
250 Million Dollars in Stolen Cryptocurrency: Unraveling the Truth Behind the Heist of the Century Within a Month
TechFlow Selected TechFlow Selected

250 Million Dollars in Stolen Cryptocurrency: Unraveling the Truth Behind the Heist of the Century Within a Month
Luxury cars, a $500,000 liquor bill, and a mysterious attempted kidnapping.
By Mitch Moxley
Translated by zhouzhou, BlockBeats
Editor's note: This article recounts a crime triggered by cryptocurrency theft. ZachXBT tracked suspect Lam’s lavish lifestyle through social media and assisted law enforcement in the investigation. Lam and his accomplices used sophisticated money laundering techniques but were ultimately apprehended through police tracking. Meanwhile, another kidnapping case was also linked to this criminal group, involving several men from Florida. The case reveals how cybercrime is gradually evolving into more violent real-world crimes. Ultimately, authorities successfully recovered the stolen Bitcoin and related evidence.
The following is the original text (slightly edited for readability):
On August 25, 2024, during a hot afternoon, Sushil and Radhika Chetal were house-hunting in an upscale neighborhood in Danbury, Connecticut—well-manicured lawns, heated swimming pools. Sushil, a vice president at Morgan Stanley’s New York office, was driving a newly purchased matte-gray Lamborghini Urus, an SUV with a starting price of about $240,000.
As they turned onto a street, a white Honda Civic suddenly rear-ended the Lamborghini. At the same time, a white Ram ProMaster van cut them off from the front. According to a criminal indictment filed later, six masked men in black clothing emerged from the vehicles, forcibly dragged the Chetals out of their car, and pushed them toward the side door of the van.
When Sushil resisted, the attackers beat him with a baseball bat and threatened to kill him. They taped the couple’s hands and feet, forced Radhika to lie face down on the ground, warning her not to look at them—even as she struggled to breathe due to asthma and pleaded for help. They taped Sushil’s face and beat him again with the baseball bat as the van sped away.
Multiple witnesses saw the attack and called 911. One was an off-duty FBI agent living nearby who happened to be present; he followed both the van and the Honda Civic, relaying their movements in real time to police. The FBI agent also managed to record partial license plate numbers.
Soon, Danbury police located the van. A patrol car activated its lights attempting to stop it, but the driver accelerated and fled wildly through traffic. About a mile into the pursuit, the van veered off the road and crashed into a curb. Four suspects fled on foot. Police found one of them under a bridge and arrested him after a brief chase. Within hours, the other three were located and apprehended in nearby woods. Meanwhile, officers discovered the still-bound and traumatized Chetal couple in the back of the van.
Danbury Police Detective Sergeant Steve Castrovinci was on vacation that day when he received a call from the shift commander notifying him of the incident. He recalls the commander telling him: “We’ve got a kidnapping on our hands—this is a real one.” Castrovinci gathered a few detectives, stopped by the crime scene en route, then headed to the station to interrogate the suspects. Based on information provided by one of the arrested men, the next morning police located and arrested two more suspects at an Airbnb rental in Roxbury, about 30 minutes from Danbury, where they also found the white Honda Civic.
To Castrovinci, this was an unusually dramatic case. Danbury is a wealthy and quiet town. While police occasionally handle kidnappings, they almost always involve child custody disputes. A daylight violent abduction like this was unheard of. Stranger still, law enforcement discovered the suspects—aged between 18 and 26—had traveled all the way from Miami to Connecticut.
They had even rented the van through the Turo app. “Cases like this, a cop might see one or two in an entire career,” said Castrovinci, who has 20 years of law enforcement experience, including five with the New York Police Department. “Especially in a place like ours, this kind of thing just doesn’t happen.”
In the weeks that followed, police revealed little publicly. Castrovinci and his team worked hard to piece together the motive. It was hard to believe the Chetals were targeted because of Sushil’s position at an investment bank. Though his salary as a Morgan Stanley VP was impressive, it wasn’t exceptional in Danbury. If money was the motive, it was odd that the kidnappers abandoned the Chetal couple’s Lamborghini (later found dumped in the woods). None of the clues made sense.
But a few days after the failed kidnapping, Castrovinci said their team received a tip from the FBI that dramatically shifted the investigation: the case might be connected to a massive cryptocurrency heist that occurred just one week before the attack.
