Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
?
Who’s Who On The Blockchains? THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
?
?
THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
01
WHY TYPOLOGIES MATTER
How we think about cryptocurrency typologies
THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Merchant services
Hosted wallets
Mining pools
Smart contracts, ERC-20, and ICOs
Exchanges
OTC Brokers
Cryptocurrency ATMs
Gambling
Exchange hacks and stolen funds
Mixers
Darknet Markets
Ransomware
Terrorist financing
Sanctions
Child sexual abuse material sites
Other
OUR DATA: HOW CRYPTOCURRENCIES FLOW BETWEEN TYPOLOGIES
FINAL THOUGHTS
04
05
08
09
10
12
13
14
16
18
19
20
23
24
26
29
31
32
35
38
48
Table of Contents1
2
3
4
02
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
1
03
Cryptocurrencies represent an opportunity to expand the way people transact globally. Since Bitcoin’s launch in 2009, cryptocurrency has launched new markets, spurred innovation in financial infrastructure, and driven innovative thinking in how we can meet the world’s economic needs.
But in order to drive continued growth and adoption, all relevant stakeholders — industry operators, traditional financial institutions, and governments — need a shared understanding of all the players in the cryptocurrency ecosystem. Only then can they identify the next big opportunities and ensure that blockchains are a safe place to do business. Key to this is an understanding not just of who the entities conducting cryptocurrency transactions are and how they act, but also the level of risk and illicit activity associated with them.
That’s where Chainalysis comes in. As the industry’s leading provider of blockchain analysis, investigations, and compliance software, we equip banks, businesses, and governments to understand which entities are transacting with cryptocurrency so that the industry can continue to grow safely and sustainably.
In this guide, we use our comprehensive, best-in-class blockchain dataset along with decades of combined investigative experience to break down the key categories — or typologies — of cryptocurrency transaction participants according to the level of risk they present.
1 WHY TYPOLOGIES MATTER
04
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
How we think about cryptocurrency typologies
The services and groups associated with each of these use cases make up the typologies we describe throughout this guide. As is clear from that list of use cases, cryptocurrency typologies run the gamut in terms of risk from a legal and compliance standpoint. Below, we’ve laid out all of the typologies we cover in this guide according to risk level.
The easiest way to group the entities transacting with cryptocurrency is to think about the ways cryptocurrency is actually used.
Mining
Buying/selling illegal goods and services
Investing and exchanging
Hiding trails (for privacy or money laundering)
Buying/selling legal goods and services
Stealing /scamming
Storing funds
05
On the left are services like hosted wallets and merchant services, which are used less often for illicit activity and are therefore lower risk.
On the right are typologies like terrorist financing schemes, which are illegal under any circumstances, and therefore rated as severely risky. Those in the middle aren’t universally considered illegal but are often linked to or used to aid in criminal activity.
These risk levels represent the typologies themselves, but aren’t enough on their own to assess the risk level of a specific entity. The only way to do that is to analyze that entity’s cryptocurrency transactions and counterparties in greater detail.
If you’re new to cryptocurrency, our typology guide will give you an understanding of each typology’s most common use cases and what you should be on the lookout for to limit risk of exposure to illicit activity.
1 | WHY TYPOLOGIES MATTER
SevereLow
Merchant services
Hosted wallets
Mining pools
ICOs
Exchanges
Gambling Darknet markets
Ransomware
Hacks / stolen funds
Terrorist financing
Child abuse material
Sanctions
Medium High
ScamsCryptocurrency ATMs
Mixers
Cryptocurrency typologies by risk levelCryptocurrency typologies by risk level
06
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
2
07
THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
2
08
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Merchant services
Merchant services providers allow mainstream businesses to accept cryptocurrency as payment for everyday customer purchases, whether they’re happening online or in person. Think of them as regular payment processors, like Stripe or Square, except they’re compatible with cryptocurrencies. Merchant services allow people to use cryptocurrency the same way they use fiat currency.
But why would somebody — consumer or business — want to use cryptocurrency over fiat currency? There are lots of reasons, but the biggest is the reduction of fees. Conventional payment methods like credit cards carry a fee for each transaction, which means the business has to either absorb the cost or pass it on to the customers.
Cryptocurrency payments are a more direct transaction, which means they can be faster, cheaper, and more efficient than credit cards. The same goes for cross-border payments and remittances.
As cryptocurrency adoption grows, merchant services adoption is also growing, with global companies like Starbucks, Whole Foods, and others now accepting cryptocurrency payments. In aggregate, merchant services usage has trended upwards over the last five years, with some dramatic spikes and declines during and after the Bitcoin price boom in 2017.
How it works
Examples
Possible exploit
Take cryptocurrency for invoicing, online, or in-person payments, convert to local fiat, and settle funds to merchant’s bank account
Bitpay, Flexa, Coinpayments, WebMoney, Coinify, Square etc
Usually low
Volumes, players, and acceptance growing as adoption grows
Financial services authorized to accept customer payments on behalf of a business. Known as payment gateways or payment processors.
Risk type
Malicious websites can be registered to accept cryptocurrency payments that are processed by merchant services
Description
Emerging trends
09
Hosted wallets
Currencies included: BCH, BTC, LTC, USDT
The merchant services category is generally a low-risk typology. Users are typically mainstream, traditional businesses on one end and their customers on another. However, it’s worth noting that scammers sometimes integrate merchant services with a malicious website to accept cryptocurrency payments from their victims.
How it works
Examples
Possible exploit
App or web based. No storage issues, sync lag or complex operations.
Xapo.com, Freewallet.org
Usually low
Increasing adoption due to ease of use and app convenience
Alternative to individually controlled wallets. Easier to use, and potentially more secure. Risky if you don’t choose a good one.
