1. Home
  2. Cybercrime

Cybercrime

Total Value of Crypto Stolen From DeFi Platforms in 2023 Plummets by 63.7% Year-on-Year: Chainalysis

Total Value of Crypto Stolen From DeFi Platforms in 2023 Plummets by 63.7% Year-on-Year: Chainalysis

Blockchain analysis firm Chainalysis says the value of crypto assets that cybercriminals stole in 2023 went down by more than 50% compared to 2022, largely due to a significant drop in hacking incidents targeting decentralized finance (DeFi) platforms. In a new report, Chainalysis notes that hackers stole just $1.1 billion from DeFi protocols in 2023, […]

The post Total Value of Crypto Stolen From DeFi Platforms in 2023 Plummets by 63.7% Year-on-Year: Chainalysis appeared first on The Daily Hodl.

Bitcoin mining stocks saw spikes across the board ahead of halving event

BIS advises central banks to plan in advance for CBDC security

From legal issues to hackers, launching a CBDC is fraught with risks, and BIS has a big list of them to consider.

Issuance of a central bank digital currency (CBDC) requires adequate attention to security, the Bank for International Settlements (BIS) reminded central bankers in a report on Nov. 29. An integrated risk-management framework should be in place starting at the research stage, and security should be designed into a CBDC, the report said.

Risks associated with CBDCs will vary across countries, as conditions and goals vary, and they will change across time, requiring continual management. These risks can be broken down into categories and a wide array of individual factors, the study demonstrated. The risks grow with the scale and complexity of the CBDC. In addition:

“A key risk are [sic] the potential gaps in central banks' internal capabilities and skills. While many of the CBDC-related activities could in principle be outsourced, doing so requires adequate capacity to select and supervise vendors. […] A number of operating risks for CBDC stem from human error, inadequate definitions or incomplete planning.”

Cybersecurity may be challenged by other countries, hackers, users, vendors or insiders. The study identified 37 potential “cyber security threat events” from eight specific risks. Distributed ledger technology may be unfamiliar to a central bank and so not undergo full vetting or cause overdependence on third parties.

Related: Security audits ‘not enough’ as losses reach $1.5B in 2023, security professional says

The study suggests an integrated risk management framework to mitigate CBDC risks.

Proposed CBDC resilience framework. Source: BIS

Despite the limited use of CBDCs in real life so far, several examples of risk management failure can be found. China found it was unprepared for the data storage requirements after it launched its digital yuan pilot. The Eastern Caribbean Central Bank’s DCash, a live CBDC, suffered a two-month outage in early 2022 due to an expired certificate in the software.

On the other hand, the DCash pilot project had been considerably expanded the previous year to provide support in Saint Vincent and the Grenadines after a volcanic eruption there, improving the currency’s resilience, the study reminded.

Magazine: HTX hacked again for $30M, 100K Koreans test CBDC, Binance 2.0: Asia Express

Bitcoin mining stocks saw spikes across the board ahead of halving event

Australian regulators will compel businesses to report cyberattacks: Report

This obligation won’t be backed by a fine if the company fails to comply, and businesses will still be permitted to pay ransoms, though this is discouraged.

Australian authorities will oblige local companies to be fully transparent and report any ransomware cyberattacks on their businesses. The country’s economy lost $2.59 billion to cybercrimes in 2021. 

As reported by the Australian on Nov. 13, the national cybersecurity strategy, which will be revealed this week, will feature a mandatory system under which local businesses must alert the government about ransomware cyberattacks. However, this obligation won’t be backed by a fine if the company fails to comply.

The companies will still be allowed to pay ransoms, although new National Cyber Security Coordinator Air Marshal Darren Goldie has publicly discouraged them from doing so. In October, Australia joined almost 40 other nations in a pledge not to pay ransomware demands made against government agencies.

Related: The anatomy of a cyberattack

Before enacting the mandatory system, the government intends to consult with the business community on its design, as Minister for Cyber Security Clare O’Neil has specified:

“We’ll create a ransomware playbook that will provide clear guidance to businesses and citizens on how to prepare for, deal with, and bounce back from ransom demands.”

Ransomware attacks remain a common problem in the digital economy. In July, The United States Department of Justice (DoJ) announced the doubling of its crypto crimes team and setting the immediate focus on combatting ransomware crimes. 

