• My Account
  • Shop
  • Cart

Cyber Bunee

  • Home
  • News
    • artificial intelligence
    • cyber-security
    • hacking attacks
    • software dev
    • automation
    • certifications
    • Videos
      • Youtube Videos
    • Resources

    Chainalysis Report: Misuse of Virtual Asset Services for Money Laundering

    bunee 16 Jun 2023

    Chainalysis Identifies Misuse of Virtual Asset Services

    Threat Actors are Using Mixers and Exchanges to Launder Money

    Cybersecurity firm Chainalysis has released a report claiming that virtual asset services like mixers and exchanges are being heavily misused by threat actors to launder money. According to the report, these cybercriminals use these platforms to obscure the origins of their funds and prevent law enforcement from tracking down their illegal activities.

    The Problem of Mixers

    The report indicates that mixers are the most commonly used service for money laundering among these criminals. Mixers are anonymization services that erase the link between the sender and the receiver of virtual assets by blending funds from multiple users and then redistributing them. This way, the authorities cannot trace the movement of specific funds.

    The Problem of Exchanges

    Furthermore, cybercriminals also exploit virtual asset exchanges. Some exchanges do not collect enough know-your-customer (KYC) information or perform anti-money laundering (AML) checks, becoming the perfect place to trade, convert and cash out illicitly obtained virtual assets.

    The Solution

    Chainalysis recommends that virtual asset service providers should perform KYC/AML protocols to help reduce illicit activities on their platforms. As a solution to the misuse of these services, Chainalysis suggests creating tools to trace transaction paths and identify suspicious activities.

    Summary

    Virtual asset services such as mixers and exchanges are being exploited by cybercriminals to launder money and obscure the origins of illicit funds. Chainalysis has suggested that virtual asset service providers invest in KYC/AML protocols and develop tools to trace the transaction path of virtual assets in order to curb these illegal activities.

    Original Article: https://www.infosecurity-magazine.com/news/cybercriminals-mining-pools/




    2023-06-16
    Facebook Twitter linkedin Pinterest WhatsAppt Telegram Email More
    Previous Article :

    “Russian National Charged with Deploying Global LockBit Ransomware Attacks: Legal Consequences and Global Efforts to Combat Cybercrime”

    Next Article :

    New Espionage Campaign “GhostEye” Targets Southeast Asia Organizations: Mandiant

    Similiar

    BlackBerry President Calls for Government Intervention in AI Risks

    BlackBerry President Calls for Government Intervention in AI Risks

    How Law Firms Can Protect Against Cyberattacks

    How Law Firms Can Protect Against Cyberattacks

    Why Universities are Common Targets for Ransomware Attacks

    Why Universities are Common Targets for Ransomware Attacks

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    See Also...

    BlackBerry President Calls for Government Intervention in AI Risks

    BlackBerry President Calls for Government Intervention in AI Risks

    BlackBerry President John Giamatteo Advocates for Government Intervention in AI Risks Introduction In an interview ...

    Latest News

    Innovating in Real Estate: Technology Landlords Can Use to Increase Profits and Make Management Easier
    news

    Innovating in Real Estate: Technology Landlords Can Use to Increase Profits and Make Management Easier

    bunee 02 Oct 2023
    And We’re Back!…
    news

    And We’re Back!…

    bunee 04 Jun 2023

    Tech Reviews

    Artificial Intelligence Takes Over Journalism: The Rise and Implications of AI-Generated Content in the Digital Age
    tech review

    Artificial Intelligence Takes Over Journalism: The Rise and Implications of AI-Generated Content in the Digital Age

    bunee 20 Jun 2023
    Tips and Gear to Stay Cool This Summer: Beat the Heat with These Simple Hacks
    tech review

    Tips and Gear to Stay Cool This Summer: Beat the Heat with These Simple Hacks

    bunee 20 Jun 2023
    The Importance of Technology Training for Government Employees
    tech review

    The Importance of Technology Training for Government Employees

    bunee 20 Jun 2023
    Choosing the Right Apple Laptop: A Guide for Budget and Professional Users
    tech review

    Choosing the Right Apple Laptop: A Guide for Budget and Professional Users

    bunee 20 Jun 2023
    “Oppenheimer Director Says AI is No More Dangerous Than Any Other Technology, but his New Movie Will Still Leave You Terrified”
    tech review

    “Oppenheimer Director Says AI is No More Dangerous Than Any Other Technology, but his New Movie Will Still Leave You Terrified”

    bunee 20 Jun 2023
    “US Counties Struggle with Severe Ob-Gyn Shortage: Post-Roe Laws Undermining Training Opportunities”
    tech review

    “US Counties Struggle with Severe Ob-Gyn Shortage: Post-Roe Laws Undermining Training Opportunities”

    bunee 20 Jun 2023
    Google’s Android Slate: The Ultimate Entertainment Hub and Smart Home Controller
    tech review

    Google’s Android Slate: The Ultimate Entertainment Hub and Smart Home Controller

    bunee 20 Jun 2023
    • Home
    • News
      • artificial intelligence
      • cyber-security
      • hacking attacks
      • software dev
      • automation
      • certifications
    • Videos
      • Youtube Videos
    • Resources

    Follow Us

    Popular Videos

    Newsletter

    Popular News

    • 1

      And We’re Back!…

    • 2

      New Magecart Campaign: Multiple Cybercrime Groups Operating Simultaneously

    • 3

      Major UK Organizations Suffer Data Breaches: Boots, British Airways, and the BBC Among Those Affected

    • 4

      Verizon Report: Human Error a Top Cause of Cybersecurity Incidents in 2019

    • 5

      Tech Firm Mitigates Ransomware Attack: Tips for Protection

    Fellow Sponsors

    Tags

    attacks break into cyber coinbase crypto hacking how to ransomware real estate technology updates
    (▀̿Ĺ̯▀̿ ̿) Copyright , All Rights Reserved
    Website courtesy of Lucid Perspective