54
Who’s Who On The Blockchains? THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

Who’s Who On The Blockchains? THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Page 2: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Page 3: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Page 4: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

01

Page 5: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHY TYPOLOGIES MATTER

How we think about cryptocurrency typologies

THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Merchant services

Hosted wallets

Mining pools

Smart contracts, ERC-20, and ICOs

Exchanges

OTC Brokers

Cryptocurrency ATMs

Gambling

Exchange hacks and stolen funds

Mixers

Darknet Markets

Ransomware

Terrorist financing

Sanctions

Child sexual abuse material sites

Other

OUR DATA: HOW CRYPTOCURRENCIES FLOW BETWEEN TYPOLOGIES

FINAL THOUGHTS

04

05

08

09

10

12

13

14

16

18

19

20

23

24

26

29

31

32

35

38

48

Table of Contents1

2

3

4

02

Page 6: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

1

03

Page 7: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

Cryptocurrencies represent an opportunity to expand the way people transact globally. Since Bitcoin’s launch in 2009, cryptocurrency has launched new markets, spurred innovation in financial infrastructure, and driven innovative thinking in how we can meet the world’s economic needs.

But in order to drive continued growth and adoption, all relevant stakeholders — industry operators, traditional financial institutions, and governments — need a shared understanding of all the players in the cryptocurrency ecosystem. Only then can they identify the next big opportunities and ensure that blockchains are a safe place to do business. Key to this is an understanding not just of who the entities conducting cryptocurrency transactions are and how they act, but also the level of risk and illicit activity associated with them.

That’s where Chainalysis comes in. As the industry’s leading provider of blockchain analysis, investigations, and compliance software, we equip banks, businesses, and governments to understand which entities are transacting with cryptocurrency so that the industry can continue to grow safely and sustainably.

In this guide, we use our comprehensive, best-in-class blockchain dataset along with decades of combined investigative experience to break down the key categories — or typologies — of cryptocurrency transaction participants according to the level of risk they present.

1 WHY TYPOLOGIES MATTER

04

Page 8: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

How we think about cryptocurrency typologies

The services and groups associated with each of these use cases make up the typologies we describe throughout this guide. As is clear from that list of use cases, cryptocurrency typologies run the gamut in terms of risk from a legal and compliance standpoint. Below, we’ve laid out all of the typologies we cover in this guide according to risk level.

The easiest way to group the entities transacting with cryptocurrency is to think about the ways cryptocurrency is actually used.

Mining

Buying/selling illegal goods and services

Investing and exchanging

Hiding trails (for privacy or money laundering)

Buying/selling legal goods and services

Stealing /scamming

Storing funds

05

Page 9: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

On the left are services like hosted wallets and merchant services, which are used less often for illicit activity and are therefore lower risk.

On the right are typologies like terrorist financing schemes, which are illegal under any circumstances, and therefore rated as severely risky. Those in the middle aren’t universally considered illegal but are often linked to or used to aid in criminal activity.

These risk levels represent the typologies themselves, but aren’t enough on their own to assess the risk level of a specific entity. The only way to do that is to analyze that entity’s cryptocurrency transactions and counterparties in greater detail.

If you’re new to cryptocurrency, our typology guide will give you an understanding of each typology’s most common use cases and what you should be on the lookout for to limit risk of exposure to illicit activity.

1 | WHY TYPOLOGIES MATTER

SevereLow

Merchant services

Hosted wallets

Mining pools

ICOs

Exchanges

Gambling Darknet markets

Ransomware

Hacks / stolen funds

Terrorist financing

Child abuse material

Sanctions

Medium High

ScamsCryptocurrency ATMs

Mixers

Cryptocurrency typologies by risk levelCryptocurrency typologies by risk level

06

Page 10: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

2

07

Page 11: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

2

08

Page 12: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Merchant services

Merchant services providers allow mainstream businesses to accept cryptocurrency as payment for everyday customer purchases, whether they’re happening online or in person. Think of them as regular payment processors, like Stripe or Square, except they’re compatible with cryptocurrencies. Merchant services allow people to use cryptocurrency the same way they use fiat currency.