According to Chainalysis, wallets involved in ransomware attacks often turn to crypto mining pools to launder the funds acquired through exploits. The research firm believes there has been an increase in value sent from ransomware wallets to mining pools. In one instance, Chainalysis highlighted that an exchange wallet address had received $158.3 million from ransomware addresses since 2018.

Magazine: 2 years after John McAfee’s death, widow Janice is broke and needs answers

Bitcoin mining stocks saw spikes across the board ahead of halving event

China declares stealing digital collections like NFTs liable for criminal theft sentence

The Chinese government says theft of digital collections violates the protection law and interests of the crime of illegally obtaining computer information system data.

The Chinese government released a statement on Nov. 10 declaring that anyone stealing digital collections, such as nonfungible tokens (NFTs), will be subject to theft sentences. 

It outlines three views on the type of crime that theft of digital collections falls under, the first two classifying it as either data or digital property. However, the statement stresses the third view which sees digital collections as both data and virtual property that would fall under the umbrella of “co-offending.”

The statement explained that stealing a digital collection includes intrusion into the system on which it is housed, therefore also committing the crime of illegally obtaining computer information system data and theft.

“The theft of digital collections violates the protection law and interests of the crime of illegally obtaining computer information system data.”

It elaborates on this topic, naming digital collections “network virtual property” and stressing that in the criminal law context, “collections should be recognized as property.”

“Since property is the object of property crime, digital collections can obviously become the object of property crime. If the digital collection is stolen by intrusion into the system or other technical means, the act also damages the property law.”

Related: 47 countries pledge to authorize the crypto-asset reporting framework by 2027

NFTs were specifically mentioned, establishing that digital collections are derived from the concept of NFTs “abroad” and use blockchain technology to “map specific assets” with “unique, non-copyable, tamper-preventing, and permanent storage characteristics.”

The declaration said that although China has not opened the “secondary flow market” for digital collections “consumers can rely on trading platforms to complete purchases, collections, transfers, destruction and other operations to achieve exclusive possession, use, and disposal capabilities.”

Despite China’s official ban from 2021 on nearly all crypto-related activity and transactions other than simply owning cryptocurrencies, there has been recent buzz surrounding NFTs.

A local Chinese media reported on Oct. 25 that the Alibaba-owned peer-to-peer marketplace Xianyu removed its censorship of “nonfungible tokens” and “digital asset” related keywords in its search.

Prior to that, on Oct. 6 China Daily, an English-language newspaper owned by the Chinese government, announced that it wanted to create its own NFT platform and would award 2.813 million Chinese yuan ($390,000) to a third-party contractor to design the platform up to its specifications.

Magazine: Australia’s $145M exchange scandal, Bitget claims 4th, China lifts NFT ban: Asia Express

Bitcoin mining stocks saw spikes across the board ahead of halving event

Can crypto Privacy Pools help balance privacy and regulation?

When it comes to privacy and regulation, could Vitalik Buterin’s Privacy Pools be the answer?

Ethereum co-founder Vitalik Buterin recently authored a research paper, the primary focus of which was integrating privacy features into blockchain transactions while ensuring compliance with a range of regulatory requirements.

Experts from various backgrounds collaborated on this research project, including early Tornado Cash contributor Ameen Soleimani, Chainalysis chief scientist Jacob Illum, and researchers from the University of Basel.

The diverse team reflects the interdisciplinary nature of the research, drawing insights from cryptocurrency, blockchain security and academic scholarship.

The paper suggests a protocol known as “Privacy Pools,” which can act as a regulation-compliant tool aimed at improving the confidentiality of user transactions.

How do Privacy Pools work?

Privacy Pools, as Buterin and the team explain in the research paper, aim to protect the privacy of transactions while separating criminal activities from lawful funds by organizing them into isolated sets or categories, allowing users to prove to regulators that their funds are not mixed with illicit funds.

This is accomplished through the use of techniques like zero-knowledge proofs to demonstrate the legitimacy of the transactions and the absence of involvement with criminal activities.

Zero-knowledge proofs are cryptographic techniques that allow one party (the prover) to demonstrate knowledge of a specific piece of information to another party (the verifier) without revealing any details about the information itself.