A group of young men—some of whom met on Minecraft servers—were suspected of stealing $250 million from an unsuspecting victim, triggering a chain of unbelievable events involving a teenage cybercrime ring, independent online investigators tracking them, and multiple law enforcement agencies. Now, it appeared, this had culminated in the Chetal kidnapping—the chaotic disorder of the digital underworld and its surrounding culture spilling violently into the real world in a shockingly tangible way.
The chain of events began weeks earlier, when a resident of Washington, D.C., started receiving unusual Google account login alerts indicating access from overseas. Then, on August 18, he received a call from someone claiming to be from Google’s security team. The caller said his email account had been compromised. The call sounded legitimate—the person knew the D.C. resident’s personal details. The caller asked him to verify some personal information over the phone, warning that otherwise his account would be suspended. The man complied.
Shortly after speaking with the supposed Google employee, the Washington, D.C., resident (whose identity was withheld in federal court documents) received another call—this time from someone claiming to represent the security team of Gemini, a major cryptocurrency exchange.
Again, the caller had access to his personal information and told him his Gemini account—holding around $4.5 million in cryptocurrency—had been hacked. To secure his funds, he needed to immediately reset his two-factor authentication and transfer his Bitcoin to another wallet.
The caller then suggested the account holder download a program to “enhance security.” The man agreed, unaware he was downloading a remote desktop application that allowed the caller to remotely control his computer—and thereby access another cryptocurrency account, exposing his assets to an even larger theft. It turned out the D.C. resident was an early crypto investor, holding over 4,100 Bitcoins in total. Ten years earlier, those coins were worth about $1 million; on that day, their market value exceeded $243 million.
Cryptocurrency has a core paradox: while coin holders are typically anonymous, all transactions are publicly recorded on a ledger called the blockchain. This means once funds move, anyone can see it. This paradox has given rise to a new breed of investigator who tracks suspicious transactions on the blockchain. Among the most famous is ZachXBT, an independent crypto crime investigator.
In the crypto world, ZachXBT is a well-known yet elusive figure. He frequently posts long investigative threads on X (formerly Twitter), exposing individuals suspected of wrongdoing, sometimes naming them directly. He has around 850,000 followers on the platform. He often shares his findings with law enforcement. Wired magazine dubbed him “the world’s most active independent crypto crime investigator.” He has never revealed his true identity online.
Minutes after the D.C. resident’s crypto assets were drained, ZachXBT was at an airport catching a flight when he received a mobile alert about an anomalous transaction. Crypto investigators commonly use tools to monitor global crypto flows and set alerts for specific conditions—such as transactions exceeding $100,000 passing through exchanges with very weak security.
The initial alert flagged a mid-six-figure transaction, which kept escalating until it reached $2 million. After clearing security, ZachXBT found a seat, opened his laptop, and began tracing the transaction, eventually linking it to a wallet holding around $240 million in cryptocurrency. Some of the Bitcoin could even be traced back to 2012. “That’s when I knew something was wrong,” he told me. “Why would someone who’s held Bitcoin for so long suddenly use shady services known for handling illicit funds?”
He added the wallet addresses associated with these transactions to his watchlist and boarded the plane. Once onboard with Wi-Fi, more transaction alerts flooded in. All day long, Bitcoin from the massive wallet was being cashed out through more than 15 high-fee crypto service platforms.
After landing, ZachXBT contacted several colleagues who specialize in crypto theft investigations. One was Josh Cooper-Duckett, head of investigations at Cryptoforensic Investigators—a growing number of private firms focused on tracking crypto theft and fraud, helping law enforcement recover funds for victims. The 26-year-old Cooper-Duckett, from London, developed an early interest in crypto. After three and a half years as a security consultant at Deloitte, he shifted focus to investigating crypto thefts, particularly cases involving losses of at least $100,000—which are now increasingly common.
ZachXBT shared his findings with Cooper-Duckett and other investigators. They all agreed that emptying a wallet worth nearly $250 million at once was extremely suspicious. “No one with that much money wakes up one weekend and decides, ‘I’m going to split my funds across a bunch of exchanges and convert them to Monero and Ethereum’—normal people don’t do that,” he said.
The group of crypto investigators quickly contacted relevant exchanges and service providers, informing them the funds were stolen and requesting they freeze the assets and cooperate with law enforcement. Some platforms complied, others did not. “It was like a game of whack-a-mole,” Cooper-Duckett said. “They kept trying to move the money to different exchanges and services, testing where it would go through. After all, they were trying to launder $240 million—that’s an astronomical amount.”
