Crime

EU’s 20th Russia Sanctions Package Signals a New Era of Crypto-Specific Enforcement

TL;DR

  • The EU’s 20th Russia sanctions package introduces a total sectoral ban on Russia-based crypto service providers and decentralized platforms, marking the most crypto-specific enforcement action in the bloc’s history and targeting entire categories of evasion infrastructure rather than individual named entities.
  • As part of the overall sanctions package, state-backed crypto instruments — the RUBx stablecoin and the digital ruble CBDC — will be explicitly prohibited effective 24 May, reflecting the EU’s recognition that Russia has industrialized sanctions evasion through purpose-built blockchain infrastructure processing tens of billions in cross-border trade.
  • Third-country VASPs, particularly those in Central Asia, the Caucasus, and the UAE, face clear, direct designation exposure, illustrated by the sanctioning of Meer, a Kyrgyzstani exchange offering A7A5 trading pairs. This includes a ban on netting transactions.
  • The package pairs its crypto measures with the largest individual listings in two years — 120 further individual designations — plus expanded shadow fleet vessel bans (632 total), mandatory tanker due diligence, LNG service prohibitions, and tightened dual-use export controls targeting re-export corridors through Kyrgyzstan, China, Türkiye, and the UAE. Mirroring Russia’s crypto and trade restrictions, Belarus-specific measures are extended through February 2027, and have designated a Chinese state-owned entity under the Belarus regime for the first time.
  • The first-ever activation of the EU’s anti-circumvention tool signals a paradigm shift: the EU is now treating evasion architecture itself as sanctionable, meaning VASPs must expand screening beyond named SDNs to assess entire settlement ecosystems, counterparty networks, and jurisdictional exposure.

 

The European Union’s 20th sanctions package against Russia, adopted yesterday, represents a significant doctrinal shift: for the first time, crypto assets are not a footnote to financial sanctions, but rather a primary target. Due to sweeping sanctions on Russia’s financial sector, Russia is becoming increasingly reliant on cryptocurrencies for international transactions. As we have detailed, this trajectory was set in motion when Russia legalized cryptocurrency for cross-border payments in 2024, a move that has now fully crystallized into operational reality.

The EU has responded with a layered, multi-vector approach designed to close the on-ramps, off-ramps, and state-sponsored instruments that have emerged as Russia’s financial lifelines. The package includes a total sectoral ban on transacting with any Russian centralized or decentralized crypto asset trading platforms because of their use in circumvention. This is no longer a warning shot; it’s a structural prohibition on the entire Russian crypto services ecosystem, and compliance teams globally need to treat it accordingly for EU nationals wherever they are, EU-established entities wherever they operate, and to any person in respect of activities in whole or in part within EU territory.

State-backed stablecoins and the digital Ruble: new designated instruments

Two state-adjacent crypto instruments are now explicitly in scope. After sanctioning the A7A5 ecosystem in 2025, the EU’s new measures also prohibit the use and support of the RUBx ruble-backed stablecoin, as well as the digital ruble, a central bank digital currency (CBDC) under development by the Central Bank of Russia for the explicit purpose of sanctions circumvention. These designations signal that the EU is not just targeting permissionless networks or self-hosted wallets, but rather is directly naming instruments that Russia has been developing as SWIFT alternatives. A similar framework extends to Belarus: the package mirrors Russia’s crypto restrictions within the Belarus sanctions regime, which has been extended until 28 February 2027.

The EU is designating Kyrgyzstani exchange TengriCoin (doing business as Meer.kg), where significant amounts of the government-backed stablecoin A7A5 are traded. This move follows years of escalating enforcement against the broader Garantex-Grinex-A7A5 ecosystem that we have tracked extensively. As we have documented, A7A5 has been prolific, processing $119.7 billion to date and functioning as a purpose-built settlement rail designed to bridge sanctioned Russian businesses into the global financial system. In our 2026 Crypto Crime Report, we found that figure exceeded $93.3 billion in less than a year.

The Kyrgyzstani exchange designation is a landmark moment: it demonstrates that third-country virtual asset service providers (VASPs) facilitating Russian state-adjacent crypto instruments are firmly in scope of European sanctions, regardless of where they are incorporated. For VASPs operating in Central Asia, the Caucasus, or the Middle East — jurisdictions that have increasingly absorbed Russian capital flows — this is a direct regulatory signal that facilitating these instruments creates designation exposure.

Anti-circumvention at scale: third-country banks, netting transactions, and the SPFS Network

The financial architecture of sanctions evasion gets equally aggressive treatment. A transaction ban is imposed on 20 Russian banks, and four third-country financial institutions are banned for sanctions circumvention or ties to Russia’s SWIFT-equivalent, the System for Transfer of Financial Messages (SPFS) messaging network. Netting transactions with Russian agents are now forbidden to avoid the circumvention of EU sanctions. This is particularly consequential for crypto compliance: netting arrangements — where offsetting obligations between parties are settled on a net basis rather than gross — have been identified as a structural vehicle for obscuring the true counterparties of Russia-linked transactions.

This prohibition directly targets layering techniques commonly observed in blockchain transaction flows routed through intermediary jurisdictions. It also arrives in a timely context: as we reported last week, Russia’s shadow crypto infrastructure has been under sustained pressure, with Grinex, Garantex’s direct successor, halting operations in April 2026 following a possible false-flag cyberattack. VASPs, OTC desks, and payment processors that maintain correspondent or liquidity relationships with entities in Russia-adjacent jurisdictions must now conduct enhanced due diligence (EDD) not just on direct counterparties, but also on the netting mechanics of their settlement infrastructure. Compliance teams must take this into account when examining direct and indirect exposure.