Risk type
Scam wallet services can steal a user’s private keys
Description
Emerging trends
2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
10
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
To understand hosted wallets, you need to understand how public and private keys enable cryptocurrency transactions. In simple terms, your public key is a digital, public-facing “signature” that represents your intention to send or receive cryptocurrency to all on the blockchain. Your private key, meanwhile, is a signature only you know and that ultimately allows you to sign off on transactions. If someone holds your private key, they functionally own all of the cryptocurrency funds associated with it.
Wallets aggregate and store users' public and private keys. Unhosted wallets (also known as non-custodial wallets) allow a user to store their public and private keys locally to their own device, giving them full control over their funds at all times.
But with that control comes responsibility. Unhosted wallet users are responsible for maintaining the security of their private keys against hackers or any other parties who would try to steal them and take control of the user’s funds. Unhosted wallets may also require users to download and store the blockchain in its entirety, making it difficult for day-to-day use.
Hosted wallets (also known as custodial wallets) eliminate the inconvenience of having to secure your own keys by storing your public and private keys in a wallet infrastructure owned and maintained by the wallet service provider. This results in a user experience similar to traditional banking and finance websites, making it easier for users to transact, albeit at the risk of less financial privacy and loss of direct control over funds.
Below are some of the more popular hosted and non-hosted wallets. Keep in mind that some services offer both options.
Provider
Popular hosted and non-hosted wallets
Hosted
✔
✔
Non-hosted
✔
✔
✔
✔
Key Value Proposition
In-wallet exchange service – no KYC
Offline, secure, encrypted servers
In-wallet exchange service
Can stake holdings for interest
125+ blockchains supported
Users should be on the lookout for scammers who set up malicious websites impersonating those of popular hosted wallet services in order to trick users into handing over their private keys and giving up control of their cryptocurrency.
Popular hosted and non-hosted wallets
11
Mining is the process of validating and adding transactions to the blockchain in exchange for newly generated cryptocurrency. It’s the key process for both regulating cryptocurrency issuance and maintaining blockchain security.
The most commonly used mining process is called Proof of Work (PoW) mining. Under a PoW system, miners solve a mathematical equation known as a hash, which requires them to guess a complex answer by brute force using dedicated computing power. The miner who finds the correct answer first has the right to create a new data block reflecting recent transactions and add it to the blockchain. The miner then takes ownership of the newly generated cryptocurrency.
Exactly how difficult is it to solve the math problems that power the blockchain? Their difficulty is quantified with a measurement unit called hash rate, which measures the total amount of computing power being thrown at mining for any one cryptocurrency — more computing power means more competition for each new block, making it harder for any one entity to win. The hash rate for Bitcoin has grown exponentially since 2017.
In the early days of Bitcoin, it was feasible for an individual to successfully mine new Bitcoin using their personal computer. But with increased competition, that’s now nearly impossible. Miners have responded by forming mining pools, in which a group of miners combine their collective computing power to increase their chances of success. Competition is fierce — some mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating today.
Mining pools are considered a low-risk typology since they receive the vast majority of their cryptocurrency through mining, and send it to the groups and individuals participating in the pool. However, some mining pools accept donations or receive cryptocurrency through means other than mining, in which case they could be exploited for money laundering.
How it works
Examples
Possible exploit
Mined block divided according to mining power (hash) each contributed
BTC.com (professionals). NiceHash (anyone with personal computer)
Usually low
Large corporations or mining pools dominate mining
Miners pool their resources (GPU/ASIC mining hardware)
Risk type
Most are one-way but some accept deposits → could enable laundering
Description
Emerging trends
Mining pools
2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
12
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
How it works
Examples
Possible exploit
Smart contracts can also store information, manage agreements, and function as multisignature accounts
ICOs: Bancor, EOS, Filecoin. Smart contracts: Storj (storage), IDEX (exchange), Etheroll (casino)
Usually low
IEOs – token sale held directly by exchanges (vs. via smart contracts)STOs – security token offerings. Governed as securities.
ERC-20 is the technical standard for most smart contracts on Ethereum blockchain, enabling token issuance for ICOs (crowdfunding mechanism)
Risk type
Scams and fraud schemes that rise with price rallies & investor interest
Description
Emerging trends
Ethereum is a blockchain with its own cryptocurrency and a built-in functionality for smart contracts. Smart contracts can store information related to a deal and automatically self-execute when the terms of the contract are fulfilled. Smart contracts can be agreed upon and enforced between two parties without the need for a third, since they don’t actually execute until each side has fulfilled their obligations.
ERC-20 is a technical standard used for most smart contracts on the Ethereum blockchain. ERC-20 allows for the issuance of tokens which can be used for initial coin offerings (ICOs).
ICOs are a means of crowdfunding for new cryptocurrency or related projects. The entity behind the new cryptocurrency would make their pitch and sell units of the token to investors in exchange for fiat currency or more mainstream cryptocurrencies like Bitcoin or Ether. Decentralized cloud storage application Storj is a great example, having raised $30 million in one week through an ICO built on the ERC-20 protocol.
The problem is that many ICOs have proven to be scams. There are countless examples of bad actors who build a flashy site promoting an ambitious project, raise funds through an ICO, and then simply pocket the money and walk away. The Pu’er Tea Token is a prime example: A group of investors released a new token they claimed to be backed by reserves of high-end Pu’er tea, convinced more than 3,000 investors they could get big returns, and walked away with $47 million before being arrested.
Initial Exchange Offerings (IEOs) are an alternative to ICOs. Whereas anyone anywhere can contribute to an ICO, IEOs are limited to one or more exchanges, who evaluate the projects before listing them. The exchanges also typically control the sale rather than have it executed through smart contracts. If the exchange involved is reputable, the chances that an IEO is a scam are much lower.
Smart contracts, ERC-20, and ICOs
13
Exchanges allow users to buy, sell, and trade cryptocurrency. They represent the most important and widely-used service category in the cryptocurrency industry, accounting for 90% of all funds sent by services. In the first half of 2019, exchanges sent nearly $64 billion in cryptocurrency value, with the largest exchange (by value transacted), Binance, sending $16 billion.