But why would somebody — consumer or business — want to use cryptocurrency over fiat currency? There are lots of reasons, but the biggest is the reduction of fees. Conventional payment methods like credit cards carry a fee for each transaction, which means the business has to either absorb the cost or pass it on to the customers.

Cryptocurrency payments are a more direct transaction, which means they can be faster, cheaper, and more efficient than credit cards. The same goes for cross-border payments and remittances.

As cryptocurrency adoption grows, merchant services adoption is also growing, with global companies like Starbucks, Whole Foods, and others now accepting cryptocurrency payments. In aggregate, merchant services usage has trended upwards over the last five years, with some dramatic spikes and declines during and after the Bitcoin price boom in 2017.

How it works

Examples

Possible exploit

Take cryptocurrency for invoicing, online, or in-person payments, convert to local fiat, and settle funds to merchant’s bank account

Bitpay, Flexa, Coinpayments, WebMoney, Coinify, Square etc

Usually low

Volumes, players, and acceptance growing as adoption grows

Financial services authorized to accept customer payments on behalf of a business. Known as payment gateways or payment processors.

Risk type

Malicious websites can be registered to accept cryptocurrency payments that are processed by merchant services

Description

Emerging trends

09

Page 13: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

Hosted wallets

Currencies included: BCH, BTC, LTC, USDT

The merchant services category is generally a low-risk typology. Users are typically mainstream, traditional businesses on one end and their customers on another. However, it’s worth noting that scammers sometimes integrate merchant services with a malicious website to accept cryptocurrency payments from their victims.

How it works

Examples

Possible exploit

App or web based. No storage issues, sync lag or complex operations.

Xapo.com, Freewallet.org

Usually low

Increasing adoption due to ease of use and app convenience

Alternative to individually controlled wallets. Easier to use, and potentially more secure. Risky if you don’t choose a good one.

Risk type

Scam wallet services can steal a user’s private keys

Description

Emerging trends

2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

10

Page 14: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

To understand hosted wallets, you need to understand how public and private keys enable cryptocurrency transactions. In simple terms, your public key is a digital, public-facing “signature” that represents your intention to send or receive cryptocurrency to all on the blockchain. Your private key, meanwhile, is a signature only you know and that ultimately allows you to sign off on transactions. If someone holds your private key, they functionally own all of the cryptocurrency funds associated with it.

Wallets aggregate and store users' public and private keys. Unhosted wallets (also known as non-custodial wallets) allow a user to store their public and private keys locally to their own device, giving them full control over their funds at all times.

But with that control comes responsibility. Unhosted wallet users are responsible for maintaining the security of their private keys against hackers or any other parties who would try to steal them and take control of the user’s funds. Unhosted wallets may also require users to download and store the blockchain in its entirety, making it difficult for day-to-day use.

Hosted wallets (also known as custodial wallets) eliminate the inconvenience of having to secure your own keys by storing your public and private keys in a wallet infrastructure owned and maintained by the wallet service provider. This results in a user experience similar to traditional banking and finance websites, making it easier for users to transact, albeit at the risk of less financial privacy and loss of direct control over funds.

Below are some of the more popular hosted and non-hosted wallets. Keep in mind that some services offer both options.

Provider

Popular hosted and non-hosted wallets

Hosted

Non-hosted

Key Value Proposition

In-wallet exchange service – no KYC

Offline, secure, encrypted servers

In-wallet exchange service

Can stake holdings for interest

125+ blockchains supported

Users should be on the lookout for scammers who set up malicious websites impersonating those of popular hosted wallet services in order to trick users into handing over their private keys and giving up control of their cryptocurrency.

Popular hosted and non-hosted wallets

11

Page 15: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

Mining is the process of validating and adding transactions to the blockchain in exchange for newly generated cryptocurrency. It’s the key process for both regulating cryptocurrency issuance and maintaining blockchain security.

The most commonly used mining process is called Proof of Work (PoW) mining. Under a PoW system, miners solve a mathematical equation known as a hash, which requires them to guess a complex answer by brute force using dedicated computing power. The miner who finds the correct answer first has the right to create a new data block reflecting recent transactions and add it to the blockchain. The miner then takes ownership of the newly generated cryptocurrency.

