A sketchy scheme made Goldman Sachs pay
Big day today for Goldman Sachs and the Government of Malaysia, as they settled outside the court, the conflict regarding the criminal and regulatory proceedings concerning 1 Malaysia Development Berhad (1MDB).
Back in 2018, the Malaysian prosecutors filed charges against three Goldman Sachs units for misleading investors over $6.5 billion worth of bond sales, which was meant to fund the sovereign wealth fund 1MDB.
Goldman Sachs pleaded not guilty and denied any wrongdoing. From the group's point of view, various Malaysian government members and 1MDB lied about the future use of proceeds obtained from bond sales. According to both sides, roughly $4.5 billion got stolen from 1 Malaysia Development Berhad. The scheme involved the former prime minister of Malaysia – Datuk Seri Najib Razak and Goldman Sachs, and other culprits.
Goldman Sachs and the Malaysian government reached an “in-principle agreement” and settled for $3.9 billion that must be paid by the American group. Moreover, Goldman agreed to help the government to appoint an asset recovery specialist. However, the settlement doesn’t resolve other governmental and regulatory investigations that involve 1MDB.
Today, the stock price increased by 0.2%. This year, Goldman Sachs lost 11.7%, while USA30 slipped 6.6%.
Take a look at what CAPEX.com has to offer and start building you trading strategy!
Sources: malaymail.com, marketwatch.com
Gli utenti / lettori non dovrebbero fare affidamento esclusivamente sulle informazioni qui presentate e dovrebbero fare le proprie ricerche / analisi anche leggendo la ricerca reale sottostante. Il contenuto è generico e non tiene conto di circostanze personali individuali, esperienza di investimento o situazione finanziaria attuale.
Pertanto, Key Way Investments Ltd non accetta alcuna responsabilità per eventuali perdite di trader a causa dell'uso e del contenuto delle informazioni presentate nel presente documento. Le performance passate non sono un indicatore affidabile dei risultati futuri.