Insights Crypto How US seized Chen Zhi bitcoin and who gets paid
post

Crypto

14 Jan 2026

Read 13 min

How US seized Chen Zhi bitcoin and who gets paid *

how US seized Chen Zhi bitcoin reveals who controls the $15B stash and how victims could seek relief

Here is how US seized Chen Zhi bitcoin, based on court filings, blockchain labels, and Chinese state claims. The coins vanished in a 2020 hack, sat idle for years, then moved to wallets tagged as US government before a 2025 seizure. We explain the gaps, the evidence, and who could get paid. In early January 2026, Chinese state TV showed Chen Zhi, the 38-year-old founder of Cambodia’s Prince Holding Group, arriving in Beijing in handcuffs. Cambodia had arrested him and sent him to China. Days later, a different question took center stage: where did his $15 billion in Bitcoin go, and who controls it now? US prosecutors said in October 2025 they seized 127,271 Bitcoin tied to Chen. They called it a record. The US and UK also announced sanctions on 146 people and firms linked to Prince Group. But Chinese agencies say the story began in 2020 with a major hack and may involve state-level actors. The US has not explained how it got the private keys. Victims still wait for answers and restitution.

The timeline: from hack to seizure

Key dates at a glance

  • December 2020: More than 127,000 BTC vanish from a mining pool linked to Chen after a reported cyberattack.
  • 2020–2023: The coins stay dormant on-chain. No sell-offs. No mixing. No known cash-outs.
  • Mid-2024: The coins move to new addresses. Blockchain sleuths flag patterns that suggest official custody.
  • October 2025: The US Department of Justice announces the seizure of 127,271 BTC and unseals an indictment.
  • January 2026: Cambodia arrests Chen and extradites him to China.
The sequence raises hard questions. Typical thieves try to cash out fast. Here, the coins sat still for almost four years. Only then did they shift into wallets that Arkham Intelligence later labeled as belonging to the US government.

How US seized Chen Zhi bitcoin: claims, evidence, and unknowns

The 2020 hack and four quiet years

Chinese reports say Chen’s mining pool was hit in late 2020 and the Bitcoin vanished. Chinese media also say Chen posted more than 1,500 pleas and offers for a bounty to recover the stash. Nothing came back. In November 2025, China’s National Computer Virus Emergency Response Center said the long dormancy did not match normal criminal behavior and suggested a state actor may have held the coins. These are claims from Chinese authorities. The US has not responded to them.

2024 moves and “US government” tags

In mid-2024, the stolen coins moved to fresh addresses. Arkham Intelligence labeled the final wallets as US government wallets. On-chain labels are not official proof, but they are a public signal many analysts watch. The timing also lines up with the DOJ’s 2025 seizure announcement. Still, on-chain tagging does not show how agents got the keys.

The legal pathway to custody

US investigators can gain control of crypto in a few standard ways:
  • Voluntary surrender: a suspect or insider gives up private keys.
  • Search and seizure: agents image devices and extract keys under a warrant.
  • Cooperation: an exchange, a custodian, or a partner agency helps transfer funds.
  • Key recovery: rare edge cases include finding seed phrases in backups or notes.
For Bitcoin held in self-custody, some form of key access is still required. The DOJ indictment against Chen, filed in the Eastern District of New York, details alleged fraud, forced labor, and money laundering. It does not state how agents obtained the keys. That gap is why debate continues over how US seized Chen Zhi bitcoin, and whether investigators first gained technical control long before the public seizure.

What public filings say and do not say

What the indictment alleges

The filing lays out a sweeping case: scam compounds in Cambodia, coerced workers, and pig-butchering schemes that hit victims worldwide, including many Americans. It supports coordinated sanctions from the US and UK. It also sets up criminal forfeiture for assets tied to the schemes, which includes the 127,271 BTC.

What is missing: the keys

The indictment does not explain the method by which agents accessed or moved the coins. It does not say whether Chen surrendered keys, whether a close associate did, or whether keys came from a device or a third party. A Beijing-based lawyer, quoted in Chinese media, claims this silence suggests earlier covert access by US officials. That is an allegation, not a confirmed fact. The DOJ has not addressed that claim. The core question remains: how US seized Chen Zhi bitcoin without disclosing the key path.

Who gets paid: possible restitution paths

US remission and restoration options

If the Bitcoin is forfeited in US court, the DOJ’s Asset Forfeiture Program has two common tools to compensate victims:
  • Remission: The government distributes forfeited assets directly to verified victims.
  • Restoration: The government returns assets to a court handling restitution, which then pays victims.
These processes require strong documentation. Victims must show losses tied to the crimes. For a global fraud network, that can be slow and messy. Many victims are in different countries. Some may fear coming forward. Some may not have clean records, especially if funds flowed through third parties or shadow platforms.

Cross-border claims and coordination

This case spans the US, China, Cambodia, and other countries in Southeast Asia. Each has its own laws and interests. China alleges the US took coins that were stolen in 2020. The US focuses on proceeds from crimes that harmed US victims. Cambodia has revoked Chen’s citizenship and moved to liquidate Prince Bank. These moves add more hands and claims to the table. Three big challenges stand out:
  • Victim identification: Who proves loss, and can they link it to Chen’s operations?
  • Jurisdiction: Which court controls the process, and which agencies coordinate the data?
  • Timing and value: If Bitcoin prices move a lot, payouts could change in real terms by the time funds are distributed.
Even with the coins in custody, getting money back to victims will take time. It will also require clear proof, strong casework, and agreements across borders.

