Chainalysis Crypto Theft Hotline

The blockchain analytics company Chainalysis is starting a 24/7 hotline for cyber attack victims that have lost crypto funds.

The service will accept reports on incidents of hackers demanding crypto currency payments from organisations and companies. The company explains its decision to launch the reporting service  as due to “national security concerns” and issues with confidence in the crypto industry.

In a blog post, Chainalysis said its "Crypto Incident Response" service would operate 24/7 for victims of a “hack, ransomware attack, code exploit or flash loan attack” in which “crypto-currency funds are either demanded or stolen.” 

According to Chainalysis, hackers were responsible for the loss of more than $3 billion in crypto value through theft and ransom demands from 251 attacks in 2021, with transactions to and from illicit addresses representing 0.15% of total transaction volume in the space.

On receiving a report, the firm said a team would work with the victim to trace funds, if necessary, and potentially coordinate with local authorities. 

“Attacks are increasing in frequency and severity, presenting a significant barrier to building trust in crypto-currency, we’re investing in this service not just to assist organisations in their times of need, but also to help bring bad actors to justice and demonstrate that crypto is not the asset class of anonymity and crime,” said Chainalysis.

According to Kim Grauer, Chainalysis’ head of research, ransomware gangs are only getting more sophisticated. The average ransomware payment jumped 34% in 2021 as criminals went after bigger targets, and it shows no sign of slowing down.

Chainalysis has previously worked with authorities in the US government to address high-profile ransomware attacks and cyberattacks threatening the country's infrastructure. 

Chainanalysis:   Coin Telegraph:    Investing:    Binance:  Decrypt:    IQStock:  Tokensight:    Business Insider

You Might Also Read: 

Bitcoin Tanks:
 

« History Of Cyber Crime - Part 3 - Overview
Elon Musk Isn't Buying Twitter »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TNS pay

TNS pay

TNS provides networking, managed connectivity, data communications and value added services

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

Titania

Titania

Titania provide network security and compliance software. Find your Network Security gaps before hackers do with our security & compliance tools.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

Iceberg

Iceberg

Iceberg has been established to provide companies with cyber security experts who will protect businesses from the unseen threat of cyber crime.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

Ubiq Security

Ubiq Security

Ubiq has developed a software solution that secures any type of data, on any device, anywhere, with nearly no impact to system performance or user experience.

Hexnode MDM

Hexnode MDM

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

American Cybersecurity Institute

American Cybersecurity Institute

American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

Castellum Labs

Castellum Labs

Castellum Labs offer a full range of services from Vulnerability Audits, Configuration Assessment and Red Teaming to fully Managed Detection & Response (MDR).

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.