When users want to take their money out of the Privacy Pool, they can choose to create a zero-knowledge proof. This proof does two things: First, it confirms that the user’s transaction is legitimate and doesn’t involve a blockchain address associated with criminal activity. Second — and more importantly for users — it keeps their identities private.

Association sets

Another crucial part of how Privacy Pools work is the idea of “association sets,” subsets of wallet addresses within a cryptocurrency pool. When making withdrawals from the pool, users specify which association set to use. These sets are designed to include only noncritical or “good” depositors’ wallet addresses while excluding those considered “bad” depositors.

The purpose of association sets is to maintain anonymity, as withdrawn funds can’t be precisely traced to their source. However, it can still be proven that the funds come from a noncritical source.

Association set providers (ASPs) create these sets and are trusted third parties responsible for analyzing and evaluating the pool’s contributing wallets. They rely on blockchain analytics tools and technologies used in Anti-Money Laundering and transaction analysis.

Association sets are formed through two distinct processes: inclusion (membership) proofs and exclusion proofs.

Membership proofs include “good” transactions, while exclusion proofs include “bad” transactions. Source: Buterin et al., 2023

Inclusion, also known as membership, is the process of curating a selection based on positive criteria, much like creating a “good” list. When considering deposits, for instance, you examine various options and identify those with clear evidence of being secure and low-risk.

Recent: Multiple buyers consider purchase and relaunch of ‘irreparable’ FTX

Exclusion involves forming a selection by focusing on negative criteria, much like compiling a “bad” list. In the context of deposits, ASPs evaluate different options and pinpoint those that are evidently risky or unsafe. Subsequently, they generate a list that comprises all deposits except for the ones categorized as risky, thereby excluding them from the list.

Eve’s deposit comes from an untrusted source. Source: Buterin et al., 2023

The paper takes an example of a group of five people: Alice, Bob, Carl, David and Eve. Four are honest, law-abiding individuals who want to keep their financial activities private. 

However, Eve is a thief or hacker, and this is well known. People may not know who Eve really is, but they have enough proof to know that the coins sent to the address labeled “Eve” come from a “bad” source.

When these individuals use the Privacy Pool to withdraw money, they will be grouped together by ASPs with other users based on their deposit history via association sets.

Alice, Bob, Carl and David want to make sure their transactions are kept private while reducing the chances of their transactions looking suspicious at the same time. Their deposits have not been linked to any potential malicious activity, so the ASP chooses for them to be associated only with each other. So, a group is created with just their deposits: Alice, Bob, Carl and David.

Eve, on the other hand, also wants to protect her privacy, but her own deposit — which comes from a bad source — cannot be left out. So, she’s added to a separate association set that includes her deposit and the others, forming a group with all five user’s deposits: Alice, Bob, Carl, David and Eve.

Essentially, Eve is excluded from the original group with the trusted deposits (Alice, Bob, Carl and David) but is instead added to a separate group that includes her transactions and the others. However this doesn’t mean that Eve can use the privacy pool to mix her funds.

Now, here’s the interesting part: Even though Eve doesn’t provide any direct information about herself, it becomes clear by the process of elimination that the fifth withdrawal must be from Eve, as she’s the only one associated with all five accounts in the withdrawal records (since she was added to the separate group that included all five deposits).

Association sets help Privacy Pools by separating trustworthy users from questionable ones.

This way, transactions from reliable sources stay private, while any shady or suspicious ones become more visible and easier to spot.

This way, malicious actors can be tracked, which can satisfy regulatory requirements since the bad users won’t be able to use the pools to hide their activities.

What are others saying about the proposals?

Buterin’s paper has sparked discussions and garnered attention from the blockchain community and industry experts. Ankur Banerjee, co-founder and chief technology officer of Cheqd — a privacy-preserving payment network — believes Privacy Pools can make it easier for noncentralized entities to identify bad actors.

Banerjee told Cointelegraph, “The approach outlined could make this kind of money laundering analysis more democratized, and available to DeFi protocols as well. In fact, in the case of crypto hacks, it’s very hard to prevent hackers from trying to launder what they’ve stolen via DeFi protocols — it’s only centralized exchanges where they can be more easily caught/stopped.”

