Operator of Dark Web Platform FreeCity Exposed

Renowned on-chain investigator ZachXBT recently revealed the true identity of an individual linked to the dark web marketplace FreeCity. According to his findings, the user known as @sexinfochina is not merely a participant but the key operator behind the illegal platform. This individual has been actively promoting illicit services on Telegram and is accused of laundering funds for North Korean hacking groups multiple times, involving significant sums.

Money Laundering Tied to North Korean Cyber Heists

ZachXBT elaborated that two years ago, this user approached him to investigate why a centralized exchange (CEX) account had been frozen. Upon tracing the on-chain data, ZachXBT discovered a connection to a North Korean cyber heist involving over $100 million. This revelation raised red flags and led to a deeper investigation into the user’s illicit activities.

FreeCity’s Illicit Reach Extends Beyond Borders

While FreeCity’s primary user base appears to be based in China, ZachXBT emphasized that its illegal transactions are not confined to the region. Evidence points to a significant flow of illicit funds linked to Southeast Asia, suggesting the platform’s criminal reach spans multiple international jurisdictions.

  • User accused of concealing role as FreeCity operator
  • Linked to at least five laundering operations for North Korean hackers
  • Illegal transactions span across China and Southeast Asia