The United States Department of the Treasury’s Office of Foreign Assets Control (OFAC) has added six Ethereum addresses to its Specially Designated Nationals (SDN) list. The enforcement action, formalized on Wednesday through the recent OFAC actions published on May 20, 2026, blocks the assets of 11 individuals and two entities connected to two financial networks tied to the Sinaloa Cartel. The illicit operations utilized a combination of front businesses, cash couriers, and digital asset conversions to launder the financial proceeds of fentanyl and other narcotics trafficking.
According to the official press release issued by the Department of the Treasury, one of the targeted networks was led by Armando de Jesus Ojeda Aviles. This network specialized in collecting bulk cash generated from illegal drug sales within the United States. The network then converted these funds into cryptocurrency to facilitate seamless transfers to cartel leaders in Mexico, bypassing conventional banking controls.
While the regulatory agency did not name the specific cryptocurrency exchanges or decentralized platforms used by the criminal organization, publishing these cryptographic keys creates immediate sanctions liability for all virtual asset service providers (VASPs) and wallet software developers that scan ledger transactions.
https://twitter.com/benbybit/status/1914155633781469371
The exploitation of blockchain infrastructure by criminal enterprises mirrors technical patterns observed in large-scale cyberattacks. According to an executive summary shared by Bybit co-founder and CEO Ben Zhou via his official X account, perpetrators of the 1.4 billion dollar security breach against the exchange heavily relied on the THORChain decentralized protocol. Forensic tracking confirmed that the hackers, identified as the state-sponsored Lazarus Group, processed approximately 1.2 billion dollars worth of stolen Ether through cross-chain swaps into Bitcoin to obscure the transaction history.
This pattern of cross-chain movement is consistently present across multiple protocol breaches. Following the 293 million dollar security compromise suffered by the liquidity protocol Kelp DAO, the exploiters utilized identical decentralized mixers and bridges. On-chain metrics reported on April 23 showed that swapping the compromised Ether into Bitcoin generated roughly 910,000 dollars in transaction fees for the THORChain network, highlighting how automated market makers are systematically leveraged by malicious actors to disrupt traditional linear asset tracking. Metrics regarding this flow suggest that attackers opt for non-custodial liquidity to avoid the regulatory compliance controls that traditional exchanges face.
Compliance challenges and ongoing on-chain fund migration
The OFAC designations impose significant technical demands on compliance departments at centralized cryptocurrency firms. Companies operating under US jurisprudence must immediately update their transaction monitoring tools to flag and reject interactions with these six blacklisted Ethereum addresses. Failure to prevent transactions linked to SDN list entities exposes digital asset platforms to severe civil monetary penalties and criminal prosecution under international anti-money laundering (AML) frameworks.
Meanwhile, network exploiters continue to actively shift assets across the public ledger. In a parallel development, public blockchain records revealed that the Kelp DAO exploit attacker moved 17.5 million dollars in Ether across secondary addresses to complicate recovery and freezing efforts. The operational velocity of decentralized liquidity pools presents a structural challenge to traditional government sanction lists, which rely on static data registers to intercept financial transactions.
Federal authorities have not disclosed whether any digital assets stored within the six sanctioned Ethereum addresses were successfully seized during the May 20, 2026 operation. Due to the SDN classification, network validators and institutional node operators bound by US regulations must exclude transactions carrying these cryptographic signatures from future blocks. It remains to be confirmed how decentralized node infrastructure providers will respond to the inclusion of these six specific addresses within global sanctions registries.
This article is for informational purposes only and does not constitute financial advice.