Seth Simmons (aka Seth For Privacy), host of the privacy-focused podcast Opt Out, told Cointelegraph, “While the concept is technically interesting in that it does minimize the data given over to regulated entities, it asks and answers the wrong question. It asks the question ‘What privacy are we allowed to have?’ instead of ‘What privacy do we need to have?’”

Simmons continued, saying, “For years now, there has been no balance between user anonymity and regulatory compliance, with the current ruling powers having an almost total visibility into the actions we take and the ways we use our money.”

“Privacy Pools must seek to right this imbalance by providing the maximum privacy for users possible today instead of attempting to lessen that privacy to please regulators.”

Banerjee expressed concerns about the built-in delays for adding deposits to association sets, stating, “Tokens can’t immediately get included in a ‘good’ or ‘bad’ set since it takes some time to figure out whether they are ‘good’ or ‘bad.’ The paper suggests a delay similar to seven days before inclusion (this could be higher or lower).”

Banerjee continued, “But what’s the right amount of time to wait? Sometimes, like in the case of crypto hacks, it’s very obvious soon after the hack that the coins might be bad. But in the case of complex money laundering cases, it might be weeks, months or even years before tokens are figured out to be bad.”

Despite these concerns, the paper says deposits won’t be included if they are linked to known bad behavior such as thefts and hacks. So, as long as malicious behavior is detected, this should not be a concern.

Additionally, people with “good” deposits can prove they belong to a trusted group and gain rewards. Those with “bad” funds can’t prove their trustworthiness, so even if they deposit them in a shared pool, they won’t gain any benefits. People can easily spot that these bad funds came from questionable sources when they’re withdrawn from a privacy-enhancing system.

Recent regulatory actions

Recent actions within the blockchain space have underscored the critical need for privacy and compliance solutions. One notable incident involved the United States government imposing sanctions on Tornado Cash, a cryptocurrency mixing service.

This move was prompted by allegations that Tornado Cash had facilitated transactions for the North Korea-linked hacking group Lazarus. These sanctions effectively signaled the U.S. government’s heightened scrutiny of privacy-focused cryptocurrency services and their potential misuse for illicit purposes.

Chris Blec, host of the Chris Blec Conversations podcast, told Cointelegraph, “It’s the easy way out to just look at recent news and decide that you need to start building to government specifications, but sadly, that’s how many devs will react. They’re not here for the principle but for the profit. My advice to those who care: Build unstoppable tech and separate it from your real-world identity as much as possible.”

Magazine: Slumdog billionaire 2: ‘Top 10… brings no satisfaction’ says Polygon’s Sandeep Nailwal

As the adoption of cryptocurrencies and decentralized applications continues to grow, governments and regulatory bodies worldwide grapple with balancing enabling innovation and safeguarding against illegal activities.

Simmons believes it is better to have tools governments cannot shut down: “Regulators will continue to push the imbalance of privacy and surveillance further in their direction unless we actively seek to build tools that give power back to the individual.”

He continued, “Tornado Cash is a perfect example of this, as they even went above and beyond and complied with regulators as much as was technically possible, and yet that wasn’t enough for ‘them.’ Even after supposedly becoming compliant, they remained a target of the U.S. government because governments do not want a balance between compliance and privacy — they want total surveillance, which leads to total power.”

“What we need to build in the space are tools (like Tornado Cash) that are resistant to state-level attacks and impossible to shut down or censor, as this is the only way to ensure we have tools at our disposal to defend our freedoms and keep governments in check. Privacy or bust.”

Bitcoin mining stocks saw spikes across the board ahead of halving event

India trained 3,000 police officials on crypto investigations in 2022–2023

The Narcotics Control Bureau and the Indian Cyber Crime Coordination Centre trained 141 officials and over 2,800 officers in the financial year 2022–2023.

The annual report from India’s Ministry of Home Affairs (MHA) revealed that officials from various cybercrime and police departments were trained in cryptocurrency forensics and investigation during the financial year 2022–2023.

The MHA highlighted that, under the Narcotics Control Bureau — India’s central law enforcement and intelligence agency — 141 officers were trained on the investigations of darknet and cryptocurrencies and other workshops related to digital footprints and gathering intelligence and evidence from open source and social media, to name a few.

Additionally, the Indian Cyber Crime Coordination Centre trained more than 2,800 cyber police officials in crypto forensics and investigations and other emerging technologies like anonymization networks and investigating misuse of mobile applications in cyberspace.