Like wallets, exchanges are typically custodial, non-custodial, or give users the option for either.
Custodial exchanges technically have control of your cryptocurrency since they hold the private encryption keys associated with the wallet. Big, centralized retail exchanges tend to be custodial, as their brand name makes them trustworthy for many users, who are often interested in trading quickly without the friction of entering their private key. In fact, trading on most of these exchanges happens off-chain—meaning, it’s not recorded on the blockchain—and is managed by the exchange itself, which is faster for users but reduces transparency.
How it works
Examples
Possible exploit
Sign up for an account. Some have more KYC than others. Some are p2p.
Coinbase, Kraken, Binance, Huobi, LocalBitcoins (also: BTC-e, WEX)
It varies
DEXs, instant exchangers
Online service for buying, selling, and trading cryptocurrency
Risk type
Heavily targeted by hackers/phishing. Money laundering
Description
Emerging trends
Exchanges
2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
14
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Non-custodial exchanges, on the other hand, give users control of their private keys. These exchanges tend to be decentralized or peer-to-peer (P2P), and oftentimes don’t even require users to set up an account. While that increases anonymity for users, it can leave those exchanges vulnerable to increased illicit activity.
That gets at the larger point about exchanges: some are better at complying with anti- money laundering regulations (AML) than others. While the most reputable exchanges have strict Know Your Customer (KYC) protocols in place and use tools like Chainalysis to monitor transactions for risky or illicit activity, others are much more lax on compliance, which makes them a greater money laundering risk.
Generally speaking, while exposure to illicit activity happens at a higher rate for smaller exchanges, large exchanges have much higher absolute amounts of exposure to illicit activity. Our data illustrates this below.
Overall, money sent from small exchanges is 6x more likely to go toward illicit activity than money sent from one of the ten largest exchanges. However, large exchanges still send a much higher total amount of illicit funds — roughly $203 million from the single biggest exchange vs. $1.5 million from all small exchanges combined. So while illicit activity remains a small percentage of large exchanges’ overall activity, large exchanges still face heavy scrutiny from law enforcement. Consider the case of BTC-e, which was one of the largest exchanges operating before it was shut down in 2017 for facilitating money laundering.
Illic
it pe
rcen
tage
of e
xcha
nge
tran
sact
ions
15
Authorities found that BTC-e had high exposure to money laundering schemes associated with ransomware, hacker groups, identity theft, tax fraud, and drug trafficking. Overall, more than $4 billion USD was laundered on the exchange, including 300,000 BTC stolen in the Mt. Gox Hack. But as the data illustrates, the biggest exchanges today take AML compliance more seriously and are at a far lower risk of enabling money laundering.
BTC-e shut down due to suspicions of money laundering
$110million civil penalty
300,000of stolen BTC from Mt. Gox
$4billion allegedly laundered
BTC-e shut down due to suspicions of money laundering
2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
OTC Brokers
16
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Over the counter (OTC) brokers facilitate large trades between individual buyers and sellers who can’t or don’t want to transact on an open exchange. OTC brokers are often associated with one or more exchanges but operate independently. Traders can work with OTC brokers if they want to liquidate a large amount of cryptocurrency for a set, negotiated price. OTC brokers are a crucial source of liquidity in the cryptocurrency market. While it’s impossible to measure the exact size of the OTC market, we know that it’s quite large. Cryptocurrency data provider Kaiko even estimates that OTCs could facilitate the majority of all cryptocurrency trade volume.
While most OTC brokers run a legitimate business, some work with criminal entities. OTC brokers are often held to lower KYC requirements than the exchanges on which they operate. Some take advantage of this to provide money laundering services to criminals, helping them cash out funds connected to illegal activity. An unscrupulous OTC broker would typically do this by exchanging criminals’ ill-gotten cryptocurrency for cash directly or for Tether as a stable intermediary currency.
We saw examples of OTCs acting as money launderers during our investigation of PlusToken, a massive Ponzi scheme that took in billions of dollars’ worth of cryptocurrency from millions of investors. As of December 2019, the PlusToken scammers moved roughly $185 million worth of stolen Bitcoin to exchange accounts associated with OTC brokers to be liquidated. Most of these cashouts resemble the pattern of transactions shown below, in which hackers moved a chunk of stolen funds through a series of intermediary wallets before funnelling the majority to OTC brokers.
Additionally, we’ve found that many accounts at compliant exchanges receiving significant funds from illicit sources are controlled by OTC brokers, many of whom have played a role in multiple criminal investigations we’ve participated in. However, the majority of OTC brokers who operate compliantly remain an integral part of the cryptocurrency ecosystem.
17
How it works
Examples
Possible exploit
ATM located in public spaces (malls, liquor stores, gas stations, etc)
CoinCloud, BitNational, CoinSource, and Coinstar
Low – Medium, depending on KYC
Growing. Variety of cryptocurrencies increasing (BTC, BCH, ETH, LTC+).
Convert cash into cryptocurrency and vice versa, similar to fiat ATMs
Risk type
Bad actors with lots of cash are tempted to convert to cryptocurrency
Description
Emerging trends
Cryptocurrency ATMs
2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Cryptocurrency ATMs are physical machines that allow users to convert cash to cryptocurrency or vice versa. As cryptocurrency adoption grows, we’re seeing huge increases in the number of ATMs installed.³
As a quick and easy means of converting between cash and cryptocurrency, the main concern with cryptocurrency ATMs is that they can attract criminals looking to launder funds. But many cryptocurrency ATMs have strong KYC protocols in place, which typically get stricter the more money a user is trying to deposit. Users are required to create an account with personally identifying information such as a phone number or ID photo, which makes the typology relatively low-risk.