Exactly how difficult is it to solve the math problems that power the blockchain? Their difficulty is quantified with a measurement unit called hash rate, which measures the total amount of computing power being thrown at mining for any one cryptocurrency — more computing power means more competition for each new block, making it harder for any one entity to win. The hash rate for Bitcoin has grown exponentially since 2017.

In the early days of Bitcoin, it was feasible for an individual to successfully mine new Bitcoin using their personal computer. But with increased competition, that’s now nearly impossible. Miners have responded by forming mining pools, in which a group of miners combine their collective computing power to increase their chances of success. Competition is fierce — some mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating today.

Mining pools are considered a low-risk typology since they receive the vast majority of their cryptocurrency through mining, and send it to the groups and individuals participating in the pool. However, some mining pools accept donations or receive cryptocurrency through means other than mining, in which case they could be exploited for money laundering.

How it works

Examples

Possible exploit

Mined block divided according to mining power (hash) each contributed

BTC.com (professionals). NiceHash (anyone with personal computer)

Usually low

Large corporations or mining pools dominate mining

Miners pool their resources (GPU/ASIC mining hardware)

Risk type

Most are one-way but some accept deposits → could enable laundering

Description

Emerging trends

Mining pools

2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

12

Page 16: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

How it works

Examples

Possible exploit

Smart contracts can also store information, manage agreements, and function as multisignature accounts

ICOs: Bancor, EOS, Filecoin. Smart contracts: Storj (storage), IDEX (exchange), Etheroll (casino)

Usually low

IEOs – token sale held directly by exchanges (vs. via smart contracts)STOs – security token offerings. Governed as securities.

ERC-20 is the technical standard for most smart contracts on Ethereum blockchain, enabling token issuance for ICOs (crowdfunding mechanism)

Risk type

Scams and fraud schemes that rise with price rallies & investor interest

Description

Emerging trends

Ethereum is a blockchain with its own cryptocurrency and a built-in functionality for smart contracts. Smart contracts can store information related to a deal and automatically self-execute when the terms of the contract are fulfilled. Smart contracts can be agreed upon and enforced between two parties without the need for a third, since they don’t actually execute until each side has fulfilled their obligations.

ERC-20 is a technical standard used for most smart contracts on the Ethereum blockchain. ERC-20 allows for the issuance of tokens which can be used for initial coin offerings (ICOs).

ICOs are a means of crowdfunding for new cryptocurrency or related projects. The entity behind the new cryptocurrency would make their pitch and sell units of the token to investors in exchange for fiat currency or more mainstream cryptocurrencies like Bitcoin or Ether. Decentralized cloud storage application Storj is a great example, having raised $30 million in one week through an ICO built on the ERC-20 protocol.

The problem is that many ICOs have proven to be scams. There are countless examples of bad actors who build a flashy site promoting an ambitious project, raise funds through an ICO, and then simply pocket the money and walk away. The Pu’er Tea Token is a prime example: A group of investors released a new token they claimed to be backed by reserves of high-end Pu’er tea, convinced more than 3,000 investors they could get big returns, and walked away with $47 million before being arrested.

Initial Exchange Offerings (IEOs) are an alternative to ICOs. Whereas anyone anywhere can contribute to an ICO, IEOs are limited to one or more exchanges, who evaluate the projects before listing them. The exchanges also typically control the sale rather than have it executed through smart contracts. If the exchange involved is reputable, the chances that an IEO is a scam are much lower.

Smart contracts, ERC-20, and ICOs

13

Page 17: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

Exchanges allow users to buy, sell, and trade cryptocurrency. They represent the most important and widely-used service category in the cryptocurrency industry, accounting for 90% of all funds sent by services. In the first half of 2019, exchanges sent nearly $64 billion in cryptocurrency value, with the largest exchange (by value transacted), Binance, sending $16 billion.

Like wallets, exchanges are typically custodial, non-custodial, or give users the option for either.

