Xinbi Guarantee: Analyzing the Growth of a $8.4 Billion Illicit Crypto Marketplace Using Tether (USDT)
By: bitcoin ethereum news|2025/05/15 01:30:10
0
Share
The cryptocurrency landscape faces scrutiny as Elliptic uncovers Xinbi Guarantee, a platform implicated in $8.4 billion of illicit transactions. This Colorado-based marketplace has witnessed a staggering 95.8% user growth, highlighting its role in cybercrime. “Xinbi Guarantee is crucial for online criminals,” noted Elliptic, emphasizing its reach in illicit services. Elliptic’s findings reveal Xinbi Guarantee’s significant role in cybercrime, handling $8.4 billion in illegal crypto since 2022. Discover the implications. Xinbi Guarantee: Exposing the $8.4 Billion Crypto Crime Marketplace According to Elliptic’s investigation, Xinbi Guarantee predominantly employs the stablecoin Tether (USDT) for transactions. In Q4 2024, inflows exceeded $1 billion, underscoring the platform’s rapid expansion and growing influence within illicit crypto markets. Inflow of Crypto Assets into Xinbi Guarantee Linked Addresses. Source: Elliptic Research Furthermore, significant user growth has been observed. Xinbi’s users skyrocketed by 95.8%, increasing from 119,000 in August 2024 to 233,000 as of the latest data. “According to our analysis, Xinbi Guarantee is already the second-largest illicit online market to have ever operated,” remarked Elliptic. The platform’s infrastructure categorizes merchants into nine categories, with money laundering representing the bulk of transactions. Operators function as a laundering mechanism for proceeds of fraud, notably linked to incidents such as the WazirX hack. According to Elliptic, on November 12, 2024, Xinbi Guarantee addresses received around $220,000 in USDT in nine transactions, revealing the platform’s role in laundering the proceeds from this high-profile heist. WazirX’s Stolen Crypto Funds Sent to Xinbi Guarantee Marketplace. Source: Elliptic Research Additionally, vendors on Xinbi offer a wide range of illicit services, including the sale of stolen personal data, counterfeit IDs, and fraudulent documentation. These materials are frequently utilized in targeting victims. The marketplace’s offerings extend to advanced technology, such as Starlink devices, to enhance the effectiveness of scams. Furthermore, more alarming services are on offer, including targeted harassment-for-hire and access to surrogates and egg donors, with ties to sex trafficking. Despite primarily serving Chinese-speaking criminals, Xinbi Guarantee is legally registered in Colorado, USA, a detail it prominently showcases on its website. “The Colorado corporate register affirms that ‘Xinbi Co., Ltd’ was incorporated in August 2022, with its principal office in Aurora, CO. In January 2025, the corporation was designated as ‘Delinquent’ for failing to file the required periodic report,” the investigation underscored. This incorporation status has raised significant concerns regarding regulatory oversight and the potential exploitation of regulatory frameworks to facilitate illegal operations. Xinbi Guarantee’s exposure continues a pattern of illicit marketplaces uncovered by Elliptic, following the analysis of Huione Guarantee’s activities disclosed in July 2024. Elliptic’s latest findings have propelled Telegram to ban several channels associated with Xinbi Guarantee and Huione Guarantee, marking a noteworthy crackdown on these digital black markets. Conclusion The rise of Xinbi Guarantee as a major player in illicit crypto transactions serves as a stark reminder of the challenges facing regulatory bodies in tracking and mitigating cybercrime. With $8.4 billion linked to illegal activities, the crypto industry must prioritize transparency and security to restore trust and combat these emerging threats. Source: https://en.coinotag.com/xinbi-guarantee-analyzing-the-growth-of-a-8-4-billion-illicit-crypto-marketplace-using-tether-usdt/
You may also like

Business Opportunities of Tokenized Stocks
In this article, we will outline the lifecycle of tokenized stocks, analyze the current market landscape, and highlight the emerging business opportunities.

In-depth research report on the Resolv protocol hacking incident, who is the final payer?
This incident reveals a fundamental weakness in Delta's stablecoin - the coupling point between the minting logic and off-chain signatures/oracles is the most vulnerable attack surface of the system. Any capital efficiency design of "1 dollar minted for 1 dollar" must be predicated on extremely rigo...

