Monday, February 24, 2025
HomeCyber Security NewsBitMEX Fined $100 Million for Violating Bank Secrecy Act

BitMEX Fined $100 Million for Violating Bank Secrecy Act

Published on

SIEM as a Service

Follow Us on Google News

In a significant legal development, HDR Global Trading Ltd., operating under the name BitMEX, has been fined $100 million for violating the Bank Secrecy Act.

Attorney for the United States, Matthew Podolsky, announced the sentencing on January 17, 2025, highlighting the company’s willful failure to implement an adequate anti-money laundering (AML) and know-your-customer (KYC) program.

Podolsky emphasized the importance of compliance with AML and KYC regulations, stating, “Anti-money laundering and know-your-customer rules protect Americans from fraud, combat money laundering, and prevent the financing of terrorist activity.”

He underscored that all financial institutions, including cryptocurrency exchanges, must adhere to these regulations to safeguard the U.S. economy and national security.

The hefty fine imposed on BitMEX serves as a clear warning: companies that disregard these essential rules will face serious repercussions.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Background on BitMEX’s Operations

Founded in 2014 by Arthur Hayes, Benjamin Delo, and Samuel Reed, BitMEX quickly became a leading cryptocurrency exchange, attracting a substantial number of U.S. traders.

Despite the legal requirement to register with the Commodity Futures Trading Commission (CFTC) and maintain a robust AML program, BitMEX operated without adequate compliance measures. The exchange notoriously required only an email address for account creation, effectively bypassing necessary KYC checks.

Court filings revealed that BitMEX’s senior executives were aware that their platform was accessible to U.S. customers and that their policies aimed at restricting U.S. trading were ineffective.

This negligence allowed the company to capitalize on the lucrative U.S. market while flouting federal laws designed to uphold the integrity of the financial system.

Criminal Charges Against Executives

The legal ramifications extended beyond the company itself. Founders Hayes, Delo, and Reed, along with Gregory Dwyer, BitMEX’s former Head of Business Development, had already entered guilty pleas for violating the Bank Secrecy Act in 2022.

Their previous actions, including misleading a bank about the nature of the company’s operations, highlighted a blatant disregard for U.S. laws designed to combat financial crimes.

Following an extensive investigation, BitMEX pleaded guilty on July 10, 2024, and was sentenced today not only to a substantial fine but also to two years of probation.

 Podolsky commended the Federal Bureau of Investigation’s New York Money Laundering Investigation Squad for their outstanding investigative work throughout this case.

The prosecution of BitMEX stands as a landmark case in the cryptocurrency sector, reiterating the need for strict adherence to financial regulations.

As more regulatory scrutiny is applied to the rapidly evolving digital finance landscape, companies must take compliance seriously to avoid harsh penalties and preserve their reputations.

The case of BitMEX serves as a critical reminder of the importance of responsibility in the digital age, where the intersection of finance and technology continues to expand.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems

GhostSocks, a Golang-based SOCKS5 backconnect proxy malware, has emerged as a significant threat within...

LockBit Ransomware Strikes: Exploiting a Confluence Vulnerability

In a swift and highly coordinated attack, LockBit ransomware operators exploited a critical remote...

Fake ChatGPT Premium Phishing Scam Spreads to Steal User Credentials

A sophisticated phishing campaign impersonating OpenAI’s ChatGPT Premium subscription service has surged globally, targeting...

Parallels Desktop 0-Day Exploit Enables Root Privileges – PoC Released

A critical zero-day vulnerability in Parallels Desktop virtualization software has been publicly disclosed after...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems

GhostSocks, a Golang-based SOCKS5 backconnect proxy malware, has emerged as a significant threat within...

LockBit Ransomware Strikes: Exploiting a Confluence Vulnerability

In a swift and highly coordinated attack, LockBit ransomware operators exploited a critical remote...

Fake ChatGPT Premium Phishing Scam Spreads to Steal User Credentials

A sophisticated phishing campaign impersonating OpenAI’s ChatGPT Premium subscription service has surged globally, targeting...