Illegal Crypto Transactions Reach A New Peak

More than $20.1  billion worth of illegal transactions were conducted using crypto-currency in 2022, according to the blockchain analysis company Chainalysis. They report a 11.7% per cent increase from the $18bn that was recorded in 2021.

Despite a market downturn, illicit transactions continued to gain ground in the crypto currency sector and the share of crypto currency activity associated with crime has risen consistently since 2019. These numbers are expected to get even higher as more criminal activity is uncovered by security researchers. 

Chainalysis works with law US enforcement agencies and the US government to trace crypto currency transactions and around 44% of the money was linked to sanctioned entities such as the Russian crypto currency exchange Garantex. The US Treasury’s Office of Foreign Assets Control sanctioned that company in April 2022, meaning that any trades conducted on the platform falls under the category of illicit. 

Chainalysis has estimated the of $20.1bn for 2022 is likely to increase as it identifies new addresses and in its current 2023 Crypto Crime Report, they say that transaction volumes fell across all of the other more conventional categories of cryptovcurrency-related crime, with the exception of stolen funds, which increased at a rate of 7% year-on-year.

Chainalysis:     Standard:      Oodaloop:     Infosecurity Magazine:    Punchng:      Arabian Business

You Might Also Read: 

Phishers Use Ukraine Invasion To Solicit Cryptocurrency:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Cyber Criminals' Earnings Fall As More Ransom Victims Refuse Payment 
Is Your Business Compliant With Data Sovereignty Requirements? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

Redscan Cyber Security

Redscan Cyber Security

Redscan Cyber Security is a Managed Security Services Provider (MSSP) that enables businesses to effectively manage their information security risks.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

Andreessen Horowitz (a16z)

Andreessen Horowitz (a16z)

Andreessen Horowitz (known as "a16z") is a venture capital firm in Silicon Valley, California that backs bold entrepreneurs building the future through technology.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

HSB

HSB

HSB offers insurance for equipment breakdown, cyber risk, data breach, identity recovery & employment practices liability.

Action1

Action1

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network.

ITProTV

ITProTV

ITProTV is part of the ACI Learning family of companies providing Audit, Cyber, and IT learning solutions for enterprise and consumer markets.

McAfee

McAfee

McAfee is a worldwide leader in online protection. We’re focused on protecting people, not devices. Our solutions adapt to our customers’ needs and empower them to confidently experience life online.