E-Note Crypto Platform Dismantled in $70M Crypto Money Laundering Case

CyberSecureFox 🦊

An international law enforcement operation has taken down the infrastructure of the cryptocurrency platform E-Note, which US authorities allege was used to launder more than $70 million in proceeds from ransomware attacks, extortion schemes, and compromised online accounts. The case illustrates how unregulated, no‑KYC crypto services have become critical enablers of modern cybercrime — and why regulators and investigators are increasingly targeting these platforms directly.

International law enforcement dismantles E-Note crypto platform

According to the FBI, since at least 2017 the E-Note service and its associated global money mule network processed over $70 million classified as illicit funds. A significant portion is believed to originate from attacks against US organizations and individuals, including ransomware incidents where victims paid in cryptocurrency after systems were encrypted.

The coordinated operation involved the US Department of Justice (DOJ), the FBI, the Michigan State Police, the National Bureau of Investigation of Finland, and German law enforcement. As part of the takedown, authorities seized the domains e-note[.]com, e-note[.]ws and jabb[.]mn, blocked related mobile applications, and confiscated platform servers along with copies of customer databases and transaction records.

From a technical and investigative standpoint, seizing domains and backend servers does more than simply disrupt operations. It provides access to high-value evidentiary data — including logs, wallet identifiers, internal messaging, and account metadata — that can be correlated with blockchain analysis to reconstruct laundering chains and identify participants.

Alleged E-Note operator charged with money laundering conspiracy

In parallel with the infrastructure takedown, US prosecutors charged Mikhail Petrovich Chudnovets, a 39‑year‑old Russian national, who is alleged to have operated E-Note. He is accused of conspiracy to commit money laundering, an offense that carries a maximum penalty of up to 20 years in prison if convicted. At the time of writing, authorities have not publicly confirmed any related arrests.

DOJ materials allege that Chudnovets has been offering money laundering services since around 2010, arranging cross‑border transfers and converting cryptocurrency into fiat currency. Such operators function as shadow over-the-counter (OTC) brokers, catering to cybercriminals who require fast, opaque, and difficult‑to‑trace off‑ramps for large volumes of illicit crypto assets.

How E-Note and money mules enabled ransomware cash-outs

Investigators describe E-Note as a core node in the laundering chain for multiple cybercrime operations. Following a successful ransomware attack or account takeover, victims frequently paid ransoms in cryptocurrency. These funds were then routed through a series of wallets and ultimately funneled into addresses controlled by networks linked to E-Note, before being passed on to money mules and converted into cash or other assets.

Who are money mules and why criminals rely on them

Money mules are individuals who, often for a fee or a percentage of the funds, receive money (including cryptocurrency), withdraw or move it, and then send it onward, obscuring the trail back to the original crime. Mules may be knowingly complicit or recruited through deceptive job offers. They are a critical operational layer in most laundering schemes because they help break the direct link between the victim and the organizers of the attack.

Why seized servers and client databases are a game changer

The confiscated customer databases and granular transaction histories are particularly valuable for forensic work. Combined with public blockchain data and specialized blockchain analytics tools, these records enable investigators to de‑anonymize segments of the E-Note user base and map the full flow of funds across multiple jurisdictions and assets.

This substantially increases exposure not only for high‑level organizers and brokers, but also for rank‑and‑file money mules and repeat customers. There is a risk that some users who interacted with E-Note without fully understanding the scale of its illicit activity may now fall under investigative scrutiny. The case underscores how centralized, no‑KYC crypto platforms become “single points of failure” for entire criminal ecosystems: once compromised, they expose vast amounts of operational data at once.

Growing pressure on unregulated crypto services

The E-Note takedown fits a broader global trend. Over recent years, law enforcement agencies have repeatedly targeted darknet markets, crypto mixers, and unlicensed exchanges that advertise anonymity and explicitly ignore KYC/AML (Know Your Customer / Anti‑Money Laundering) obligations. Several high‑profile mixers and marketplaces have been seized or sanctioned, signalling that infrastructure providers are now primary enforcement targets.

International standards set by the Financial Action Task Force (FATF) require virtual asset service providers to implement AML and counter‑terrorist financing controls, including customer due diligence and the so‑called “travel rule” for transfers. Platforms that position themselves as anonymous exchangers and disregard these requirements increasingly face coordinated cross‑border operations similar to the one against E-Note.

Practical recommendations for companies and crypto users

For organizations, the E-Note case is a reminder that paying ransomware demands and using unvetted crypto services can create significant legal, regulatory, and reputational exposure. Incident response plans should explicitly address decision‑making around ransom payments, legal review of potential sanctions or AML issues, and strict controls on which wallets, exchanges, or intermediaries may be used.

Companies and individual users should prioritize licensed, regulated exchanges that comply with KYC/AML requirements, implement transaction and address monitoring, and avoid “grey” over‑the‑counter exchangers or schemes involving money mules. At the same time, strengthening basic cyber hygiene — including network segmentation, regular offline backups, multi‑factor authentication, and security awareness training — reduces the likelihood of successful attacks and the perceived need to negotiate with extortionists.

The story of E-Note indicates that the era of near‑total impunity for anonymous crypto services is narrowing. As blockchain analytics mature and cross‑border cooperation intensifies, the probability of de‑anonymization and follow‑up investigations continues to grow. To protect their assets and remain within the law, organizations and private users should reassess how they engage with cryptocurrencies, vet counterparties more rigorously, and invest in both cybersecurity and AML literacy as core elements of their digital risk strategy.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.