A Cryptomixer takedown announced today has removed one of Europe’s longest-running Bitcoin mixers from the ransomware and darknet tool kit. In a joint action led by Swiss and German police, and supported by Europol and Eurojust under “Operation Olympia”, officers seized the cryptomixer[.]io domain, three servers in Zurich and roughly €25 million (about $27–29 million) in Bitcoin, along with 12 terabytes of operational data.

How the Cryptomixer takedown unfolded
Operation Olympia ran between 24 and 28 November 2025, with investigators from Switzerland and Germany executing warrants on infrastructure tied to Cryptomixer and then handing coordination to Europol’s Joint Cybercrime Action Taskforce in The Hague. The platform’s domain was replaced with a seizure banner, and any funds in transit were effectively frozen once the service went offline.
The seizures (servers, Bitcoin and data) give investigators a detailed snapshot of how the mixer operated in practice. Europol’s statement notes that the 12 TB of logs and records will now be mined for links to ransomware crews, darknet vendors and fraud networks that relied on the service to cash out.
What Cryptomixer did for cybercrime
Cryptomixer has been active since 2016 as a “hybrid” service, offering both clear-web and Tor access. It pooled user deposits, broke the on-chain trail and redistributed funds in a way designed to frustrate blockchain analysis. Europol estimates that more than €1.3 billion (around $1.4-1.5 billion) in Bitcoin passed through its wallets, with a heavy concentration of ransomware, darknet-market and card-fraud proceeds.
Reporting around the case points to familiar patterns: ransom payments mixed and then sent to exchanges, market operators cycling drug and weapons profits through Cryptomixer before converting to fiat, and stolen card data ultimately ending up as “clean” cash after a detour through Bitcoin and the mixer’s pools. Its longevity, even after earlier operations such as the ChipMixer takedown in 2023, underlines how persistent demand for large, centralised mixers has been.
What this means for mixers after the Cryptomixer takedown
For law enforcement, the Cryptomixer takedown is another proof-of-concept: coordinated cross-border work, backed by Europol and Eurojust, can still hit centralised infrastructure hard, seize assets at scale and capture useful intelligence. The choice of target (a mixer with nearly a decade of history and clear ties to high-end cybercrime) makes it an easy case to defend politically.
No one involved expects the underlying behaviour to disappear. Analysts quoted around the operation already predict the usual pattern: a temporary scramble among ransomware crews and darknet vendors, followed by a shift towards other mixers, cross-chain bridges or more decentralised tools that are harder to tackle with a single raid. But each closure removes a piece of shared infrastructure, forces some groups to make mistakes as they move, and gives investigators another large dataset to mine for links.
Exploit TrackerDisclaimer
This article is for information and education only. It is not investment, legal, tax or financial advice. Always do your own research and consider speaking to a qualified professional before making financial decisions.