The case of United States v. Kevin C. Fusco provides a good example of what cryptocurrency ATM KYC looks like in practice. It began when Fusco, a drug dealer active on various darknet markets, went to a cryptocurrency ATM and converted $32,000 worth of Bitcoin into cash. The ATM flagged the transaction as risky, and when Fusco returned to try and convert another $200,000 worth of Bitcoin, the machine rejected the request. Since the ATM provider collected Fusco’s driver’s license information during signup as part of the KYC process, law enforcement agents were able to connect these transactions to Fusco and use ATM records to bolster their case when they eventually arrested him.
18
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
The online gambling world was an early adopter of cryptocurrency, possibly because it allows users to gamble in jurisdictions where doing so isn’t allowed.
The risk profile of gambling services depends largely on jurisdiction. Gambling sites are considered risky in the U.S., since most states don’t allow gambling. But in Europe, online gambling is perfectly legal, so these services are considered low risk. However, some gambling sites have lax KYC standards, which can make them another destination for money laundering. As with the other typologies, it’s important to dig deep on the practices of individual services when assessing risk.
Gambling
How it works
Examples
Possible exploit
Individuals open account, send cryptocurrency and wager their funds. KYC is not very prevalent. Treated differently by jurisdiction.
mBitCasino, Oshi Casino, Konung Casino, BitStarz, etc
Medium – depends on jurisdiction
Lots of gambling sites are actually owned by a few holding companies
Online gambling sites for slots, sports/eSports betting – increasingly accepting cryptocurrency
Risk type
Can be used for money laundering
Description
Emerging trends
Interestingly, many gambling sites rely on the same handful of payment processors to carry out cryptocurrency transactions. While it may appear that the customer payments across distinct addresses are all being deposited to each individual casino, the addresses are all actually managed by a single, third party payment processor, which we refer to as a nested service under this arrangement. Below is one such example with popular payment processor CoinsPaid.
19
Exchange hacks and stolen funds
How it works
Examples
Possible exploit
Vulnerabilities exploited to move exchange funds to attacker’s control
Bitpoint, Binance, DragonEx, Cryptopia
High
Sophisticated, persistent social engineering to deliver remote access malware
Billions of dollars in cryptocurrency have been stolen in exchange hacks
Risk type
Big payoff per hack, often resulting in tens of millions in losses
Description
Emerging trends
This is just one example of concentration in online gambling. Many gambling websites use white label online casino software platforms that let them offer popular games without having to program the games themselves. In fact, while there may appear to be thousands of individual gambling websites operating, many of them are owned by the same holding companies.
How CoinsPaid handles payment for multiple gambling sitesHow CoinsPaid handles payment for multiple gambling sites
2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
20
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Hackers have stolen billions of dollars’ worth of cryptocurrency by attacking exchange wallets. Bitpoint, Binance, DragonEx, and several others have all been the target of prominent hacks.
You may think hackers must have exceptional computer skills to force their way into seemingly impenetrable cryptocurrency wallets. But in fact, social engineering is their most frequently used tactic. Hackers will typically try to trick exchange users or even employees into downloading malware that gives them access to one or more accounts. Once they’re in, savvy hackers will wait for months or more, observing the patterns of how money flows in and out so that they can steal the highest amount possible.
What does this look like in the real world? In one particularly audacious scheme, hackers set up an entire fake company, complete with a website, social media presence, and executive bios.
WFCProof was a fake company set up by hackers to trick employees at an exchange into downloading malicious software.
21
The hackers claimed to have created an automated trading bot, and messaged several employees at an exchange asking them to download the free trial. At least one of them did, and lo and behold, the trial included malware that helped the hackers obtain the private keys for several users’ wallets. The hackers began draining funds from those wallets soon after gaining access.
Hacks are a big concern for exchanges. It remains to be seen how the threat evolves as the industry matures and operational security measures become increasingly sophisticated.
The hackers made LinkedIn profiles for made up WFCProof employees.
2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
22
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Mixers are services that help users transact with greater privacy and obfuscate the source of funds. That capability, plus the fact that most mixers don’t have KYC requirements, makes them a popular money laundering mechanism. In fact, we’ve found that mixers are the most popular cashout destination for funds from illicit activity.
Mixers create a disconnect between the cryptocurrency funds that users deposit and what they withdraw, making it more difficult to trace the flow of funds. They do this by pooling together funds that all users deposit and mixing them together at random. Users can then receive funds back from the now-jumbled pool equivalent to what they put in, minus a 1-3% service fee. Some mixers make funds even more difficult to track by letting users receive different-sized chunks of funds at different addresses at staggered times. Others try to obfuscate the fact that a mixer is even being used by changing the fee on each transaction or varying the type of deposit address used.
While mixers aren’t illegal in their own right, law enforcement agencies have been treating them with more scrutiny and shutting down ones that hold substantial amounts of illicitly-gotten funds. For instance, in 2018, Dutch authorities shut down Bestmixer.io, a mixing service that had processed over $200 million worth of funds in the year preceding. Law enforcement determined that a substantial portion of those funds came from criminal activity.
Legal scrutiny aside, mixers have taken off in popularity over the last year. In the time period of October 2018 through September 2019, more than $631 million worth of bitcoin was sent to Wasabi Wallet, the most popular mixing service.
Mixers
How it works
Examples
Possible exploit
No KYC required. Exist on clearnet and darknet. Typically centrally controlled.
Chipmixer.com, CryptoMixer.io, Bitcoin Fog
High
LE shut downs → voluntary shut downs. Also, decentralized mixing protocols (e.g. CoinJoin, CashShuffle).