Custodial exchanges technically have control of your cryptocurrency since they hold the private encryption keys associated with the wallet. Big, centralized retail exchanges tend to be custodial, as their brand name makes them trustworthy for many users, who are often interested in trading quickly without the friction of entering their private key. In fact, trading on most of these exchanges happens off-chain—meaning, it’s not recorded on the blockchain—and is managed by the exchange itself, which is faster for users but reduces transparency.

How it works

Examples

Possible exploit

Sign up for an account. Some have more KYC than others. Some are p2p.

Coinbase, Kraken, Binance, Huobi, LocalBitcoins (also: BTC-e, WEX)

It varies

DEXs, instant exchangers

Online service for buying, selling, and trading cryptocurrency

Risk type

Heavily targeted by hackers/phishing. Money laundering

Description

Emerging trends

Exchanges

2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

14

Page 18: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Non-custodial exchanges, on the other hand, give users control of their private keys. These exchanges tend to be decentralized or peer-to-peer (P2P), and oftentimes don’t even require users to set up an account. While that increases anonymity for users, it can leave those exchanges vulnerable to increased illicit activity.

That gets at the larger point about exchanges: some are better at complying with anti- money laundering regulations (AML) than others. While the most reputable exchanges have strict Know Your Customer (KYC) protocols in place and use tools like Chainalysis to monitor transactions for risky or illicit activity, others are much more lax on compliance, which makes them a greater money laundering risk.

Generally speaking, while exposure to illicit activity happens at a higher rate for smaller exchanges, large exchanges have much higher absolute amounts of exposure to illicit activity. Our data illustrates this below.

Overall, money sent from small exchanges is 6x more likely to go toward illicit activity than money sent from one of the ten largest exchanges. However, large exchanges still send a much higher total amount of illicit funds — roughly $203 million from the single biggest exchange vs. $1.5 million from all small exchanges combined. So while illicit activity remains a small percentage of large exchanges’ overall activity, large exchanges still face heavy scrutiny from law enforcement. Consider the case of BTC-e, which was one of the largest exchanges operating before it was shut down in 2017 for facilitating money laundering.

Illic

it pe

rcen

tage

of e

xcha

nge

tran

sact

ions

15

Page 19: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

Authorities found that BTC-e had high exposure to money laundering schemes associated with ransomware, hacker groups, identity theft, tax fraud, and drug trafficking. Overall, more than $4 billion USD was laundered on the exchange, including 300,000 BTC stolen in the Mt. Gox Hack. But as the data illustrates, the biggest exchanges today take AML compliance more seriously and are at a far lower risk of enabling money laundering.

BTC-e shut down due to suspicions of money laundering

$110million civil penalty

300,000of stolen BTC from Mt. Gox

$4billion allegedly laundered

BTC-e shut down due to suspicions of money laundering

2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

OTC Brokers

16

Page 20: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Over the counter (OTC) brokers facilitate large trades between individual buyers and sellers who can’t or don’t want to transact on an open exchange. OTC brokers are often associated with one or more exchanges but operate independently. Traders can work with OTC brokers if they want to liquidate a large amount of cryptocurrency for a set, negotiated price. OTC brokers are a crucial source of liquidity in the cryptocurrency market. While it’s impossible to measure the exact size of the OTC market, we know that it’s quite large. Cryptocurrency data provider Kaiko even estimates that OTCs could facilitate the majority of all cryptocurrency trade volume.

While most OTC brokers run a legitimate business, some work with criminal entities. OTC brokers are often held to lower KYC requirements than the exchanges on which they operate. Some take advantage of this to provide money laundering services to criminals, helping them cash out funds connected to illegal activity. An unscrupulous OTC broker would typically do this by exchanging criminals’ ill-gotten cryptocurrency for cash directly or for Tether as a stable intermediary currency.

We saw examples of OTCs acting as money launderers during our investigation of PlusToken, a massive Ponzi scheme that took in billions of dollars’ worth of cryptocurrency from millions of investors. As of December 2019, the PlusToken scammers moved roughly $185 million worth of stolen Bitcoin to exchange accounts associated with OTC brokers to be liquidated. Most of these cashouts resemble the pattern of transactions shown below, in which hackers moved a chunk of stolen funds through a series of intermediary wallets before funnelling the majority to OTC brokers.

