⚠️ ACTIVE FRAUD — nanotrading.online is still live. Do NOT connect your wallet. Report Now →

Case Overview and Background

This investigation concerns an organized cryptocurrency fraud operation that identified itself as "Nanotrading Investment" — an entity with no regulatory registration of any kind, no SEC filing, no FINRA record, no foreign regulatory authorization, and no legitimate business structure.

The scheme is a textbook advance-fee investment fraud with cryptocurrency payment rails. The victim was told he was the beneficiary of a $1.2 million investment account previously owned by a deceased/departing account holder named "Mark Johnson." To receive the funds, he would need to pay a series of fees — termed a "5% clearance fee," amounting to approximately $60,175.

The victim paid a total of $36,150 in USDT cryptocurrency across multiple transactions before becoming suspicious and halting further payment. Our investigation traced $7,080 of the payments to on-chain TRON wallets and mapped the complete disbursement network.

The operation is assessed as still active. Funds continued cycling through identified sink wallets as recently as March 25, 2026. The fraud website nanotrading.online remained live as of the April 4, 2026 investigation date.

Case Summary Statistics
Case NumberNTI-LEAVITT-2026-001
Case TypeAdvance-Fee Investment Fraud
Payment MethodUSDT (TRC-20) on TRON
Total Claimed Stolen$36,150 USD
On-Chain Traced$7,080 USDT (8 transactions)
Wallets Identified14 (4 crime, 4 exchange, 6 operator)
Estimated Start DateMay 2024 (based on domain registration)
Fraud Collection ActiveMay 10 – September 10, 2025
Operation Last ActiveMarch 25, 2026 (sink cycling)
Fraud Websitenanotrading.online (still live)
Confirmed ExchangesBybit, Gate.io
Entity Variants Identified13 (Nanotrading, Nanotrade, etc.)

Victim Profile

⚠️ Privacy Notice
The victim's full details are contained in restricted investigative documents. Only information the victim has consented to include in public advocacy materials appears here. The victim's name is used in the case number and investigation file for law enforcement reference only.
Victim — William Leavitt
DesignationPrimary Victim / Complainant
Case ReferenceLEAVITT in NTI-LEAVITT-2026-001
Total Paid$36,150 USD
Payment MethodUSDT via TRON network
Contact by FraudMessages referencing "Mark Johnson" account
Fraud PersonnelDaniel Joseph Schumer (primary); Emily; Kristin
Fraud Account Claimed$1.2 million investment account
Pre-Payment Story"5% clearance fee = $60,175"
Stopped PayingPrior to reaching $60,175 limit

William Leavitt is a private individual who was targeted by an organized fraud syndicate using a multi-step confidence scheme. The victim was methodically manipulated over a period of months, with the fraudsters using documents, titles, and professional language to establish legitimacy before extracting payments.

For Other Victims
If you have been defrauded by the same group — anyone using the names Nanotrading Investment, NanoTrading Capital, NanoTrade Securities, or the wallet address TGf5bSmBBUPAY7bhsGhmafeD8w19h6sLdb — you are likely part of the same organized operation and your case will synergize with this investigation. Contact us via the Take Action page.

Suspect Personas

Three distinct personas were used to operate this fraud. These names are almost certainly aliases — the investigation identifies these as operational roles within the criminal group, not verified real identities. However, establishing the names used in communications is forensically important for law enforcement records.

⚠️ About These Names
"Daniel Joseph Schumer," "Emily," and "Kristin" are almost certainly fabricated identities. It is a standard practice in organized fraud operations to assign Western names to operators to build victim trust. The exchanges have the KYC data — passports, phone numbers, real addresses — that would establish real identities. These persona names are recorded for law enforcement reference and to identify the roles within the operation.

Daniel Joseph Schumer

Primary Suspect Account Manager Role

"Daniel" was the primary contact for the victim throughout the fraud. He presented himself as the official "account manager" responsible for the $1.2 million investment account. He was the one who sent the forged investment mandate and account statement documents, and who demanded the fee payments.

The surname "Schumer" may be a deliberate choice — it shares a name with a well-known US Senator — to create an air of American familiarity. This persona was the most communicative of the three and appears to have had full operational awareness of the scheme.