Websites or software for obfuscating the source of funds
Risk type
Mostly for cryptocurrency that’s been stolen or from darknet markets
Description
Emerging trends
23
Wasabi Wallet relies on a decentralized mixing method called the CoinJoin protocol, which differentiates it from other mixers. The first generation of mixers were vulnerable to law enforcement intervention because they functioned as centrally-managed services, fully under the mixer’s control. The CoinJoin protocol addresses this by providing a wallet service that allows multiple users to trustlessly join their payments into a single transaction with multiple recipients. CoinShuffle is another protocol that does the same thing for Bitcoin Cash.
Darknet markets
How it works
Examples
Possible exploit
Commercial website or marketplaces in the dark web (via Tor or I2P)
Empire, Point, Berlusconi, Silk Road 3.1, (Silk Road, AlphaBay, Dream)
Medium – High (depending on amount)
Innovated security measures to protect against exit scams
Black markets for drugs, stolen card data, weapons, child abuse material, etc
Risk type
Users at risk of “exit” scams without recourse
Description
Emerging trends
2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Tota
l Bit
coin
val
ue re
ceiv
ed p
er m
onth
in m
illio
ns o
f USD
24
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
The hacker revealed key insights into Nightmare Market’s operation, including:
• Nightmare’s registered users: Approximately 80,000 • Nightmare’s total revenue from late 2018 to July 2019 (when the alleged hack occurred):
$22 million USD• Vendors’ preferred cryptocurrencies: Bitcoin and Monero
Many buyers and vendors abandoned Nightmare Market soon after this hack (which was also accompanied by difficulties cashing out), moving to alternative darknet markets like Empire Market, Berlusconi Market, Cryptonia Market, and Samsara Market.
Darknet markets are commercial websites that function similarly to eBay, where users can come together to buy and sell goods using cryptocurrency. The key difference of course is that most of the goods available are illegal, including drugs, paraphernalia, weapons, stolen credit card data, child sexual abuse material, and more. Darknet markets are typically only accessible using browsing anonymization services like Tor and I2P. Darknet markets are one of our riskiest typologies, and any address or service with significant exposure to darknet markets would likely be treated with suspicion by regulators.
Given their obvious need for secrecy, it’s hard to come by individual darknet markets’ financials — they’re not exactly releasing annual reports. But the cryptocurrency world got a glimpse of some internal data during what now appears to be an exit scam carried out by the operators of Nightmare Market in 2019. A hacker allegedly gained backdoor access to Nightmare Market and released a trove of data on its operations, including figures on sales and revenue.
Source: DarknetLiveProprietary and Confidential 41
25
How it works
Examples
Possible exploit
Social engineering or vulnerabilities that lead victims to download malicious software
WannaCry 2.0, CryptoLocker, SamSam, NotPetya, Robbinhood, CrySiS
High
More targeted, higher $$ per attack, sophisticated social engineering
Malicious software that encrypts computer files for ransom
Risk type
Lots of organizations still haven’t installed critical patches
Description
Emerging trends
Ransomware
Ransomware is a method of cybercrime in which hackers inject malicious software onto a user’s computer that encrypts all of the files within. The hackers then demand the user pay a ransom to regain access to the files, usually in cryptocurrency. In the past few years, organizations large and small — including several local governments and hospitals — have fallen victim to ransomware attacks.
2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
US cities hit by ransomware in 2019
Lake City, FloridaTallahassee, Florida
Baltimore, Maryland
Jackson County, Georgia
Denver, Colorado
Atlanta, Georgia
Albany, New York
Augusta, Maine
Cleveland, Ohio
Riviera Beach, FloridaNew Orleans, Louisiana
26
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
These attacks have become common, with a new organization hit by ransomware every 14 seconds. Phishing scams and other forms of social engineering are the most common methods, with over 1.5 million new phishing sites created every month.
Notable, widespread ransomware campaigns include:
• WannaCry• CryptoLocker• Petya and its updated version, NotPetya• Robbinhood• CrySiS• SamSam
The Iran-based hackers behind SamSam became the first people to have their Bitcoin addresses listed on the US Department of Treasury Office of Foreign Assets Control (OFAC) sanctions list, after allegedly extorting more than $6 million from ransomware attack victims and causing over $30 million in damage.
Who’s behind most ransomware attacks? According to security researchers most of these bad actors fall into one of two groups.
Many are part of organized crime groups. These attackers typically play a volume game, launching attacks on many organizations for low dollar amounts. Most ransomware attackers demand victims pay 1 BTC (worth thousands of dollars), though they’ll adjust that figure based on that they think the victim is able to pay.
State actors are the second group behind many of the largest attacks. For instance, security researchers such as Recorded Future and Crowstrike have reported that the North Korea-sponsored Lazarus Group hacking outfit carried out the WannaCry ransomware campaign that made headlines in 2017. WannaCry was notable for its enormous scale, infecting 200,000 computers across 150 countries and causing over $4 billion in damages. WannaCry targeted organizations known all over the world, from Fortune 100 corporations like FedEx to government services like Britain’s National Health Service. In some cases of state-sponsored attacks, payment appears to have been secondary to simply causing chaos for targeted groups. In fact, the Russian-linked NotPetya attacks didn’t even appear to have functioning mechanisms for collecting payment or decrypting user’s files.
How do hackers determine who they target with ransomware? Victims typically fall into one or more of the following four categories.
27
High-value business targets refers to small or medium sized businesses. According to Beazley Breach Response Services, 70% of ransomware victims were small businesses in 2018, with a heavy preference for financial services companies. This isn’t surprising, as these organizations tend to have less robust security than larger companies and are often willing to pay up and resume business as usual.
Organizations with sensitive data. Organizations dealing with the potential loss of sensitive data have a huge incentive to pay up fast if they get hit by ransomware. Hospitals are a good example. Every second they don’t have access to patients’ medical data puts those patients at risk. Other frequently-targeted companies in this category include police protection programs and news organizations.
Low-security organizations. These targets are the low-hanging fruit for hackers in that they don’t have high IT security. For instance, many educational institutions have limited technology budgets, leaving them vulnerable to cyber attacks. HR departments have proven to be a weak point at many companies, as hackers have breached their systems by submitting fake job applications with malware attached.