The human cost behind the coins

Forced labor and “pig-butchering” scams

Reports tie Chen’s network to forced-labor compounds in Cambodia. Trafficked workers were forced to run romance scams and investment cons. US Treasury estimates show Southeast Asian scam rings stole at least $10 billion from American victims in one year. Many victims lost life savings. The seized Bitcoin could help, but there is no public plan yet that explains who gets paid, when they get paid, and how much.

Lessons for crypto users and platforms

Control your keys, protect your ops

If a large mining pool can lose keys, anyone can. Keep seed phrases offline. Use multi-signature wallets. Spread custody across trusted parties. Limit single points of failure. Log and monitor access. Test recovery often. Good security reduces the chance of total loss.

Read the chain, but demand documentation

On-chain data tells a story, but not the whole story. Labels can be wrong. Movement can be staged. Treat tags as clues, not proof. For high-stakes cases, verified court records and official statements matter. They show the lawful basis for a seizure and the path to restitution. Until those records explain how US seized Chen Zhi bitcoin, skepticism will remain.

What to watch next

  • Court filings: Look for forfeiture orders, remission plans, and any detail on key access.
  • Government statements: DOJ or Treasury may outline a victim compensation process.
  • International moves: China could make formal claims or publish more technical reports.
  • On-chain events: Any further transfers from the tagged wallets will draw scrutiny.
The stakes are high: $15 billion in traceable Bitcoin, thousands of victims, and two rival powers trading claims. The public record confirms the seizure and the scale of the alleged fraud. It does not yet show the precise technical path of control. That answer matters for accountability, for future cases, and for trust in digital asset enforcement. In the end, how US seized Chen Zhi bitcoin is still partly hidden. The timeline points to a 2020 loss, a long quiet period, 2024 movements, and a 2025 legal action. Victims deserve clarity and a path to payment. Until the key question is answered in court or by officials, doubt will follow every coin that moved. (Source: https://beincrypto.com/us-stole-chinese-scam-kings-15b-bitcoin/) For more news: Click Here

FAQ

Q: What is known about how US seized Chen Zhi bitcoin? A: Public filings show US prosecutors announced in October 2025 that they had seized 127,271 Bitcoin tied to Chen after those coins moved in mid-2024 following a December 2020 hack that left them dormant for years. The DOJ indictment does not explain how investigators obtained the private keys, leaving the precise technical path unclear. Q: What timeline connects the 2020 hack to the 2025 seizure? A: Reports say more than 127,000 BTC vanished from a mining pool linked to Chen in December 2020 and remained idle through 2023 before shifting in mid-2024 to new addresses. US prosecutors unsealed an indictment and announced a seizure of 127,271 BTC in October 2025, and Chen was extradited to China in January 2026. Q: Why do Chinese authorities claim the US stole Chen Zhi’s Bitcoin? A: Chinese agencies, including the National Computer Virus Emergency Response Center, say the coins’ long dormancy and delayed movement are inconsistent with ordinary hackers and more consistent with a state-level actor. A Beijing-based lawyer quoted in Chinese media suggested the US may have obtained the coins earlier and disguised the action as law enforcement, which Beijing frames as “black eating black.” Q: What on-chain evidence links the coins to US government wallets? A: Blockchain analysts such as Arkham Intelligence labeled the final-destination addresses as belonging to the US government and flagged those wallets before the 2025 seizure announcement. On-chain tagging is not official proof, however, and the DOJ has not publicly detailed how it accessed the private keys. Q: What legal or technical methods could explain how authorities gained control of the Bitcoin? A: Standard pathways reported include voluntary surrender of private keys, search and seizure of devices under warrant, cooperation from exchanges or custodians, or finding seed phrases in backups or with insiders. The DOJ indictment does not state which of these methods, if any, was used in Chen’s case. Q: Can victims expect restitution from the seized funds? A: If the Bitcoin is forfeited in US court, the DOJ’s Asset Forfeiture Program can use remission or restoration to distribute assets to verified victims. Washington has announced no restitution plan and cross-border claims, victim identification, and fluctuating Bitcoin values will complicate and delay payouts. Q: Does the DOJ indictment explain how investigators accessed or moved the coins? A: The indictment lays out alleged fraud, forced labor, and money laundering tied to Chen and sets up criminal forfeiture, but it does not explain how agents obtained or moved the cryptocurrency. Chen has hired Boies Schiller Flexner to challenge the seizure. Q: What should researchers and victims watch next about this case? A: Observers should watch for court forfeiture orders, remission or restoration plans, DOJ or Treasury statements about victim compensation, and any further on-chain transfers from the tagged wallets. Formal court filings or government statements are the most likely sources to clarify key access and the legal basis for custody.

* The information provided on this website is based solely on my personal experience, research and technical knowledge. This content should not be construed as investment advice or a recommendation. Any investment decision must be made on the basis of your own independent judgement.

Contents