{"id":21092,"date":"2023-05-12T14:04:30","date_gmt":"2023-05-12T10:04:30","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/crypto-laundering-and-ransomware\/21092\/"},"modified":"2023-05-12T14:04:30","modified_gmt":"2023-05-12T10:04:30","slug":"crypto-laundering-and-ransomware","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/crypto-laundering-and-ransomware\/21092\/","title":{"rendered":"How cybercriminals launder dirty crypto"},"content":{"rendered":"<p>You can hardly call cryptocurrency an anonymous means of payment. After all, since all transactions (well, almost all; more on that below) are written to the blockchain, the movement of cryptocurrency is fairly easy to trace. There are specialized analytical tools that make it relatively convenient and easy to locate both the source and destination of such funds.<\/p>\n<p>Aware of that, some ransomware victims assume that the best strategy is to pay the ransom, regain control over their corporate resources, and then go to law enforcement and simply wait while the investigation proceeds \u2014 leading, hopefully, to the funds eventually being returned back to their accounts.<\/p>\n<p>Unfortunately, it\u2019s not that simple. Cybercriminals invented various tools, techniques and services to compensate for the excessive transparency of blockchains. Those methods make it difficult or even impossible to trace cryptocurrency transactions. That\u2019s what we\u2019ll talk about today.<\/p>\n<h2>Intermediary crypto wallets<\/h2>\n<p>The simplest thing for cybercriminals to do with dirty crypto is spread it to fake wallets. In the case of very large-scale operations, such as the <a href=\"https:\/\/blog.chainalysis.com\/reports\/bitfinex-hack-seizure-arrest-2022\/\" target=\"_blank\" rel=\"nofollow noopener\">BitFinex hack<\/a> or the <a href=\"https:\/\/www.kaspersky.com\/blog\/sky-mavis-crypto-heist\/44981\/\" target=\"_blank\" rel=\"noopener nofollow\">Sky Mavis heist<\/a>, we could be talking several thousand fake wallets.<\/p>\n<p>But since all transactions are written to the blockchain anyway, using fake wallets doesn\u2019t solve the problem of tracing funds. As such, this technique is usually deployed only in the early stages of laundering in order to, first, muddy the trail, and, second, break up large sums into smaller ones, which can then by laundered more easily in other ways.<\/p>\n<p>Dirty crypto can often lie in those fake wallets for a long time. This is sometimes due to greedy cybercriminals waiting for the exchange rate to improve. In the case of transactions large enough to attract the attention of law enforcement, the reason is caution. Attackers try to keep a low profile until the scrutiny dies down and the funds become easier to withdraw.<\/p>\n<h2>Crypto mixers<\/h2>\n<p>Crypto mixers were invented with the express aim of solving the abovementioned problems of excessive blockchain transparency and insufficient privacy. They work as follows: incoming cryptocurrency transfers are poured into one \u201cpot\u201d and thoroughly mixed with funds coming in from other users of the service. At the same time, outgoing transfers of random amounts are made according to a random schedule and to completely different wallets, rendering it impossible to match incoming and outgoing amounts and identify transactions.<\/p>\n<p>Clearly, this is a very effective method of dealing with dirty crypto. And although far from all crypto-mixer users are cybercriminals, illegal funds do account for a <a href=\"https:\/\/blog.chainalysis.com\/reports\/crypto-mixers\/\" target=\"_blank\" rel=\"nofollow noopener\">significant portion<\/a> of the flows coming into crypto mixers; so significant, in fact, that in 2022 US regulators finally went after them, issuing sanctions on not one but <a href=\"https:\/\/home.treasury.gov\/news\/press-releases\/jy0768\" target=\"_blank\" rel=\"nofollow noopener\">two<\/a> <a href=\"https:\/\/home.treasury.gov\/news\/press-releases\/jy0916\" target=\"_blank\" rel=\"nofollow noopener\">popular crypto mixers<\/a>.<\/p>\n<h2>Large crypto exchanges<\/h2>\n<p>The overwhelming majority of transactions on crypto exchanges take place between internal client accounts, and are recorded in detail exclusively in these exchanges\u2019 own databases. Only the summarized results of a whole bunch of such internal transactions ends up in the blockchain.<\/p>\n<p>Of course, this is done to save both fees and time (blockchain bandwidth is limited, after all). But this means that any crypto exchange is a kind of natural crypto mixer: incoming and outgoing transfers can\u2019t be matched using blockchain analysis alone. The thread by which the movement of funds can be traced is cut when a transaction enters an exchange.