Meanwhile, ZachXBT issued a public warning on X to his followers: “About seven hours ago, a suspicious transaction occurred—4,064 BTC (approx. $238M) moved from a likely victim’s account.” The funds flowed to various crypto platforms including THORChain, eXch, KuCoin, ChangeNOW, RAILGUN, and Avalanche Bridge.
ZachXBT also noticed the victim had previously received bankruptcy payouts from Genesis, a lending platform that filed for bankruptcy in 2023 following the collapse of Sam Bankman-Fried’s FTX.
Through his network, ZachXBT eventually reached the victim via email. The shocked D.C. resident then hired ZachXBT, Cryptoforensic Investigators, and another crypto investigation firm to help track his stolen assets.
The same day, he also filed a police report with the FBI’s Internet Crime Complaint Center (IC3), and ZachXBT immediately contacted his contacts within law enforcement. (The FBI and Department of Justice declined to comment on the matter.)
The surge in cryptocurrency theft has overwhelmed federal investigators. According to the latest report, IC3 received over 69,000 complaints involving crypto financial fraud in 2023, with total losses exceeding $5.6 billion—up 45% from 2022.
While crypto-related complaints make up only 10% of all financial fraud cases, they account for nearly half of the total losses. The report notes that the decentralized nature of cryptocurrency, irreversible transactions, and the ability to move funds globally make it highly attractive to criminals and extremely difficult for the FBI to recover stolen funds. As a result, the FBI established the Virtual Assets Unit (V.A.U.) in 2022 specifically to combat crypto theft.
Given the scale and complexity of such cases, experts say government agencies—including the FBI, Homeland Security, Secret Service, and even the IRS—now rely heavily on private companies and individual investigators who possess deep knowledge of the underground digital crime world. “Josh and Zach—they’re incredibly fast and accurate in tracking,” said Nick Bax, founder of crypto analytics firm Five I’s.
Bax has collaborated with ZachXBT on multiple cases but has never seen him in person. During their early calls, ZachXBT used voice-changing software to sound like Mickey Mouse. “Honestly, I’m pretty good myself, but compared to them, I’ll never catch up,” Bax said. “And I think their brains are literally rewired because they’ve been doing this since they were kids.”
Crypto investigators often use fake accounts to infiltrate hacker and scammer forums on Telegram and Discord, observing their conversations, planning, and boasting. They find that these criminals are often very young and reckless, frequently leaving behind accidental clues.
After ZachXBT posted about the theft on X, a source contacted him through a temporary account, offering potential leads pointing to the thieves’ identities. The informant sent ZachXBT several screen recordings allegedly captured during a livestream by one of the scammers showing the theft in progress. The roughly 90-minute videos included footage of the call with the victim. In one clip, the scammers can be heard screaming in excitement upon realizing they’d stolen $243 million in Bitcoin: “Oh my God! Oh my God! 243 million! That’s insane! Oh my God! Oh my God! Bro!”
In private chats, the scammers used aliases like Swag, $$$, and Meech—but they made a fatal mistake: one accidentally exposed his Windows desktop during the livestream, revealing his real name on the taskbar’s start menu—Veer Chetal, an 18-year-old from Danbury—the son of the couple who had just been kidnapped.
Veer Chetal was a quiet honor student who had recently graduated from Immaculate High School in Danbury and was set to attend Rutgers University in New Jersey. In 2022, he completed a “Future Lawyers” program, and his photo—glasses, wearing a Tommy Hilfiger windbreaker and red Polo shirt, smiling—was featured on the school website.
Classmates recalled Chetal was always shy and loved cars. “He was basically a loner,” said Marco Dias, who became friends with Chetal during senior year. Another classmate, Nick Paris, said Chetal was low-key until halfway through senior year, when he suddenly showed up to school in a Corvette. “He just parked it there at 7:30 a.m., and everyone was stunned,” Paris said.
Soon after, Chetal upgraded to a BMW, then a Lamborghini Urus. He started wearing Louis Vuitton shirts and Gucci shoes. On Senior Skip Day, while Paris and others went to a nearby mall, Chetal took a group of friends—including Dias—to New York, rented a yacht, and partied on deck, posing with stacks of cash.
