Crypto Fraud Mastermind Sentenced to 20 Years, Vanishes Before Serving Prison Term
A federal court in the United States has sentenced Daren Li, a 42-year-old dual national of China and St. Kitts and Nevis, to 20 years in prison for masterminding a global cryptocurrency investment fraud worth nearly ₹610 crore ($73.6 million). The sentencing, however, has been rendered effectively meaningless after Li fled in December 2025 by removing his electronic ankle monitor, leaving him at large and underscoring the challenges of prosecuting transnational cybercrime.
Background and Context
The sophisticated operation represents one of the largest recent examples of “pig butchering” scams, a deceptive practice where criminals spend weeks or months cultivating relationships with victims before convincing them to invest in fraudulent schemes. According to court records, the network was primarily operated from Cambodia, which has emerged as a significant hub for transnational cyber fraud operations. Victims were targeted through social media platforms, dating applications, unsolicited phone calls, and text messages, with fraudsters impersonating romantic partners, financial advisers, or successful cryptocurrency traders.
Key Figures and Entities
Li pleaded guilty in November 2024 to conspiracy to launder funds obtained through fraudulent cryptocurrency investment schemes. Court documents identify him as the first defendant directly involved in receiving and transferring victim funds to be formally sentenced. The operation functioned like a corporate enterprise, employing recruiters, relationship managers, financial operators, and money-laundering specialists working in coordination. Eight co-conspirators have already pleaded guilty in connection with the case, though prosecutors emphasized Li's central role in the financial pipeline that processed stolen funds.
Legal and Financial Mechanisms
The criminal enterprise utilized sophisticated fake cryptocurrency trading platforms designed to mimic legitimate exchanges. These platforms displayed fabricated gains to encourage larger deposits, with initial investments appearing profitable to build false confidence. According to prosecutors, approximately ₹500 crore ($60 million) of the total fraudulent proceeds were routed through US-based shell companies specifically established to conceal the origin of the funds. The money was subsequently converted into cryptocurrency, creating multiple layers of complexity that significantly hindered tracing and recovery efforts. In some instances, fraudsters impersonated technical support executives to convince victims to transfer additional funds to resolve fictitious technical issues.
International Implications and Policy Response
The investigation, led by the Global Investigative Operations Center of the US Secret Service with assistance from other federal agencies, highlights the industrial scale of modern cryptocurrency fraud and the limitations of current international cooperation mechanisms. Li's escape demonstrates the difficulties law enforcement agencies face in ensuring accountability across jurisdictions. The case has renewed calls for stronger international coordination and faster information-sharing mechanisms to combat cross-border cybercrime operations. Cybersecurity experts continue to warn investors against unsolicited investment offers, particularly those promising unusually high or guaranteed returns in cryptocurrency markets, emphasizing the need for independent verification of unfamiliar trading platforms and online relationships.
Sources
This report draws on US federal court records, statements from the US Secret Service's Global Investigative Operations Center, and legal filings related to the cryptocurrency fraud investigation. The information covers developments from the initial investigation through Li's sentencing and subsequent flight in late 2025.