Related: India working on 5-point crypto legislation as ban is ruled out

While India prepares to tackle possible crypto-related crimes amid greater adoption, the nation continues to explore mainstream use cases in blockchain. India’s state-run oil and gas company, Hindustan Petroleum (HPCL), recently launched a blockchain system to enable automated verification of purchase orders (POs).

HPCL partnered with the blockchain software firm Zupple Labs to integrate its blockchain-based digital credentialing technology into the purchase order system.

“The implementation helps to automate the verification of HPCL POs to external parties,” a spokesperson for HPCL told Cointelegraph. “This works by integrating the blockchain system with HPCL’s internal e-PO and generates tamper-evident verifiable POs,” the representative noted.

Magazine: Exclusive: 2 years after John McAfee’s death, widow Janice is broke and needs answers

Bitcoin mining stocks saw spikes across the board ahead of halving event

UK seeks six crypto investigators to beef up National Crime Agency

The role demands candidates to have the ability to provide strategic and tactical advice to crypto investigations, among other investigative qualities.

Reacting to the rising attempts from bad actors to dupe crypto investors, the United Kingdom’s National Crime Agency (NCA) plans to form a specialized cryptocurrency and virtual assets team to counter the issue.

The NCA posted a job opening on Nov. 4, looking to hire six individuals to create a new team focused on crypto crimes — which will either fall under the National Cyber Crime Unit (NCCU) or the Digital Asset Team. The responsibilities include:

“The role will support existing and new investigations where specialist cryptocurrency experience is required along with taking a proactive lead in identifying targets for further development.”

The role requires candidates to have the ability to provide strategic and tactical advice to crypto investigations, conduct blockchain forensic investigations and analyze various materials.

While the intent behind forming a dedicated team of crypto investigators becomes evident amid rising cyber threats, NCA did not immediately respond to Cointelegraph’s request for comment.

In 2023, the NCA issued numerous crypto-centric recruitment notices — all hiring for crypto investigators on various levels. The move complements the UK’s goal to become a crypto hub as it reignites discussions around building a regulated environment that nurtures the crypto ecosystem instead of penalizing the users.

Related: London emerges as world’s most crypto-ready city for business — research

In August 2023, crypto exchange Coinbase confirmed it was working “seriously” in the U.K. and Europe amid the introduction of the Markets in Crypto Assets (MiCA) regulation.

A related Coinbase post recognized the U.K. as one of its fastest-growing user markets. “In short, things are happening in Europe that are edging the region ahead and when it comes to embracing the digital economy, the region is preparing for a seismic change in how it uses and thinks about money,” it added.

Magazine: Slumdog billionaire: Incredible rags-to-riches tale of Polygon’s Sandeep Nailwal

Bitcoin mining stocks saw spikes across the board ahead of halving event

October sees a comparative lull in crypto crime with losses of $32.2M: CertiK

There is no clear downward trend in crypto crime, but a quiet month is undoubtedly more than welcome in the Web3 community.

Web3 theft hit a low point for the year so far in October, CertiK reported. Losses to hacks, exploits and scams confirmed by the blockchain security firm amounted to $32.2 million for the month across 38 incidents, with no single incident leading to a loss of over $7 million.

Compared to the ten-month total of $1.4 billion, losses in October were approximately a quarter of the running monthly average. January showed the second-lowest losses at $33.7 million. The October statistics were not the result of a steady decline in losses but rather show a lack of major incidents that month. October’s 38 incidents were a quantitative low as well.

Major Web3 incidents in October. Source: CertiKAlert X account

Certik’s third-quarter report indicated the number of incidents in July was 79, falling to 66 in August and 39 in September. Only exit scams were up in October and were four times higher than the low they reached in September. That category reached its yearly high in May when users of a crypto project called Fintoch lost almost $32 million.

Related: Tracking stolen crypto — How blockchain analysis helps recover funds

On the other hand, exploits saw a peak in September, mainly due to the $200 million loss suffered by the Mixin Network when its cloud service provider was breached. July saw the second-highest damage, most of which was attributable to losses by the Multichain MPC bridge.

