China Accuses US of Stealing $13 Billion in Bitcoin: Cyber Heist or Law Enforcement?

News headline about the China, US Cyber Bitcoin Heist, overlaid with a picture of a Chinese flag, published by MJB.

Introduction

China just lobbed a serious accusation at Washington: you nicked our Bitcoin. We’re talking 127,000 BTC—worth roughly $13 billion today—that vanished from a Chinese mining pool back in 2020. China’s cybersecurity watchdog reckons the US government didn’t just seize stolen crypto; they claim American authorities were in on the heist from the start. The US? They’re calling it legitimate law enforcement. Either way, this Bitcoin mystery is turning into a full-blown diplomatic spat with billions on the line.

What Actually Happened to the Stolen Bitcoin?

Here’s the timeline that’s got everyone’s attention.

The 2020 Hack Nobody Noticed

In 2020, someone made off with 127,000 Bitcoin from LuBian, a Chinese mining pool. The coins were linked to Chen Zhi, chairman of Cambodia’s Prince Group, who’s now facing US charges for allegedly running a massive crypto fraud operation.

But here’s the weird bit: the stolen Bitcoin just… sat there. For nearly four years, nobody touched it. The hack flew completely under the radar.

The 2024 Plot Twist

Fast forward to mid-2024. The Bitcoin stash suddenly moved to new wallets. Blockchain sleuth Arkham Intelligence flagged those wallets as belonging to the US government. That’s when China’s National Computer Virus Emergency Response Centre (CVERC) started asking uncomfortable questions.

China’s Explosive Claims About US Involvement

CVERC released a technical report on Sunday making some pretty bold accusations.

“State-Level Hacking Organisation”

According to CVERC’s analysis—and reported by the Global Times, a Chinese state-owned newspaper—the original hack used seriously advanced tools. We’re talking sophisticated stuff that suggests a “state-level hacking organisation” was behind it.

The implication? China’s hinting the US government wasn’t just the repo man collecting stolen goods. They’re suggesting American intelligence might’ve been involved from day one, with the 2024 “seizure” being the final act in a long-running operation.

Challenging the Official Story

The US Department of Justice maintains this was straightforward: they seized criminal proceeds as part of a legitimate investigation into Chen Zhi’s alleged fraud network.

China’s not buying it. CVERC argues the seizure timeline, the technical fingerprints, and the four-year dormancy period all point to something more coordinated than standard law enforcement.

Why This Bitcoin Battle Matters

Beyond the eye-watering dollar figure, this dispute touches some seriously sensitive nerves.

Crypto as a Geopolitical Weapon

If China’s allegations hold any water, it means cryptocurrency isn’t just disrupting finance—it’s becoming a tool in the great power playbook. Bitcoin’s pseudonymous nature makes it perfect for covert operations, whether you’re stealing it or seizing it.

The Trust Problem

For crypto holders, especially those in countries with tense US relations, this whole saga raises uncomfortable questions. If a state actor can orchestrate a hack and the seizure four years later, what does that mean for Bitcoin’s supposed neutrality?

US-China Relations Take Another Hit

As if trade wars and tech sanctions weren’t enough, now we’ve got duelling narratives over a $13 billion crypto heist. China views this as a provocative act. The US sees it as routine law enforcement. Neither side’s backing down.

What Happens Next?

Don’t expect this mystery to wrap up neatly.

The blockchain evidence is public—anyone can trace those 127,000 Bitcoin. But attribution? That’s where things get murky. Proving who executed the original hack and whether the US seizure was legitimate law enforcement or something shadier is nearly impossible without classified intelligence.

What’s certain: this case is now Exhibit A in arguments about cryptocurrency regulation, cross-border enforcement, and how digital assets complicate international relations.

The Bottom Line

China’s accusing the US of stealing $13 billion in Bitcoin. America says they seized criminal proceeds. The truth? Probably buried under layers of classified intel and blockchain complexity.

What we know for sure: 127,000 Bitcoin changed hands twice—once in a 2020 hack, again in a 2024 “seizure”—and now two superpowers are pointing fingers. Whether you believe this was a state-sponsored heist or legitimate law enforcement probably depends on which side of the Pacific you’re standing.

Want to stay ahead of crypto’s wildest stories? Bookmark our finance section for the latest on digital assets, regulatory drama, and the billion-dollar mysteries shaking the industry.


FAQ

Q1: How much is 127,000 Bitcoin worth today?

A: At current prices, roughly $13 billion. When the Bitcoin was originally stolen in 2020, it was worth significantly less—highlighting just how much this stash has appreciated while sitting dormant.

Q2: Who is Chen Zhi and why does he matter?

A: Chen Zhi is the chairman of Cambodia’s Prince Group and is currently under US indictment for allegedly running a large-scale cryptocurrency fraud scheme. The stolen Bitcoin was originally tied to him, making him central to the US government’s legal justification for the seizure.

Q3: Can stolen Bitcoin really sit untouched for four years?

A: Absolutely. Unlike traditional bank accounts, Bitcoin wallets don’t expire or get frozen automatically. Thieves often let stolen crypto sit dormant to avoid detection, waiting for the heat to die down before moving funds.

Q4: What tools would a “state-level hacking organisation” use?

A: We’re talking zero-day exploits, advanced persistent threat (APT) techniques, and custom malware designed to breach high-security targets. These aren’t script kiddie tools—they’re sophisticated capabilities typically associated with government intelligence agencies.

Q5: Will we ever know who really hacked LuBian?

A: Probably not with certainty. Blockchain analysis can track the money, but definitively attributing cyberattacks to specific actors—especially state-sponsored ones—requires classified intelligence that rarely goes public. This mystery might stay unsolved.


MORE NEWS