Organizations with sensitive government information. State-sponsored actors specifically target organizations connected to their adversaries, such as government agencies, defense contractors, or political campaigns.
2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Typical ransomware targets today
28
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
What happens when a ransomware attack hits an organization?
Step 1
The organization notifies law enforcement
Step 2
Investigators track the flow of cryptocurrency via blockchain analytics software
Step 3
Conversion services used by attackers are identified
Step 4
Law enforcement, InfoSec teams and organization coordinate to build case
When organizations are hit by a ransomware attack, cyber security experts recommend that they contact law enforcement immediately and provide them with the ransomware payment address. Investigators can then use blockchain analysis software like Chainalysis to examine the flow of funds to and from the address, identify the services the ransomware operators use to convert funds and cash out, and hopefully link the address to a real-world entity.
Terrorist financing
How it works
Examples
Possible exploit
Social media or one-on-one private conversations, often via encrypted channels
Hamas, Al Sadaqah, Incite The Believers (Al-Qaeda affiliate)
Severe
On the rise, with varying (but increasing) levels of sophistication
Terrorist groups’ fundraising campaigns soliciting cryptocurrency
Risk type
Innovations (e.g. privacy coins) might increase terrorists’ adoption
Description
Emerging trends
What happens when a ransomware attack hits an organization?
29
Terrorist organizations are increasingly using cryptocurrency to raise money, typically soliciting donations through public fundraising efforts and one-on-one conversations on private, encrypted chat apps.
Terrorist groups are often quite explicit in stating what these donations will be used for. Check out the poster below produced by Jaysh Al-Ummah, a militant group in Gaza. They tell potential donors exactly what weapons their donations to the advertised Bitcoin address (obscured) will help their fighters buy.
Other solicitations are a bit more subtle and ambiguous in letting their audience know exactly who they’re donating to. Some terrorist-linked organizations may present themselves as regional charities raising money for medical supplies or to help the inhabitants of war-torn areas. The following image shows messages from a charity group claiming not to be linked to any militant groups, but later soliciting donations for reconnaissance drones to be used by mujahideen fighters.
2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
30
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
While the amounts of cryptocurrency being donated to terrorists are generally small today, the ability for these groups to solicit relatively frictionless donations from anyone in the world represents a troubling trend. Not to mention, the costs of executing a terrorist attack are very low. As former Under Secretary to the Treasury for Terrorism and Financial Intelligence Sigal Mandelker noted in a recent presentation, the average remittance payment with suspected terrorism links is only $600, which is more than enough to pay for a homemade suicide bomb or similar weapon. The activity could grow as anonymity-bolstering technology such as mixers and the like continue to improve.
Sanctions
How it works
Examples
Possible exploit
Entity names and cryptocurrency addresses are listed (in the US, it’s the Specially Designated Nationals list, or SDN)
SamSam ransomware individuals, fentanyl traffickers
Severe
Illicit activity can involve addresses at exchanges or uniquely generated ones (e.g. Hamas 3rd cryptocurrency fundraising attempt)
Anyone who falls under the authority jurisdiction issuing a sanction, including nationals operating elsewhere or businesses abroad that directly operate into the issuing jurisdiction, are prohibited from business dealings with the sanctioned entity.
Risk type
Jurisdictions such as Iran and Venezuela have indicated intent to use cryptocurrencies to get around sanctions
Description
Emerging trends
31
Sanctions are issued by governments to designate individuals and organizations with whom citizens are forbidden from doing business. Sanctions typically cover not just the prohibited entities themselves, but also any instrumentalities owned or controlled by those entities, including operating companies, bank accounts, and most recently, cryptocurrency addresses. You can find the list of those sanctioned by the U.S., for instance, on OFAC’s Specially Designated Nationals (SDN) list.
As mentioned in the ransomware section, the two Iran-based hackers who created the SamSam ransomware campaign became the first people to have their cryptocurrency addresses added to their entries on the OFAC sanctions list in 2018. But others have joined them since then. In August of 2019, OFAC sanctioned two Chinese nationals accused of manufacturing fentanyl and trafficking it into the U.S. for sale, and included the cryptocurrency addresses they used to accept payments.
Any exposure to sanctioned cryptocurrency addresses could draw heavy scrutiny from law enforcement for cryptocurrency businesses and any financial institutions working with those cryptocurrency businesses, including potential obligations to block assets from continuing transit or returning to designated senders, or otherwise benefiting designated entities, such as relieving debts. Exposure may also trigger Suspicious Activity Report (SAR) requirements.
A small, opaque subset of darknet websites specialize in the sale of child sexual abuse material (CSAM), often using cryptocurrency to facilitate the transactions. These sites typically don’t stay in operation for very long, possibly due to law enforcement operations and efforts by those running the sites to avoid detection.
Child sexual abuse material sites
How it works
Examples
Possible exploit
Buyers often become (re)sellers of content (it’s difficult to create and the same content be consumed over and over again by new buyers)
Welcome to Video site
Severe
Smaller sites don’t remain open for long (may be due to law enforcement efforts). Also, Monero increasingly being accepted.
Smaller scale websites on dark web that specialize in the sale of child sexual abuse material (also referred to as child pornography)
Risk type
Scam / fake sites; mirror sites (reselling material from another site)
Description
Emerging trends
2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
32
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Little is known to the general public about how these sites operate, so WTV provides a useful case study. WTV operated out of South Korea and allowed users to either buy CSAM with Bitcoin or upload their own content in exchange for points they could use to download more. Users received their own unique Bitcoin address upon signing up to use the site, which they would then use to send funds in exchange for content. WTV had 1.3 million Bitcoin addresses ready to be assigned at the time it was shut down, indicating it could support a large user base. Between 2015 and 2018, the site received more than $353,000 in payments.
