Illegal Crypto Transactions Reach A New Peak

More than $20.1  billion worth of illegal transactions were conducted using crypto-currency in 2022, according to the blockchain analysis company Chainalysis. They report a 11.7% per cent increase from the $18bn that was recorded in 2021.

Despite a market downturn, illicit transactions continued to gain ground in the crypto currency sector and the share of crypto currency activity associated with crime has risen consistently since 2019. These numbers are expected to get even higher as more criminal activity is uncovered by security researchers. 

Chainalysis works with law US enforcement agencies and the US government to trace crypto currency transactions and around 44% of the money was linked to sanctioned entities such as the Russian crypto currency exchange Garantex. The US Treasury’s Office of Foreign Assets Control sanctioned that company in April 2022, meaning that any trades conducted on the platform falls under the category of illicit. 

Chainalysis has estimated the of $20.1bn for 2022 is likely to increase as it identifies new addresses and in its current 2023 Crypto Crime Report, they say that transaction volumes fell across all of the other more conventional categories of cryptovcurrency-related crime, with the exception of stolen funds, which increased at a rate of 7% year-on-year.

Chainalysis:     Standard:      Oodaloop:     Infosecurity Magazine:    Punchng:      Arabian Business

You Might Also Read: 

Phishers Use Ukraine Invasion To Solicit Cryptocurrency:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Cyber Criminals' Earnings Fall As More Ransom Victims Refuse Payment 
Is Your Business Compliant With Data Sovereignty Requirements? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

Oneconsult

Oneconsult

Oneconsult provides cyber security services focusing on penetration tests / ethical hacking, ISO 27001 security audits and incident response & IT forensics.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

Absio

Absio

Absio provides the technology you need to build data security directly into your software by default, and the design and development services you need to make it happen.

Global EPIC

Global EPIC

Global EPIC is an international cybersecurity initiative designed to combat growing world challenges by facilitating global collaboration in the field of cyber security.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

Helix Security Services

Helix Security Services

Helix Security provides IT & information security consultancy to government and businesses across New Zealand.

Covenant Technologies

Covenant Technologies

Make Covenant Technologies the only choice for your IT and cybersecurity recruitment needs. We deliver quality candidates at the forefront of the cybersecurity and IT industry.

Cytex

Cytex

Cytex is the All-in-One solution for SMB data protection & compliance needs.