• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Cyber-Criminals Are Using Mining Pools to Launder Crypto

You are here: Home / General Cyber Security News / Cyber-Criminals Are Using Mining Pools to Launder Crypto
June 16, 2023

Cyber-criminals are significantly diverting the proceeds of criminal offense to crypto mining swimming pools in get to obfuscate their origin, according to Chainanlysis.

The blockchain assessment company explained that mining pools, which permit teams of miners to blend their computational assets, are being applied as de facto mixers by these destructive actors.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Browse more on crypto-enabled crime: Just about $9bn Laundered in Cryptocurrency in 2021.

“In this scenario, the mining pool functions similarly to a mixer in that it obfuscates the origin of resources (reminder: you can not trace crypto as a result of services, mining swimming pools integrated) and creates the illusion that the cash are proceeds from mining instead than from ransomware,” Chainalysis stated in a site write-up.

“Our information indicates that this abuse of mining pools by ransomware actors may perhaps be climbing. Considering that the start off of 2018, we have observed a big, steady improve in price despatched from ransomware wallets to mining swimming pools.”

In point, tens of thousands and thousands of dollars’ truly worth of crypto have been sent from ransomware addresses to mining swimming pools every quarter over the earlier yr or so, the business discovered.

Chainalysis stated it’s also seeing significant volumes of electronic money going from ransomware wallets to exchange deposit addresses that get important funds from mining swimming pools.

“It’s probable that in conditions like these, ransomware actors are striving to go off their possess funds as mining proceeds, even although they’re not initially transferring the resources by way of a mining pool,” it included.

Some 372 exchange addresses with large publicity to mining pools have been given $158m from ransomware addresses because the get started of 2018, which is a huge share of the full price sent to all exchanges by all ransomware addresses about that period, the blockchain analysis organization claimed.

Not only ransomware actors but also crypto scammers are using mining pools to launder their cash, the report additional.

Chainalysis argued that this is a “solvable problem,” if mining swimming pools and hashing providers are additional rigorous about wallet screening – rejecting crypto coming from addresses joined to criminal action. Exchanges ought to also think about more diligently the entire exposure profile of wallets sending cash to them, by applying publicly accessible “know your transaction” tools, it concluded.


Some areas of this report are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News #InfosecurityEurope: How DORA Will Force Financial Firms to Adopt Cyber Resilience
Next Post: Barracuda Zero-Day Exploited by Chinese Actor Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.