There are some clear trends in crypto crime. CertiK recently noted the rise of scams using social media. It cited United States Federal Trade Commission data that indicated almost half the cryptocurrency scams in the last 18 months have been tied to social media, which offers a wide variety of opportunities for wrongdoing, from pumping and dumping to pig butchering.

CertiK stated in Q3 that the North Korean Lazarus Group remained the “dominant threat actor.”

Magazine: Should crypto projects ever negotiate with hackers? Probably

Bitcoin mining stocks saw spikes across the board ahead of halving event

AI can be used in ‘every single process’ of JPMorgan’s operations, says CEO

JPMorgan’s CEO Jamie Dimon pointed to trading, hedging, research and error detection as just some of the processes that can be streamlined by AI.

JPMorgan CEO Jamie Dimon says artificial intelligence could be applied to “every single process” of his firm’s operations and may replace humans in certain roles.

In an Oct. 2 interview with Bloomberg, Dimon said he expects to see “all different types of models” and tools and technology for AI in the future. “It’s a living, breathing thing, he said, adding:

“But the way to think about for us is every single process, so errors, trading, hedging, research, every app, every database, you can be applying AI.”

“So it might be as a co-pilot, it might be to replace humans … AI is doing all the equity hedging for us for the most part. It’s idea generation, it’s large language models,” he said, adding more generally, it could also impact customer service. 

“We already have thousands of people doing it,” said the JPMorgan CEO about AI research, including some of the “top scientists around the world.”

Asked whether he expects AI will replace some jobs, Dimon said “of course” — but stressed that technology has always done so.

“People need to take a deep breath. Technology has always replaced jobs,” he explained.

“Your children will live to 100 and not have cancer because of technology and literally they'll probably be working three days a week. So technology’s done unbelievable things for mankind.”

However, Dimon acknowledged there are also “negatives” to emerging technologies.

When it comes to AI, Dimon says he’s particularly concerned about “AI being used by bad people to do bad things” — particularly in cyberspace — but is hopeful that legal guardrails will curtail such conduct over time.

Related: AI tech boom: Is the artificial intelligence market already saturated?

Dimon concluded that AI will add “huge value” to the workforce and in the event that the firm replaces its employees with AI, he hopes they will be able to redeploy displaced workers in more suitable work environments.

“We expect to be able to get them a job somewhere local in a different branch or a different function, if we can do that, and we’ll be doing that with any dislocation that takes place as a result of AI.”

Magazine: AI Eye: Real uses for AI in crypto, Google’s GPT-4 rival, AI edge for bad employees

Bitcoin mining stocks saw spikes across the board ahead of halving event

September becomes the biggest month for crypto exploits in 2023: CertiK

The Mixin Network cross-chain protocol accounted for almost two-thirds of the crypto exploit losses in September.

September has officially become the worst month in 2023 (so far) for crypto-related exploits — with a whopping $329.8 million in crypto stolen.

On Oct. 2, blockchain security firm CertiK said the most significant contributor to the month’s totals came from the Mixin Network attack on Sept. 23 when the Hong Kong-based decentralized cross-chain transfer protocol lost $200 million due to a breach of its cloud service provider.

Other major incidents for the month included the attacks on the CoinEx exchange and Stake.com resulting in losses of $53 million and $41 million respectively.

As reported by Cointelegraph, North Korean hacking collective the Lazarus Group has been fingered for both attacks. The latest figures from Dune Analytics claim that the group currently holds $45.6 million in crypto assets.

The attack has taken the yearly total of crypto lost to exploits to $925.4 million. July was the second-highest month for exploit losses with $285.8 million pilfered.

Meanwhile, the month also saw $1.9 million lost to exit scams, $400,000 to flash loan attacks, and another $25 million to phishing attacks, according to CertiK.

The total lost in 2023 to exploits, scams, and hacks has now totaled $1.34 billion.

Related: North Korean Lazarus Group amasses over $40M in Bitcoin, data reveals

According to blockchain security firm Beosin, total losses from hacks, phishing scams, and exit scams were just under $890 million for the third quarter of 2023.

Losses in Q3 even exceeded the combined sum of the first two quarters which was $330 million in Q1 and $333 million in Q2, it reported late last week.

Magazine: $3.4B of Bitcoin in a popcorn tin: The Silk Road hacker’s story

Bitcoin mining stocks saw spikes across the board ahead of halving event