Documented Behaviors
  • Sent forged "Investment Mandate" PDF
  • Sent forged "Account Statement" PDF showing $1.2M balance
  • Demanded "5% clearance fee" ($60,175)
  • Provided TRON wallet address for payments
  • Escalated demands with additional excuse documents
  • Maintained ongoing communication during the collection period (May–Sep 2025)

Emily (surname unknown)

Secondary Role

"Emily" was a secondary contact who communicated with the victim at points during the fraud, likely serving as a backup account manager or "escalation" persona to give the operation the appearance of a real company with multiple staff members.

Her communications are documented in the case file but the specifics are reserved for law enforcement submission. She may represent a different member of the criminal group, or may be the same operator using a different identity for different communication channels.

Kristin (surname unknown)

Support Role

"Kristin" appears to have been introduced as a "compliance officer" or "legal department" persona — a common element in wire fraud operations where a fake regulatory compliance function is used to make the fee demands sound more official and harder to question.

The three-persona structure (account manager, support, compliance) is a known operational template used by organized pig-butchering and advance-fee fraud syndicates in Southeast Asia. This structural sophistication is consistent with an organized group, not a lone actor.

Entity Intelligence — "Nanotrading Investment"

The criminals built a professional-looking corporate identity for "Nanotrading Investment." Every element has been investigated. None of it is real.

Regulatory Database Results

DatabaseName SearchedResult
SEC EDGARNanotrading InvestmentNO RECORD
FINRA BrokerCheckNanotrading InvestmentNO RECORD
SEC Investment AdviserNanotrading / NanoTradeNO RECORD
CFTC LabCFTCNanotrading Investment LLCNO RECORD
UK FCA RegisterNanotrading*NO RECORD
ASIC (Australia)Nanotrading*NO RECORD
MAS (Singapore)Nanotrading*NO RECORD
SFC (Hong Kong)Nanotrading*NO RECORD
UK Companies House"Nanotrading" entityNO MATCH
Forensic Conclusion
Zero registrations found across nine major global regulatory databases. "Nanotrading Investment" has no legal existence in any jurisdiction searched. Any claim of regulatory oversight, licensing, or institutional affiliation is fabricated.

Domain Intelligence — nanotrading.online

Domainnanotrading.online
RegistrarHostGator (EIG/Newfold Digital)
Registered2024 (inferred from operation timeline)
ContentFake investment platform UI
Critical FindingSEED PHRASE HARVESTER
⛔ Wallet Drainer — Do NOT Connect
The nanotrading.online website contains a cryptocurrency wallet connection interface designed to steal the seed phrases or private keys of anyone who connects their wallet. If you visited this website and connected a MetaMask, TrustWallet, or any other crypto wallet, immediately transfer all funds to a new wallet and revoke all approvals.
HostGator Abuse Report Needed
HostGator is an ICANN-accredited registrar and is required to act on abuse reports for fraud and phishing sites. Filing an abuse report at abuse.hostgator.com or security@hostgator.com can result in the domain being suspended. See Take Action page for template.

13 Identified Entity Name Variants

The operation has been identified under these name variants in different victim communications and registration attempts. All share the same infrastructure and methodology.

Nanotrading Investment NanoTrading Capital NanoTrade Securities Nano Trading Group NanoTrade Investment LLC Nano Investment Partners NTI Capital Nanotech Investments NanoFX Trading Nano Digital Assets NanoCapital Group Nano Fund Management NTI Global

Document Forgery Analysis

The criminals provided "official" documents to support their story. Forensic metadata analysis exposes the true origin of these documents. You don't need a court-ordered subpoena to prove they're fake — the files themselves tell the story.