Chetal claimed he made the money trading crypto; Dias said one morning during study hall, Chetal showed him trading records on his phone as proof. Once, Chetal rented a large house in Stamford, Connecticut, and hosted a three-day party for friends. “I was messing around in the basement with friends and suddenly saw him lying alone on the couch scrolling on his phone, avoiding everyone the whole time,” Dias recalled. “I thought, that’s really weird.” Paris remembered an incident during a school parade when police pulled over Chetal’s Lamborghini Urus for a traffic violation. “He immediately called his lawyer before the officer even said anything. Everyone was like, wow, this guy’s serious—he’s really rich.”
Independent investigators identified Chetal as a secret member of an organization called Com (also known as Comm or Community). Originating in 1980s hacker underground circles, Com has evolved into a social network for cybercriminals and aspiring ones.
According to an FBI affidavit in an unrelated case, an agent described Com as “a geographically dispersed alliance of subgroups collaborating via online communication apps like Discord and Telegram to carry out various criminal activities.”
Based on that affidavit and experts studying Com, these subgroups engage in swatting (making hoax emergency calls to dispatch police); SIM swapping (typically tricking customer service reps to hijack a target’s phone number); ransomware attacks (using malware to block users from accessing their files); cryptocurrency theft; and intrusions into corporate systems.
Allison Nixon, chief research officer at cybersecurity group Unit 221B, has been monitoring this expanding corner of the internet since 2011 and is now widely regarded as one of the top experts on Com.
She said Com members are mostly young men from Western countries. In group chats, many discuss college life and cybersecurity courses they’re taking—knowledge they use to commit crimes. Nixon noted that many first enter this world through video games like RuneScape, Roblox, and Grand Theft Auto.
By the mid-2010s, a darker world emerged within Minecraft—a game centered on creative building—largely due to user-owned and operated online servers that allowed players to form competitive teams, or “factions.” On these servers, Minecraft transformed into a fierce battleground, creating opportunities for profit and scams.
Soon, servers introduced in-game purchases, letting players pay for upgrades like flight abilities, stronger weapons, and armor. Some items unlocked fashionable character skins, becoming status symbols online.
As more players joined competitive servers, a vast black market flourished on Discord, trading in-game items and rare usernames. Since Minecraft players are mostly teenagers, the black market quickly became a breeding ground for scams.
Users often agreed to pay real money via PayPal for in-game items, but scammers would take the money and block the buyer. This became so rampant that “escrow services” emerged—intermediaries who charged fees to hold money and items, delivering them separately to each party.
Within this circle, high-value usernames—usually four characters or fewer, like Tree, OK, Mark, YOLO, or G—became prized collectibles, sometimes selling for over $10,000.
As Minecraft faction servers and black markets thrived, virtual currencies gained popularity in these communities, eventually replacing PayPal as the primary transaction method. This competitive, gambling-filled, scam-prone environment with no accountability, combined with increasing familiarity with crypto, turned Minecraft servers into fertile ground for nurturing new cybercriminals.
By 2017, as Bitcoin prices surged, Com members seamlessly transitioned from Minecraft scams to cryptocurrency theft. Their most popular forum, OGUsers, initially a platform for discussing and buying social media accounts and usernames, evolved into a hub for cybercrime, including SIM swapping and Twitter account takeovers.
Nixon explained: “These antisocial communities rapidly turned into overnight ‘hacker millionaires,’ spreading the culture, because people seeing others become instant millionaires wanted to know how they did it.” This fueled explosive growth in Com’s size.
Today, Com’s preferred method of crypto theft is “social engineering”—manipulating people into revealing sensitive information. Members compile lists of potential victims obtained through data breaches and launch targeted attacks—one like the D.C. victim. Sometimes, they post “job ads” online recruiting others to assist in scams.
Crypto investigator Nick Bax shared a job posting on Telegram offering “5f a week” (five-figure weekly pay)—“as long as you’re not slow”—to call potential targets. It required a “professional American customer service voice.” After a theft, Com members sometimes return to Minecraft black markets, using stolen crypto to buy rare in-game items, then selling them via PayPal for real cash—effectively “laundering” the money.
Once ZachXBT uncovered Veer Chetal’s real identity, he and other investigators quickly identified more suspects. In recordings ZachXBT obtained, the thieves referred to each other using Com aliases and sometimes spoke real names. One repeatedly mentioned was Malone—Malone Lam.
Malone Lam, 20, from Singapore, is a notorious figure in the Com scene, known online as Greavys and Anne Hathaway. A seasoned Minecraft player with a swooping fringe, he was frequently banned from servers but always found ways back. In spring 2023, after a conflict with administrators on the Minecadia server cost him in-game items, he doxxed them—posting their home addresses and Social Security numbers online—and at least once dispatched emergency services to harass them.