Additionally, we’ve found that many accounts at compliant exchanges receiving significant funds from illicit sources are controlled by OTC brokers, many of whom have played a role in multiple criminal investigations we’ve participated in. However, the majority of OTC brokers who operate compliantly remain an integral part of the cryptocurrency ecosystem.

17

Page 21: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

How it works

Examples

Possible exploit

ATM located in public spaces (malls, liquor stores, gas stations, etc)

CoinCloud, BitNational, CoinSource, and Coinstar

Low – Medium, depending on KYC

Growing. Variety of cryptocurrencies increasing (BTC, BCH, ETH, LTC+).

Convert cash into cryptocurrency and vice versa, similar to fiat ATMs

Risk type

Bad actors with lots of cash are tempted to convert to cryptocurrency

Description

Emerging trends

Cryptocurrency ATMs

2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Cryptocurrency ATMs are physical machines that allow users to convert cash to cryptocurrency or vice versa. As cryptocurrency adoption grows, we’re seeing huge increases in the number of ATMs installed.³

As a quick and easy means of converting between cash and cryptocurrency, the main concern with cryptocurrency ATMs is that they can attract criminals looking to launder funds. But many cryptocurrency ATMs have strong KYC protocols in place, which typically get stricter the more money a user is trying to deposit. Users are required to create an account with personally identifying information such as a phone number or ID photo, which makes the typology relatively low-risk.

The case of United States v. Kevin C. Fusco provides a good example of what cryptocurrency ATM KYC looks like in practice. It began when Fusco, a drug dealer active on various darknet markets, went to a cryptocurrency ATM and converted $32,000 worth of Bitcoin into cash. The ATM flagged the transaction as risky, and when Fusco returned to try and convert another $200,000 worth of Bitcoin, the machine rejected the request. Since the ATM provider collected Fusco’s driver’s license information during signup as part of the KYC process, law enforcement agents were able to connect these transactions to Fusco and use ATM records to bolster their case when they eventually arrested him.

18

Page 22: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

The online gambling world was an early adopter of cryptocurrency, possibly because it allows users to gamble in jurisdictions where doing so isn’t allowed.

The risk profile of gambling services depends largely on jurisdiction. Gambling sites are considered risky in the U.S., since most states don’t allow gambling. But in Europe, online gambling is perfectly legal, so these services are considered low risk. However, some gambling sites have lax KYC standards, which can make them another destination for money laundering. As with the other typologies, it’s important to dig deep on the practices of individual services when assessing risk.

Gambling

How it works

Examples

Possible exploit

Individuals open account, send cryptocurrency and wager their funds. KYC is not very prevalent. Treated differently by jurisdiction.

mBitCasino, Oshi Casino, Konung Casino, BitStarz, etc

Medium – depends on jurisdiction

Lots of gambling sites are actually owned by a few holding companies

Online gambling sites for slots, sports/eSports betting – increasingly accepting cryptocurrency

Risk type

Can be used for money laundering

Description

Emerging trends

Interestingly, many gambling sites rely on the same handful of payment processors to carry out cryptocurrency transactions. While it may appear that the customer payments across distinct addresses are all being deposited to each individual casino, the addresses are all actually managed by a single, third party payment processor, which we refer to as a nested service under this arrangement. Below is one such example with popular payment processor CoinsPaid.

19

Page 23: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

Exchange hacks and stolen funds

How it works

Examples

Possible exploit

Vulnerabilities exploited to move exchange funds to attacker’s control

Bitpoint, Binance, DragonEx, Cryptopia

High

Sophisticated, persistent social engineering to deliver remote access malware

Billions of dollars in cryptocurrency have been stolen in exchange hacks

Risk type

Big payoff per hack, often resulting in tens of millions in losses

Description

Emerging trends

This is just one example of concentration in online gambling. Many gambling websites use white label online casino software platforms that let them offer popular games without having to program the games themselves. In fact, while there may appear to be thousands of individual gambling websites operating, many of them are owned by the same holding companies.