<\/p>\n<p>On the one hand, this facilitates illegal activity. On the other, it adds considerable risks: by transferring funds to a major crypto exchange, cybercriminals no longer have full control over them. And since such exchanges generally <a href=\"https:\/\/blog.chainalysis.com\/reports\/blockchain-analysis-trace-through-service-exchange\/\" target=\"_blank\" rel=\"nofollow noopener\">cooperate with regulators and law enforcement<\/a>, the chances of losing the spoils are well above zero. In addition, bona fide crypto exchanges always have a Know Your Customer (KYC) verification procedure, which only adds to the risks and difficulties associated with laundering funds.<\/p>\n<h2>Small crypto exchanges<\/h2>\n<p>An alternative option for cybercriminals is to use small crypto exchanges that are less inclined to meet regulatory requirements and define themselves as anonymous. Oftentimes, such exchanges turn into full-fledged crypto-laundering platforms.<\/p>\n<p>But the more popular an exchange is with cybercriminals, the more likely it is to attract the unwanted gaze of law enforcement. What usually happens in the end is that the authorities\u2019 patience wears thin, and they find a way to take the platform down. For example, earlier this year U.S. authorities <a href=\"https:\/\/www.justice.gov\/usao-edny\/pr\/founder-and-majority-owner-bitzlato-cryptocurrency-exchange-charged-unlicensed-money\" target=\"_blank\" rel=\"nofollow noopener\">arrested the owner of Bitzlato Ltd.<\/a>, an exchange that handled hundreds of millions of dollars of dirty crypto. And a significant part of that dirty crypto came from ransomware operators and crypto scammers. European police also seized and disabled the exchange\u2019s infrastructure, thus putting an end to its activities.<\/p>\n<h2>Nested exchanges<\/h2>\n<p>Besides full-fledged crypto exchanges, there are also many so-called <a href=\"https:\/\/blog.liquid.com\/what-is-nested-exchange\" target=\"_blank\" rel=\"nofollow noopener\">nested exchanges<\/a>. These are essentially crypto-exchange intermediaries that allow users to trade cryptocurrency without the need to register exchange accounts.<\/p>\n<p>Such services resemble brokers from the world of traditional finance, only in the crypto universe they\u2019re used to ensure privacy\u00a0\u2013 in particular, by bypassing KYC, which is mandatory for all clients of large crypto exchanges. Theoretically nested exchanges work not only for the benefit of cybercriminals, but the opportunity to elude unwanted questions naturally attracts the attention of those looking to launder ill-gotten gains.<\/p>\n<h2>DeFi: decentralized protocols<\/h2>\n<p>Lastly, another option for cryptocurrency launderers is to use decentralized finance protocols (DeFi). These lie at the heart of automated <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptoscam-in-discord-fake-dex-airdrop\/39140\/\" target=\"_blank\" rel=\"noopener nofollow\">decentralized crypto exchanges<\/a> that operate on the basis of smart contracts. The advantages for cybercriminals are obvious: decentralized exchanges (DEX) perform no client checks and don\u2019t require account registration.<\/p>\n<p>Another plus of DEX is that funds remain under the full control of their owners (unless there\u2019s an error in the smart contract). True, there\u2019s one big minus: all DEX-based transactions are written to the blockchain, so with some effort they can still be traced. As a result, the number of cybercriminals who resort to DeFi is quite low. That said, DeFi can be an effective component of more complex multistage money-laundering schemes.<\/p>\n<h2>Dark-web laundering services<\/h2>\n<p>In case you\u2019re hoping that not every extortionist knows how to properly cover their financial tracks, we have bad news. Modern cybercrime is highly specialized. And there\u2019s been a growing trend of late for cybercriminals to use underground services dedicated exclusively to laundering dirty crypto. They provide what can be called laundering-as-a-service: variants of the above schemes to obfuscate the movement of cryptocurrency, thus unburdening their clients of this task.<\/p>\n<p>Laundering services advertise themselves on the darkweb and communicate with clients through secure messengers; everything is geared toward complete anonymity. According to even conservative estimates, such services last year raked in <a href=\"https:\/\/blog.chainalysis.com\/reports\/crypto-money-laundering-2022\/#underground-services\" target=\"_blank\" rel=\"nofollow noopener\">US$6 billion<\/a>.