Systemic pressure on Russia’s war economy

Beyond crypto, the 20th package also targets the physical infrastructure sustaining Russia’s war machine. An additional 46 vessels are now subject to a port access ban and a ban on a broad range of maritime transport services, bringing the total number of designated vessels to 632 — targeting non-EU tankers that are part of Russia’s shadow fleet, or that transport military equipment for Russia or stolen Ukrainian grain. Mandatory due diligence is now required for tanker sales, and maintenance and services for Russian LNG tankers and icebreakers are banned, with LNG terminal services for Russian entities prohibited beginning January 2027.

On the trade side, export controls have been expanded to include computer numerical control (CNC) machines and certain radios to Kyrgyzstan given high re-export risk to Russia, and 60 new entities face tighter controls on technology that enhances Russia’s defense sector, including entities in China, Hong Kong, Türkiye, the UAE, and Belarus — with a Chinese state-owned entity designated for the first time under the Belarus sanctions regime for its role in producing Belarusian military goods.

For compliance professionals, these measures underscore that sanctions evasion is a multi-modal problem, with crypto rails, shadow fleet logistics, and dual-use trade networks operating as an integrated system. The same jurisdictional corridors — Kyrgyzstan, UAE, China — that we have flagged in our sanctions analysis are the same corridors now being targeted by the EU in trade and maritime contexts, reflecting a maturation in the EU’s holistic enforcement approach.

What this means for VASPs and the compliance ecosystem

Since Russia’s full-scale invasion of Ukraine in 2022, the US, UK, and EU have built an increasingly dense multilateral enforcement architecture — designating numerous crypto-linked entities and driving OFAC’s Executive Order (EO) 14024 program to become its most active sanctions program — all while sanctioned entities’ illicit on-chain volume surged 694% to $104 billion in 2025. The 20th package is the latest and sharpest expression of that pressure. It is the biggest individual listings package in two years, with 120 further individual listings, and represents one of the most comprehensive and technically specific sanctions actions the EU has undertaken against the Russian crypto sector.

It also activates for the first time the EU’s “anti-circumvention” tool — a structural escalation that signals Brussels intends to treat evasion architectures, not merely the underlying violations, as sanctionable in their own right. For compliance teams, the operational implications will be felt effective 24 May. The sectoral ban on Russian crypto providers, including decentralized platforms, expands the screening perimeter beyond named entities to cover entire categories of service infrastructure.

These developments also need to be read alongside the new EU Anti-Money Laundering Regulation (AMLR), which entered into force in 2024 and will apply from 10 July (with a longer phase-in for some sectors). For EU-regulated CASPs, the designation of a Kyrgyz A7A5 exchange, the focus on Russia-adjacent financial institutions, and the first use of the anti-circumvention tool are all strong signals that supervisors will expect sanctions-evasion risk to be built into AMLR-driven, harmonized CDD/EDD frameworks by the time the rules bite. While many supervisors already expect EDD on higher-risk non-EU CASPs under the current AMLD5 plus TFR framework, AMLR will harmonize those expectations and make the link between sanctions-evasion risk and CDD/EDD for CASPs much more explicit and uniform across the EU from 10 July.

Taken together, the new measures now create an ecosystem-wide crypto restriction on both Russia and Belarus: EU persons are prohibited from transacting with CASPs and DeFi platforms established in Russia, and from providing MiCA-defined crypto-asset services to Belarusian nationals or Belarus-established entities — a framing that also captures Belarus-linked DeFi front-ends or platforms where they function as regulated service providers.

In practice, that means treating certain corridors — for example parts of Central Asia, the Caucasus, and the Gulf — as higher-risk from a sanctions-evasion perspective; applying EDD to third-country CASPs and OTCs in those jurisdictions (ownership and control, regulatory status, sanctions controls, use of A7A5/RUBx/digital ruble rails); and scrutinizing “correspondent” and nesting arrangements between EU CASPs and third-country platforms with a Russia nexus. AMLR does not itself create new sanctions prohibitions, but from 2027 it does make sanctions-evasion risk a core input into risk assessment, customer due diligence, ongoing monitoring, and governance for VASPs.

VASPs processing transactions that touch Russian blockchain addresses, Russia-linked stablecoin instruments, or counterparties in high-risk jurisdictions with a documented Russia nexus should treat this package as a prompt to re-evaluate their transaction monitoring thresholds and counterparty due diligence frameworks. Tools like Chainalysis VASP Risking and KYT-based red flag monitoring are purpose-built for exactly this operating environment — one where the compliance perimeter is defined not just by named SDNs, but by an entire ecosystem of services, settlement rails, and jurisdictional intermediaries that keep sanctioned value in motion. The message to the global crypto compliance community is clear: the permissive operating environment for Russia-linked crypto activity is shrinking, and the enforcement infrastructure to back that up is firmly in place.

 

This website contains links to third-party sites that are not under the control of Chainalysis, Inc. or its affiliates (collectively “Chainalysis”). Access to such information does not imply association with, endorsement of, approval of, or recommendation by Chainalysis of the site or its operators, and Chainalysis is not responsible for the products, services, or other content hosted therein. 

This material is for informational purposes only, and is not intended to provide legal, tax, financial, or investment advice. Recipients should consult their own advisors before making these types of decisions. Chainalysis has no responsibility or liability for any decision made or any other acts or omissions in connection with Recipient’s use of this material.

Chainalysis does not guarantee or warrant the accuracy, completeness, timeliness, suitability or validity of the information in this report and will not be responsible for any claim attributable to errors, omissions, or other inaccuracies of any part of such material.