How CoinsPaid handles payment for multiple gambling sitesHow CoinsPaid handles payment for multiple gambling sites

2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

20

Page 24: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Hackers have stolen billions of dollars’ worth of cryptocurrency by attacking exchange wallets. Bitpoint, Binance, DragonEx, and several others have all been the target of prominent hacks.

You may think hackers must have exceptional computer skills to force their way into seemingly impenetrable cryptocurrency wallets. But in fact, social engineering is their most frequently used tactic. Hackers will typically try to trick exchange users or even employees into downloading malware that gives them access to one or more accounts. Once they’re in, savvy hackers will wait for months or more, observing the patterns of how money flows in and out so that they can steal the highest amount possible.

What does this look like in the real world? In one particularly audacious scheme, hackers set up an entire fake company, complete with a website, social media presence, and executive bios.

WFCProof was a fake company set up by hackers to trick employees at an exchange into downloading malicious software.

21

Page 25: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

The hackers claimed to have created an automated trading bot, and messaged several employees at an exchange asking them to download the free trial. At least one of them did, and lo and behold, the trial included malware that helped the hackers obtain the private keys for several users’ wallets. The hackers began draining funds from those wallets soon after gaining access.

Hacks are a big concern for exchanges. It remains to be seen how the threat evolves as the industry matures and operational security measures become increasingly sophisticated.

The hackers made LinkedIn profiles for made up WFCProof employees.

2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

22

Page 26: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Mixers are services that help users transact with greater privacy and obfuscate the source of funds. That capability, plus the fact that most mixers don’t have KYC requirements, makes them a popular money laundering mechanism. In fact, we’ve found that mixers are the most popular cashout destination for funds from illicit activity.

Mixers create a disconnect between the cryptocurrency funds that users deposit and what they withdraw, making it more difficult to trace the flow of funds. They do this by pooling together funds that all users deposit and mixing them together at random. Users can then receive funds back from the now-jumbled pool equivalent to what they put in, minus a 1-3% service fee. Some mixers make funds even more difficult to track by letting users receive different-sized chunks of funds at different addresses at staggered times. Others try to obfuscate the fact that a mixer is even being used by changing the fee on each transaction or varying the type of deposit address used.

While mixers aren’t illegal in their own right, law enforcement agencies have been treating them with more scrutiny and shutting down ones that hold substantial amounts of illicitly-gotten funds. For instance, in 2018, Dutch authorities shut down Bestmixer.io, a mixing service that had processed over $200 million worth of funds in the year preceding. Law enforcement determined that a substantial portion of those funds came from criminal activity.

Legal scrutiny aside, mixers have taken off in popularity over the last year. In the time period of October 2018 through September 2019, more than $631 million worth of bitcoin was sent to Wasabi Wallet, the most popular mixing service.

Mixers

How it works

Examples

Possible exploit

No KYC required. Exist on clearnet and darknet. Typically centrally controlled.

Chipmixer.com, CryptoMixer.io, Bitcoin Fog

High

LE shut downs → voluntary shut downs. Also, decentralized mixing protocols (e.g. CoinJoin, CashShuffle).

Websites or software for obfuscating the source of funds

Risk type

Mostly for cryptocurrency that’s been stolen or from darknet markets

Description

Emerging trends

23

Page 27: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

Wasabi Wallet relies on a decentralized mixing method called the CoinJoin protocol, which differentiates it from other mixers. The first generation of mixers were vulnerable to law enforcement intervention because they functioned as centrally-managed services, fully under the mixer’s control. The CoinJoin protocol addresses this by providing a wallet service that allows multiple users to trustlessly join their payments into a single transaction with multiple recipients. CoinShuffle is another protocol that does the same thing for Bitcoin Cash.