FORENSIC EVIDENCE — PDF METADATA
CONFIRMED FORGERY

Exhibit A: "Investment Mandate" PDF

Document Purports To BeOfficial financial institution mandate letter
Creator (PDF Metadata)PyFPDF 1.7.2
What PyFPDF IsOpen-source Python PDF generation library
Common Legitimate UsesDeveloper-generated receipts, reports, invoices
Real Bank/Firm UsesMicrosoft Word, Adobe Acrobat, Foxit, DocuSign
Forensic ConclusionDocument created by a Python programmer, not a financial institution

Exhibit B: "Account Statement" PDF

Document Purports To BeInvestment account statement — $1.2M balance
Creator (PDF Metadata)PyFPDF 1.7.2
Same Author Tool?Yes — both documents same origin library
Balance Displayed$1,200,000.00
Basis for that BalanceNone — it is a fabricated number in a Python script
Forensic ConclusionNo account exists; document is entirely fabricated
Why This Matters in Court
PDF metadata is maintained in the file's internal data structure and cannot be easily falsified after creation. The PyFPDF library stamps every PDF it creates with its version string as the "Creator" field. This is verifiable by any attorney, examiner, or court-appointed expert with free tools like pdfinfo or Adobe Reader's Document Properties panel. This is court-admissible evidence of document forgery.
How to Verify This Yourself
If you have received documents from "Nanotrading Investment" or a similar operation, you can check the metadata yourself:

On Windows: Right-click the PDF → Properties → Details tab → look for "Authors" or "Content Created" fields.
In Adobe Acrobat: File → Document Properties → Description tab → look at "Creator" and "PDF Producer."
Free online tool: Search for "PDF metadata viewer online" — several free tools will show you the hidden metadata.

If the Creator or Producer field shows PyFPDF 1.7.2, FPDF, or any programming library instead of a word processor or financial software, the document was created by a programmer, not a financial institution.

Fund Flow Summary — $7,080 USDT Traced

Blockchain analysis traced $7,080 in USDT through 14 wallets across three layers of the distribution network. The criminals used a "fan-out" pattern — collecting into one wallet, then dispersing to many — to complicate tracing. We traced all of it.

// FUND FLOW — $7,080 USDT — COMPLETE TRACE
👤
VICTIM
William Leavitt (identified) — $36,150 total paid
Multiple USDT payments via TRON wallet — May to September 2025
↓ $7,080 USDT (8 confirmed transactions)
LAYER 1 — FRAUD COLLECTION
TGf5bSmBBUPAY7bhsGhmafeD8w19h6sLdb
Received $7,080 USDT, 8 transactions, May 10 – Sep 10 2025. Now zeroed and abandoned.
↓ Multiple sweeps within 24–48hrs of each deposit
SINK A
TSt36w9ed...TzK
$116.94 REMAINING ← FREEZE
SINK B — GATE.IO
TLSptUx...myh
$366.94 REMAINING ← FREEZE
+ 7 MORE SINKS
Small amounts (<$50)
~$20 total remaining
↓ Bybit sent $1,880 TRX gas to fund collection wallet (Aug 2025)
🏦
BYBIT — Exchange #1 (KYC Available)
TU4vEruvZwLLkSfV9bNw12EJTPvNr7Pvaa
$235M+ exchange account. KYC subpoena will reveal the operator's real identity. Sent gas for Aug 2025 fraud cycle.
🏦
GATE.IO — Exchange #2 (KYC Available)
Provided energy to Layer 2 sink via Gate.io platform integration. $1,500 withdrawal confirmed. Separate KYC subpoena path.

Group Intelligence Assessment

This is not a lone scammer. The operational sophistication, multi-wallet architecture, exchange integration, energy market access, and cross-campaign activity are all characteristic of an organized criminal group. Here is what we know about the group.

Operation Profile
Operation TypeOrganized advance-fee / pig-butchering hybrid
Estimated SizeSmall to mid-tier group (3–15 operators)
Operational Since~May 2024 (based on domain age + history)
Estimated Total Victims50–200+ across all campaigns
Geographic OriginSoutheast Asia (high confidence — operational pattern)
Cryptocurrency SkillIntermediate (TRON TRC-20, DEX swaps, energy markets)
Document Forgery SkillIntermediate (PyFPDF, custom letterheads)
OPSEC LevelLOW-MEDIUM (used regulated exchanges with KYC)
Critical Finding: Dark Energy Market
Wallet TCvnWqQ2hFqqHFjpcCyRDZYb261G6WYdo4 — identified as an energy market provider for this operation — holds $27.3M in TRX (approximately 7.5M TRX) and provides energy to hundreds of active wallets. This entity itself is a target for FinCEN referral as a potential unlicensed money services business facilitating fraud. This finding extends the investigation well beyond the original case.