Some CSAM sites function similarly to darknet markets in that they bring buyers and sellers together in a central marketplace. Others act as the sole seller themselves, and some demand users upload their own CSAM content to access the site’s material. Oftentimes, users will buy CSAM on one site and then turn around and sell it somewhere else.
In 2018, Chainalysis worked with the IRS Criminal Investigations unit, Department of Homeland Security, and other law enforcement agencies around the globe to take down Welcome to Video (WTV), the largest known CSAM website to date by volume of material available.
33
Investigators used Chainalysis Reactor to trace the flow of cryptocurrency funds in and out of the WTV operator’s Bitcoin address, as shown in the graph. That analysis enabled investigators to identify the exchanges the site’s users and operator were using, who they then subpoenaed to uncover more leads.
After shutting down the site and arresting its owner, investigators coordinated with other agencies around the world to arrest more than 330 WTV users and free at least 23 children from their abusers. You can read a more thorough breakdown of the case on our blog.
Chainalysis Reactor graph shows Bitcoin funds going in and out of Welcome to Video site.
2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
34
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Some entities dealing in cryptocurrency don’t fit neatly into any of the existing typologies or are part of a category that, while worth noting, is too small to consider separately.
One example is publications who seek donations via Bitcoin, most of which tend to post legally sensitive information or have a kind of anti-establishment ethos. Some of these appear relatively benign. Sci-hub, for example, offers free access to academic research papers, many of which are paywalled by the publishing journals. While the mission may be noble, Sci-hub often faces legal challenges for violating copyright law.
Other, more controversial publications and forums accepting cryptocurrency donations include:
• Wikileaks, well-known for publishing sensitive government documents supplied by whistleblowers and hackers
• The Daily Stormer, a white supremacist website• DeepDotWeb, a now-inactive user guide for darknet markets (though not a
darknet market itself)
Another interesting mini-typology is the bitcoin faucet.
How it works
Examples
Possible exploit
Entities that accept cryptocurrency in return for goods/services
Freebitco.in, RubRatings, The Daily Stormer, DeepDotWeb, Wikileaks, Sci-hub
It varies
Alt-right forums, adult service “tip jars”
Fundraising, faucets, ASIC hardware, lending, advertising, etc
Risk type
Scams. Fundraising for illicit or violent activity.
Description
Emerging trends
Other
35
Faucets like FreeBitco.in give users a small amount of cryptocurrency for completing simple tasks such as playing a game or watching an ad. Their business model is simple online ad arbitrage. After drawing users to the site with promises of free cryptocurrency, faucets try to then sell programmatic ads against the traffic coming in.
2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES
36
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
3
37
In this section, we share some of our research on how cryptocurrency moves between the different typologies we covered in the last section. We can’t provide a comprehensive view of all transactions; it’s too much data to visualize in a coherent way, and not all of it is relevant or interesting. Instead, we highlight a selection of particularly intriguing data points we’ve found.
OUR DATA: HOW CRYPTOCURRENCIES FLOW BETWEEN TYPOLOGIES
38
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Currencies included: BCH, BTC, LTC, USDT
This data suggests that most darknet market customers send funds from exchange wallets when they make purchases — this amounts to 80% of all funds received by darknet markets from January through September of 2019 if you combine conventional exchanges with P2P exchanges.
Interestingly, the reverse is true as well. When it’s time to cash out, darknet market vendors send more cryptocurrency to exchanges than anywhere else.
Currencies: BCH, BTC, LTC
exchange
p2p exchange
darknet market
mixing
uncategorized
Currencies included: BCH, BTC, LTC, USDT
exchange
p2p exchange
darknet market
mixing
uncategorized
unspent
Currencies: BCH, BTC, LTC
exchange
p2p exchange
darknet market
mixing
uncategorized
exchange
p2p exchange
darknet market
exchange
p2p exchange
darknet market
Darknet markets transact most often with exchanges
39
At first glance, this data may be surprising. With exchanges facing greater compliance scrutiny and implementing more and more security measures, why are so many darknet market vendors still using exchanges to cash out? The answer is likely a lack of alternatives — there simply aren’t other places to exchange large amounts of cryptocurrency for fiat currency. Even mixers are limited in their ability to cash out large amounts of illicit funds, since they rely on funds from many different sources to obfuscate their origins.
3 | OUR DATA: HOW CRYPTOCURRENCIES FLOW BETWEEN TYPOLOGIES
Currencies included: BCH, BTC, LTC, USDT
Above, we see the number of active darknet markets plotted against the average yearly revenue of those markets by year. In 2019, we see both the biggest drop in the number of active markets — due to both law enforcement action and voluntary closures — and the biggest jump in average revenue. The data suggests that users migrate to new markets when old ones close. Anecdotally, we can attest to the ability of both darknet vendors and users to coordinate with one another on forums to establish which markets have closed and which ones users ought to move to.
When darknet markets close, surviving markets pick up the slack
Currencies included: BCH, BTC, LTC, USDT
40
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Currencies included: BCH, BTC
Our data reveals that exchanges, other mixers, and scams are the most common identifiable typologies that send funds to mixers. The scams figure is most interesting of the three. 13.3% may not sound like much, but it dwarfs the percentage of scam funds going to other typologies. In fact, if you add up funds sent from scams, stolen funds, and darknet markets, we see that 22% of funds entering mixers come from illicit activity, compared to just 1% of funds entering exchanges.