Multiple users and Discord chat logs show Chetal and Lam met through Minecraft, having played together in a faction led by Lam.
In October 2023, Lam entered the U.S. on a 90-day visa. He had largely stopped playing Minecraft. According to court documents, he sustained his lifestyle through other crypto-related fraud schemes.
After the August 2024 crypto heist, ZachXBT used OSINT (open-source intelligence)—mainly social media—to track Lam. In Com chat groups, members bragged about Lam’s wild spending, unaware of his income source, but mentioned his lavish nightlife in Los Angeles.
ZachXBT investigated the city’s top nightclubs, reviewing Instagram posts from partygoers and venues. In one post, Malone wore a white Moncler jacket, diamond rings, and encrusted sunglasses. He stood on a table, throwing hundred-dollar bills into the crowd.
As money rained down, servers carried $1,500 bottles of champagne with sparklers, holding signs reading “@Malone.” He spent $569,528 that night alone at that club. At another club, Lam and his crew taunted ZachXBT, instructing guests to hold signs saying “TOLD U WE’D WIN” and “[expletive] ZACHXBT.”
In the following weeks, Lam bought 31 cars, including custom Lamborghinis, Ferraris, and Porsches, some valued at up to $3 million. On August 24, he clearly sent a photo of a pink Lamborghini to a model, texting: “I got you a gift. Let’s consider it an early birthday present.” She replied: “I have a boyfriend again.” He responded: “idc.”
On September 10, after 23 days of partying in L.A., Lam flew with a group of friends to Miami on a private jet. There, he rented multiple properties, including a $7.5 million, 10-bedroom estate. Within days, Lam filled the driveway with luxury cars, including several Lamborghinis—one bearing the name “Malone” on its side.
Every few days, ZachXBT sent his intelligence to law enforcement. Communication was usually one-way, but federal authorities were conducting their own parallel investigation. According to court documents, the conspirators used complex money laundering methods to hide funds and conceal identities—trading through crypto exchanges like eXch that require no personal customer info and using VPNs to mask their real locations.
But according to authorities, they made at least one mistake: one suspect forgot to use a VPN when registering an account on TradeOgre, a digital currency exchange, causing the connection IP to point to a $47,500-per-month rental property in Encino, California. The property was leased by 21-year-old Jeandiel Serrano, who used aliases like VersaceGod, @SkidStar, and Box online. By the time authorities identified Serrano, he was vacationing in the Maldives with his girlfriend.
On September 18, as Serrano flew back to Los Angeles International Airport from the Maldives, law enforcement agents were waiting. He was wearing a $500,000 watch. Initially denying knowledge of the theft, Serrano agreed to speak with authorities without a lawyer. But according to court reports, he soon admitted his involvement, particularly impersonating a Gemini employee.
Serrano admitted owning five vehicles, two gifted by co-conspirators using proceeds from prior scams. He also admitted storing about $20 million in stolen victim cryptocurrency on his phone and agreed to return the funds to the FBI.
Meanwhile, Miami agents prepared to raid one of the mansions Lam had rented. Lam knew the raid was coming: after Serrano’s arrest, Serrano’s girlfriend immediately called Lam’s co-conspirator. They then deleted their Telegram accounts and other phone evidence.
Later that day, an FBI team working with Miami police raided a mansion near Miami’s coast. Agents used breaching devices to blow open the front metal gate, while another team entered via a small saline canal from the rear. Flashbangs exploded as agents stormed the house, their blasts echoing through the neighborhood.
Soon, an agent led Lam out of the house in handcuffs, wearing a long-sleeve white top, dark red basketball shorts, and sneakers, smoke lingering in the air, followed by at least five others who had been inside. Serrano and Lam were charged with money laundering and conspiracy to commit wire fraud. Each count carries a maximum sentence of 20 years in prison.
Exactly one month after the robbery, the party ended.
In Danbury, in the days and weeks following the Chetal family’s kidnapping, Castrovinci and local police worked with federal agents to build a case against the Florida-based gang. They urgently obtained access to suspects’ phones, reviewed group chat logs, and mapped the gang’s movements.