Crypto Market Sees Large Liquidations: $272 Million in Long Positions Affected
Key Takeaways In the last 24 hours, $272 million worth of contracts were liquidated across the entire crypto…

Whale Increases BTC Shorts and Bets on Crude Oil: A Strategic Crypto Move
Key Takeaways A prominent whale, known as “UnRektCapital,” has strategically escalated its short position in Bitcoin while simultaneously…

Hackers in Brazil Use Fake Google Play Store to Steal Cryptocurrency
Key Takeaways Hackers in Brazil are exploiting fake Google Play Store pages to spread Android malware. Infected devices…

Exchanging 200,000 for nearly 100 million, DeFi stablecoins face another attack
DeFi project teams cannot assume that the modules they control are necessarily secure.

The underlying business agreement of the trillion-dollar Agent economy: Understanding ERC-8183, it's not just about payments, but the future
This article systematically analyzes the technical principles and commercial value of the ERC-8183 protocol from the dimensions of technical architecture, core mechanisms, application scenarios, and ecological collaboration.

When Wall Street's ETH begins to "yield": Looking at the asset properties of Ethereum from BlackRock's ETHB
ETH is undergoing a paradigm shift from a "volatile asset" to a "yield-generating cash flow asset."

The Power of Agency: The Agentic Wallet and the Next Decade of Wallets
In 1984, Apple killed the command line with a mouse. In 2026, Agent is killing the mouse.

Understanding x402 and MPP in One Article: Two Routes for Agent Payments
x402 makes payments within the agreement, while MPP makes system-level payments.

Particle Founder: The entrepreneurial insights I have gained the most from in the past year
Stop lean startup, stop lightning entrepreneurship, and think carefully about what your product aspirations are.

Huang Renxun's latest podcast transcript: The future of Nvidia, the development of embodied intelligence and agents, the explosion of inference demand, and the public relations crisis of artificial intelligence
The competition in the future is not just about whose model is larger or whose computing power is stronger, but also about who understands the industry better, who can embed AI more deeply into real processes, and who can organize these capabilities into a runnable and scalable system.

OKX Ventures Research Report: AI Agent Economic Infrastructure Research Report (Part 1)
The existing infrastructure is hostile to the Agent economy. Agents can think and act independently at the "capability level," but at the "economic level," they are still locked into infrastructure designed for humans.

The migration of settlement rights: B18 and the institutional starting point of on-chain banks
In the traditional system, banks decide the settlement; in the on-chain system, code begins to take over this responsibility.

From Tencent and Circle: Looking at the Simple and Difficult Questions of Investment
The AI narrative continues to ferment, but the recent performance of related stocks varies, with some in the midst of summer and others as if in winter.

The second half of stablecoins no longer belongs to the crypto circle
What Coinbase doesn't want, Mastercard is eager to buy.

Cursor "Shell" Kimi Controversy Reversed: From Copyright Infringement Allegations to Authorized Collaboration, China's Open Source Model Once Again Becomes a Global AI Foundation
Cursor was accused of being based on Kimi K2.5, which sparked controversy, and was later confirmed to be compliant through Fireworks AI due diligence.

The Real Reason Tokens Don't Sell: 90% of Crypto Projects Overlook Investor Relations
Provide an Investor Relations Best Practices Guide for Crypto Projects.
Business Opportunities of Tokenized Stocks
In this article, we will outline the lifecycle of tokenized stocks, analyze the current market landscape, and highlight the emerging business opportunities.
In-depth research report on the Resolv protocol hacking incident, who is the final payer?
This incident reveals a fundamental weakness in Delta's stablecoin - the coupling point between the minting logic and off-chain signatures/oracles is the most vulnerable attack surface of the system. Any capital efficiency design of "1 dollar minted for 1 dollar" must be predicated on extremely rigo...
Crypto Market Sees Large Liquidations: $272 Million in Long Positions Affected
Key Takeaways In the last 24 hours, $272 million worth of contracts were liquidated across the entire crypto…
Whale Increases BTC Shorts and Bets on Crude Oil: A Strategic Crypto Move
Key Takeaways A prominent whale, known as “UnRektCapital,” has strategically escalated its short position in Bitcoin while simultaneously…
Hackers in Brazil Use Fake Google Play Store to Steal Cryptocurrency
Key Takeaways Hackers in Brazil are exploiting fake Google Play Store pages to spread Android malware. Infected devices…
Exchanging 200,000 for nearly 100 million, DeFi stablecoins face another attack
DeFi project teams cannot assume that the modules they control are necessarily secure.