Currencies included: BAT, BCH*, BNB, BTC*, CRO, CRPT, DAI, ETH, GNO, GUSD, HT, ICX, LEO, LINK, LTC, MCO, MKR, MLN, OMG, PAX, TUSD, USDC, USDT, WETH, ZIL, ZRX *Entered both mixers and exchanges, others only entered exchanges
Currencies included: BCH, BTC
Currencies included: BAT, BCH*, BNB, BTC*, CRO, CRPT, DAI, ETH, GNO, GUSD, HT, ICX, LEO, LINK, LTC, MCO, MKR, MLN, OMG, PAX, TUSD, USDC, USDT, WETH, ZIL, ZRX
*Entered both mixers and exchanges, others only entered exchanges
Mixers primarily receive funds from exchanges, other mixers, and scams
41
3 | OUR DATA: HOW CRYPTOCURRENCIES FLOW BETWEEN TYPOLOGIES
How did the cash out strategy differ between the hackers responsible for the Cryptopia, Binance, and Bitpoint hacks? The key difference is the use of mixers. The Binance and Bitpoint hackers relied heavily on mixers, while the Cryptopia hackers opted instead to send most of their funds to exchanges.
Currencies included: BCH, BTC* (**), ETH (**), GNO, LTC, OMG, TUSD, ZRX All of the above left Cryptopia, * also left Binance, (**) also left Bitpoint Please note that this graph doesn’t include unspent funds hackers have yet to move from their original wallets.
Currencies included: BCH, BTC* (**), ETH (**), GNO, LTC, OMG, TUSD, ZRX All of the above left Cryptopia, * also left Binance, (**) also left Bitpoint
76% 24% 29%
41% 17%
3%
2%
23% 33%24%
99% 32% 44%
54% 25%
4%
3%
Currencies included: BCH, BTC, ETH, LTC, MKR, OMG, USDT, WETH
Comparing the destinations of funds stolen in three exchange hacks
Mining pools receive most of their funds from mining, but also a substantial amount from exchanges
Currencies included: BCH, BTC, ETH, LTC, MKR, OMG, USDT, WETH
42
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Currencies included: BCH, BTCPlease note that this graph doesn’t include unspent funds ransomware attackers have yet to move from their original wallets.
Unsurprisingly, the majority of funds going into mining pools come directly from mining activity. However, 15.2% comes from exchanges, which seems odd at first glance. Why would anyone send funds from an exchange to a mining pool? It turns out that the mining pools themselves often use exchanges to redistribute earned funds to members, rather than doing it themselves.
Just like darknet market vendors, most ransomware attackers prefer to send their funds to exchanges when they decide to move the funds. Again, we believe they do this because there aren’t other viable options for cashing out large amounts of illicit funds.
Currencies included: BCH, BTC
The vast majority of ransomware funds are cashed out at exchanges
43
3 | OUR DATA: HOW CRYPTOCURRENCIES FLOW BETWEEN TYPOLOGIES
Looking at where exchanges have been receiving funds from over the years, three distinct periods emerge. In early 2011, when Bitcoin was just getting started and mining was extremely prominent, most funds were coming directly from miners. In 2012 and 2013, before exchanges were regulated, a high percentage of cryptocurrency entering exchanges came from darknet markets, presumably to be cashed out. By the end of 2013, most exchange activity was comprised of transactions with other exchanges, a trend that continued to grow steadily into the present day. Over half of all cryptocurrency received from services by exchanges since the start of 2013 has come from other exchanges, and today, that number sits around 75%.
Why do such a huge percentage of exchange transactions take place between two exchanges? Investment activity is one likely reason. Investment and trading are the two most prominent use cases for cryptocurrency today, and users frequently send funds from one exchange to another to access a wider variety of tokens, trading pairs, and investment products.
Arbitrage is another possible reason. In the traditional fiat world, markets are efficient and opportunities for arbitrage are few and far between. But cryptocurrency is a less mature asset class, so it’s not uncommon to see meaningful differences in price for the same cryptocurrencies on different exchanges.
exchanges (including p2p)
darknetmarkets
miningunnamedservices
other
terrorist financing, child abuse
material, sanctions
Today, exchanges transact most with other exchanges
44
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Regardless of region, exchanges mostly transact with other exchanges. We also see interesting differences in where exchanges headquartered in different regions are receiving funds from. European exchanges received 5% of funds from merchant services in the first half of 2019. While exchanges in the “Other” regional category received 12% of funds from mining — mostly driven by Russian activity — APAC exchanges take in the highest absolute volume of mined Bitcoin. In Latin America, a staggering 11% of funds received by exchanges came from scams in the first six months of 2019.
5% 11%12%
($23 B) ($23 B) ($17 B) ($4 B) ($3 B) ($0.6 B)
Ukraine, Russia, South Africa, Turkey
(Total value received by exchanges in region)
84%79%69% 73% 76% 48%
Exchange receiving activity by region: Europe leads the way in merchant services, LatAm brings in outsized amounts of scam proceeds
45
3 | OUR DATA: HOW CRYPTOCURRENCIES FLOW BETWEEN TYPOLOGIES
46
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
4
47
FINAL THOUGHTS
48
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
Consider this your jumping off point for cryptocurrency. You should now have an understanding of the different typologies transacting on the blockchain and which ones are likely to be risky versus less so.
But as we’ve emphasized throughout the report, understanding the typologies is just the beginning of cryptocurrency expertise. In order to truly vet cryptocurrency services or get actionable information from services you’re investigating, you need to be able to trace their transactions on an individual level. That’s what Chainalysis allows you to do.
This graph produced in Chainalysis Reactor, our cryptocurrency investigation software, shows the movement of funds stolen from Japan-based Bitpoint exchange in a 2019 hack. In this case, hackers took $92 million worth of Ripple, a popular cryptocurrency. On the left, you can see funds moved from the exchange to addresses controlled by the attacker, before being sent to several exchanges to be traded for bitcoin, before being reconsolidated and eventually sent to a mixer. These are the kinds of insights that can help bring the attackers to justice and recover the stolen funds.
49
If you’d like to learn more about how Chainalysis can help your team uncover similar insights and make the blockchain safer, visit our site to
learn more and sign up for a demo.
50
WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES
JANUARY 2020
?
BUILDING TRUST IN BLOCKCHAINS