On 1 December 2025 Europol announced Operation Olympia, a joint takedown with the German BKA, Swiss fedpol, and the U.S. Secret Service that dismantled cryptomixer.io (“CryptoMixer”). Servers in Frankfurt and Zurich were captured, the clearnet and onion portals now display a seizure banner, and approximately €25 million worth of BTC/XMR were frozen. The action eclipsed previous mixer busts such as Bestmixer and set the tone for future federal operations in the EU.
What CryptoMixer Promised
CryptoMixer ran a Tor-only dashboard that converted deposits into fixed “chips” between 0.01 and 10 BTC. Users could split chips, park balances for days, and trigger payouts directly to centralized exchanges—an attractive feature for ransomware crews highlighted in our crime chapter. Marketing copy bragged about pre-funded private keys and zero logs, while forum bots posted automated “proof of payment” replies to reassure large customers.
Behind the marketing, the operators maintained giant hot-wallet floats and recycled liquidity from major exchanges. Those same operational conveniences—centralized servers, predictable chip sizes, and affiliate dashboards—gave law enforcement an easy target list once complaints surfaced.
Why Investigators Moved
- Ransomware and pig-butchering flows: FIUs traced LockBit, ALPHV/BlackCat, and romance-scam proceeds into CryptoMixer within hours of each extortion.
- Direct exchange payouts: By advertising “send straight to Binance/Kraken/etc.,” the service positioned itself as an AML-evasion tool, similar to behaviors that triggered exchange freeze alerts.
- Ignored subpoenas: German and Swiss requests for customer records went unanswered, enabling prosecutors to pursue search warrants.
- User complaints: Months before the bust, customers alleged selective exit scams, suggesting the operators were recycling liquidity to cover previous losses.
Operation Olympia Timeline
27 Nov: Raids hit Frankfurt and Zurich data centers, imaging servers and copying helpdesk databases. 1 Dec: Europol publishes the seizure notice plus a list of deposit addresses so exchanges can freeze related UTXOs. 3–5 Dec: Secret Service cyber units file MLAT-backed requests with U.S. exchanges for historical logs. Mid Dec: Investigators announce more than $1.5 billion in historical flows have been mapped and promise to share logs with victims seeking clawbacks. Coverage from Europol and CoinDesk framed Olympia as the EU’s largest mixer seizure to date.
Investigators reportedly copied support tickets, affiliate spreadsheets, and chat transcripts—non-blockchain artifacts similar to the evidence cataloged in other DOJ/EU actions. Those logs now drive both criminal prosecutions and civil restitution efforts.
Impact and Lessons
Cross-border hosting is no shield: MLATs let agencies raid multiple countries simultaneously, so “Germany + Switzerland” offered no redundancy. Marketing matters: Promising exchange payouts effectively concedes that the service automates AML evasion. Custodial chips remain single points of failure: Users lost balances instantly and had no fallback unless they also used CoinJoin tools, Monero swaps, or peer-to-peer cash desks.
The bust also proved that mixers rarely disappear quietly. Once a service begins exit-scamming, investigators already have months of network telemetry ready; Olympia’s seized databases will likely feed future indictments just as Bestmixer’s data fed later cases.