Why We Assess "Organized Group"

  • 1
    Three distinct operational roles (account manager, support, compliance) — requires coordination, not a single actor running all three personas simultaneously
  • 2
    Pre-built document forge system — PyFPDF-based PDF generation was set up before the victim was contacted, suggesting a reusable toolkit applied across multiple victims
  • 3
    Exchange-integrated gas operations — Bybit and Gate.io accounts funding fraud gas means operator has undergone KYC at two major exchanges, sophisticated enough to manage multiple accounts
  • 4
    Access to dark energy market ($27M TRX provider) — suggests relationship with a sophisticated criminal service infrastructure
  • 5
    13 brand variants — consistent naming conventions across variants suggest a developed identity rotation playbook used when one brand gets reported
  • 6
    Continued cycling activity (Mar 2026) — still active 7 months after abandoning this case's collection wallet, suggesting an ongoing multi-victim operation

Complete Case Timeline

~May 2024

Operation Infrastructure Built

Domain nanotrading.online registered. Fraud document templates (Investment Mandate and Account Statement) created using PyFPDF 1.7.2. TRON wallets prepared. Exchange accounts established at Bybit and Gate.io. Operation toolkit assembled.

Pre-May 2025

Initial Contact with William Leavitt

"Daniel Joseph Schumer" contacts victim claiming he is the beneficiary of "Mark Johnson's" $1.2 million investment account. Investment Mandate and Account Statement PDFs are sent. Victim is told he must pay a "5% clearance fee" of $60,175 to release the funds.

May 10, 2025

First On-Chain Payment — $3,000 USDT

First confirmed USDT transfer from victim to fraud collection wallet TGf5bSmBBUPAY7bhsGhmafeD8w19h6sLdb. Same day: operation gas wallet TJDENsfBJs4RFETt1X1W8wMDc8M5XnJhCe sends 54 TRX to fund collection wallet transactions. First sweep within 24-48 hours.

TronScan: TGf5bSmBBUPAY7bhsGhmafeD8w19h6sLdb → May 10, 2025
May 10–21, 2025

Phase 1 Collection — $4,080 USDT (5 payments)

Five payments totaling $4,080 USDT collected: May 10 ($3,000), May 13 ($280), May 14 ($200), May 15 ($300), May 17 ($300). Each payment swept within 48 hours to Layer 2 sink wallets. Operator gas wallet funds each sweep cycle.

May–August 2025

Gap Period — Additional Demands / Non-USDT Payments

Victim continues paying (reaching $36,150 total) but payments during this period are not all captured in the traced TRON wallet. Fraudsters escalate demands with new excuse documents. "Emily" and "Kristin" personas engaged. Payments may have gone to different wallets or been made via other methods.

August 5–25, 2025

Phase 2 Collection — $3,000 USDT (3 payments)

Three more payments: Aug 5 ($1,000), Aug 11 ($1,000), Aug 25 ($1,000). Bybit hot wallet TU4vEruvZwLLkSfV9bNw12EJTPvNr7Pvaa sends TRX gas to collection wallet in August (Aug 11, Aug 23, Aug 31). Gate.io provides energy through exit wallet.

Sept 1–10, 2025

Final Sweep — Collection Wallet Abandoned

Last payment September 1, 2025. Collection wallet fully swept September 10, 2025. TGf5bSmBBUPAY7bhsGhmafeD8w19h6sLdb abandoned with $0 balance. Victim stops payment. Fraud collection campaign ends — operators move to new victims.

March 25, 2026

Continued Activity — Sink Wallet Cycling Observed

Forensic monitoring identifies continued activity in sink wallet network. Funds cycling through Layer 2/3 wallets 7 months after this campaign ended — confirming the operators are still active and likely running new fraud campaigns.

April 3–4, 2026

Investigation Opened — This Report Filed

FTH Digital Forensics Unit opens formal investigation. CSV transaction data analyzed. 14 wallets identified. Exchange connections confirmed. Group intelligence profile completed. This site published. All documents submitted for law enforcement distribution.