investigation (IRS-CI) division, which played a key role in uncovering the financial trail of the stolen funds.

As cryptocurrency adoption continues to grow, cases like this serve as a critical reminder of the importance of robust security practices for digital asset holders and the ongoing efforts by law enforcement to combat sophisticated cyber-enabled financial crimes.

Related Posts

Leave a Comment