Chainalysis Crypto Theft Hotline

The blockchain analytics company Chainalysis is starting a 24/7 hotline for cyber attack victims that have lost crypto funds.

The service will accept reports on incidents of hackers demanding crypto currency payments from organisations and companies. The company explains its decision to launch the reporting service  as due to “national security concerns” and issues with confidence in the crypto industry.

In a blog post, Chainalysis said its "Crypto Incident Response" service would operate 24/7 for victims of a “hack, ransomware attack, code exploit or flash loan attack” in which “crypto-currency funds are either demanded or stolen.” 

According to Chainalysis, hackers were responsible for the loss of more than $3 billion in crypto value through theft and ransom demands from 251 attacks in 2021, with transactions to and from illicit addresses representing 0.15% of total transaction volume in the space.

On receiving a report, the firm said a team would work with the victim to trace funds, if necessary, and potentially coordinate with local authorities. 

“Attacks are increasing in frequency and severity, presenting a significant barrier to building trust in crypto-currency, we’re investing in this service not just to assist organisations in their times of need, but also to help bring bad actors to justice and demonstrate that crypto is not the asset class of anonymity and crime,” said Chainalysis.

According to Kim Grauer, Chainalysis’ head of research, ransomware gangs are only getting more sophisticated. The average ransomware payment jumped 34% in 2021 as criminals went after bigger targets, and it shows no sign of slowing down.

Chainalysis has previously worked with authorities in the US government to address high-profile ransomware attacks and cyberattacks threatening the country's infrastructure. 

Chainanalysis:   Coin Telegraph:    Investing:    Binance:  Decrypt:    IQStock:  Tokensight:    Business Insider

You Might Also Read: 

Bitcoin Tanks:
 

« History Of Cyber Crime - Part 3 - Overview
Elon Musk Isn't Buying Twitter »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

Join this webinar to learn how the cloud threat landscape is evolving and organizations are deploying more advanced and capable security controls at scale.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Shavlik Protect

Shavlik Protect

Shavlik Protect is an easy-to-use security software solution that discovers missing patches and deploys them to the entire organization.

Ixia

Ixia

Ixia provides testing, visibility, and security solutions to strengthen applications across physical and virtual networks.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

IABG

IABG

Activities include consulting services in the development of software systems in the area of secure information and data communication.

SAASPASS

SAASPASS

SAASPASS is a full-stack identity and access management solution, a single product which allows you to manage all your digital and physical access needs securely and conveniently.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

Miratech

Miratech

Miratech is a global IT services and consulting organization offering a full range of IT infrastructure solutions and services including cyber security.

DataTribe

DataTribe

DataTribe is a cyber startup foundry, leveraging deep experience and expertise to build and launch successful product companies.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

SIXGEN

SIXGEN

SIXGEN provides incident response, operational and penetration testing, red teaming, tool development, cyber training development and continuous monitoring.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.

Labaton Sucharow

Labaton Sucharow

Standing on the horizon of law and technology, our Cybersecurity and Data Privacy Practice helps to protect consumers who have been harmed by businesses’ failures to safeguard their customers' data.