<\/p>\n<h2>Cashing out<\/h2>\n<p>As you may already know, a paradox of cryptocurrency is that it can <a href=\"https:\/\/www.kaspersky.com\/blog\/crypto-actually-non-fungible-tokens\/45597\/\" target=\"_blank\" rel=\"noopener nofollow\">buy<\/a> you an expensive picture of a monkey, but not a <a href=\"https:\/\/www.kaspersky.com\/blog\/crypto-actually-blockchains-and-cryptocurrencies\/45181\/\" target=\"_blank\" rel=\"nofollow noopener\">loaf of bread<\/a>. Therefore, the end goal of any illegal cryptocurrency operation is to cash out. This represents the final stage of any laundering scheme: once cryptocurrency has been turned into ordinary fiat money, clearly it can no longer be traced by means of blockchain analysis.<\/p>\n<p>There are many options here, and some of the above schemes provide such an outlet to the real world. When it comes to cashing out, both large and small crypto exchanges, nested exchanges that allow trading without opening an account, and dark-web laundering services that specialize in aiding cybercriminals (without specifying exactly how) can all be used.<\/p>\n<h2>What this means for ransomware victims<\/h2>\n<p>As you can see, cybercriminals have a wide range of means for laundering dirty crypto. And they\u2019re not limited to using only one of above-mentioned methods at a time. On the contrary, most cybercriminals employ sophisticated, multistage laundering operations that use crypto mixers, intermediary wallets, exchanges and various cash-out methods all at once.<\/p>\n<p>As a result, despite the best efforts of law enforcement, it\u2019s often <a href=\"https:\/\/blog.chainalysis.com\/reports\/axie-infinity-ronin-bridge-dprk-hack-seizure\/\" target=\"_blank\" rel=\"nofollow noopener\">difficult<\/a> to recover most of any stolen funds, even if an investigation is successful. So, in brief, don\u2019t hope to see again any money you paid as a ransom. As always, prevention is the best form of defense: install a <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">reliable security solution<\/a> on all devices \u2014 one whose anti-ransomware capabilities have been <a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-best-protection-2021\/42262\/\" target=\"_blank\" rel=\"noopener nofollow\">demonstrated in independent tests<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-ransomware\">\n","protected":false},"excerpt":{"rendered":"<p>Crypto mixers, nested exchanges, cash-out and other crypto-laundering methods used by ransomware operators.<\/p>\n","protected":false},"author":2726,"featured_media":21093,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[374,1308,2640,2641,1505,2553,1504,433],"class_list":{"0":"post-21092","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-bitcoin","11":"tag-blockchain","12":"tag-crypto-exchanges","13":"tag-crypto-wallets","14":"tag-cryptocurrencies","15":"tag-defi","16":"tag-ethereum","17":"tag-ransomware"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/crypto-laundering-and-ransomware\/21092\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/crypto-laundering-and-ransomware\/25674\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/crypto-laundering-and-ransomware\/28320\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/crypto-laundering-and-ransomware\/25972\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/crypto-laundering-and-ransomware\/26350\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/crypto-laundering-and-ransomware\/28835\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/crypto-laundering-and-ransomware\/35298\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/crypto-laundering-and-ransomware\/48186\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/crypto-laundering-and-ransomware\/20618\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/crypto-laundering-and-ransomware\/21300\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/crypto-laundering-and-ransomware\/30168\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/crypto-laundering-and-ransomware\/26275\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/crypto-laundering-and-ransomware\/31980\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/crypto-laundering-and-ransomware\/31669\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ransomware\/","name":"ransomware"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=21092"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21092\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/21093"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=21092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=21092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=21092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}