They learned the trip was partly funded and organized by 23-year-old Miami resident Angel Borrero, nicknamed Chi Chi. In group chats, Borrero wrote to others: “If this goes well, we go to Cali next.” Federal investigators speculated this meant the gang planned further operations in California. That day, Josue Alberto Romero (nicknamed Sway) messaged the group: “Chi Chi, we’re more prepared than ever.” These messages showed the gang coordinating actions as early as 7 a.m. and surveilling the Chetal family later in the afternoon.
By then, police had identified the motive: they believed the gang targeted the Chetal family to extort money from their son. Independent investigators believed at least one gang member, Reynaldo (Rey) Diaz, who used the alias Pantic, might be a Com member.
ZachXBT speculated the thieves may have made themselves targets by bragging about their spending within Com circles. “You’d think after committing a crime, you’d stay quiet,” he said. “But they felt compelled to boast to people they thought were friends. Those people probably weren’t real friends.”
On August 27, Danbury police charged six suspects in the case with multiple counts of first-degree assault, first-degree kidnapping, and reckless endangerment. Federal charges soon followed. On September 24, a grand jury indictment filed in Connecticut’s federal district court accused six Florida men of kidnapping, carjacking, and criminal conspiracy.
These six Florida men represent a growing faction within Com that has moved beyond online scams to embrace violence. Diaz himself had been shot two years earlier in Florida during a botched robbery attempt.
In an FBI affidavit, an agent stated Com members frequently carry out “brickings, shootings, and arson attacks.” According to independent journalist Brian Krebs, in 2022, a young man named Foreshadow was kidnapped and beaten by a rival SIM-swapping gang demanding a $200,000 ransom.
In October 2023, 22-year-old Patrick McGovern-Allen from Egg Harbor Township, New Jersey, was sentenced to 13 years for participating in violent contract work after being hired by a cybercrime group. Last November, reports emerged that the CEO of a Toronto-based crypto company was kidnapped and demanded a $1 million ransom.
Weeks later, a 13-year-old boy who created a cryptocurrency and inflated its value was exposed in the crypto community, and rumors spread that his dog had been kidnapped. In January this year, the founder of French crypto firm Ledger and his wife were kidnapped, his hand mutilated, and a multi-million-dollar ransom demanded in cryptocurrency.
Yet, researchers like Nixon note that more and more people unaffiliated with Com are now being targeted. Some alleged Com members participate in so-called “harm groups,” whose members coerce young women and girls into self-harm and violence. Seven years ago, Nixon said, perhaps only dozens of Com members were noteworthy; today, there are thousands. “Now,” she said, “we are witnessing the evolution from disorganized crime to organized crime—we are in the middle of that transition.”
These two incidents—the crypto heist and the kidnapping—show how Com members’ complete lawlessness in the digital world has led them to believe they can carry out similar crimes in the real world. “I don’t think they’ve learned anything,” ZachXBT said. “I’ve seen many people, after being arrested or having assets seized—they end up returning to the same life.”
This year, five of the six Florida men pleaded guilty to federal kidnapping and conspiracy charges and could face 15 years in prison. In January, 19-year-old Michael Rivas apologized in Hartford court for his actions, calling them “stupid,” and said he was helping someone carry out a “revenge plot,” though he didn’t elaborate.
In February, 22-year-old Georgia man James Schwab was indicted for allegedly involvement in the kidnapping plot. According to the federal indictment, Schwab had a confrontation with Veer Chetal at a Miami nightclub a month before the kidnapping and helped fund the operation, arranging transportation and lodging for the attackers. He has pleaded not guilty.
On March 25, ZachXBT updated his X page with the latest on his investigation into the stolen cryptocurrency: “Update: Wiz (Veer Chetal) arrested,” he wrote. “This is his photo.” The attached image showed a young man in a white T-shirt, with shaggy hair and a thick beard, mouth downturned, eyes weary—far removed from the boy in the Immaculate High School website photo. Jail records listed the charge as a federal misdemeanor, though the specific offense was not disclosed.
According to ZachXBT, the stolen Bitcoin he tracked had been transferred to wallets controlled by law enforcement. That day, the matte-gray Lamborghini Urus driven by Sushil and Radhika Chetal during the kidnapping remained as evidence, parked in a secure police lot in Danbury—the same vehicle their son had driven to school.
Join TechFlow official community to stay tuned
Telegram:https://t.me/TechFlowDaily
X (Twitter):https://x.com/TechFlowPost
X (Twitter) EN:https://x.com/BlockFlow_News