Darknet markets

How it works

Examples

Possible exploit

Commercial website or marketplaces in the dark web (via Tor or I2P)

Empire, Point, Berlusconi, Silk Road 3.1, (Silk Road, AlphaBay, Dream)

Medium – High (depending on amount)

Innovated security measures to protect against exit scams

Black markets for drugs, stolen card data, weapons, child abuse material, etc

Risk type

Users at risk of “exit” scams without recourse

Description

Emerging trends

2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Tota

l Bit

coin

val

ue re

ceiv

ed p

er m

onth

in m

illio

ns o

f USD

24

Page 28: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

The hacker revealed key insights into Nightmare Market’s operation, including:

• Nightmare’s registered users: Approximately 80,000 • Nightmare’s total revenue from late 2018 to July 2019 (when the alleged hack occurred):

$22 million USD• Vendors’ preferred cryptocurrencies: Bitcoin and Monero

Many buyers and vendors abandoned Nightmare Market soon after this hack (which was also accompanied by difficulties cashing out), moving to alternative darknet markets like Empire Market, Berlusconi Market, Cryptonia Market, and Samsara Market.

Darknet markets are commercial websites that function similarly to eBay, where users can come together to buy and sell goods using cryptocurrency. The key difference of course is that most of the goods available are illegal, including drugs, paraphernalia, weapons, stolen credit card data, child sexual abuse material, and more. Darknet markets are typically only accessible using browsing anonymization services like Tor and I2P. Darknet markets are one of our riskiest typologies, and any address or service with significant exposure to darknet markets would likely be treated with suspicion by regulators.

Given their obvious need for secrecy, it’s hard to come by individual darknet markets’ financials — they’re not exactly releasing annual reports. But the cryptocurrency world got a glimpse of some internal data during what now appears to be an exit scam carried out by the operators of Nightmare Market in 2019. A hacker allegedly gained backdoor access to Nightmare Market and released a trove of data on its operations, including figures on sales and revenue.

Source: DarknetLiveProprietary and Confidential 41

25

Page 29: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

How it works

Examples

Possible exploit

Social engineering or vulnerabilities that lead victims to download malicious software

WannaCry 2.0, CryptoLocker, SamSam, NotPetya, Robbinhood, CrySiS

High

More targeted, higher $$ per attack, sophisticated social engineering

Malicious software that encrypts computer files for ransom

Risk type

Lots of organizations still haven’t installed critical patches

Description

Emerging trends

Ransomware

Ransomware is a method of cybercrime in which hackers inject malicious software onto a user’s computer that encrypts all of the files within. The hackers then demand the user pay a ransom to regain access to the files, usually in cryptocurrency. In the past few years, organizations large and small — including several local governments and hospitals — have fallen victim to ransomware attacks.

2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

US cities hit by ransomware in 2019

Lake City, FloridaTallahassee, Florida

Baltimore, Maryland

Jackson County, Georgia

Denver, Colorado

Atlanta, Georgia

Albany, New York

Augusta, Maine

Cleveland, Ohio

Riviera Beach, FloridaNew Orleans, Louisiana

26

Page 30: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

These attacks have become common, with a new organization hit by ransomware every 14 seconds. Phishing scams and other forms of social engineering are the most common methods, with over 1.5 million new phishing sites created every month.

Notable, widespread ransomware campaigns include:

• WannaCry• CryptoLocker• Petya and its updated version, NotPetya• Robbinhood• CrySiS• SamSam

The Iran-based hackers behind SamSam became the first people to have their Bitcoin addresses listed on the US Department of Treasury Office of Foreign Assets Control (OFAC) sanctions list, after allegedly extorting more than $6 million from ransomware attack victims and causing over $30 million in damage.

Who’s behind most ransomware attacks? According to security researchers most of these bad actors fall into one of two groups.

Many are part of organized crime groups. These attackers typically play a volume game, launching attacks on many organizations for low dollar amounts. Most ransomware attackers demand victims pay 1 BTC (worth thousands of dollars), though they’ll adjust that figure based on that they think the victim is able to pay.

State actors are the second group behind many of the largest attacks. For instance, security researchers such as Recorded Future and Crowstrike have reported that the North Korea-sponsored Lazarus Group hacking outfit carried out the WannaCry ransomware campaign that made headlines in 2017. WannaCry was notable for its enormous scale, infecting 200,000 computers across 150 countries and causing over $4 billion in damages. WannaCry targeted organizations known all over the world, from Fortune 100 corporations like FedEx to government services like Britain’s National Health Service. In some cases of state-sponsored attacks, payment appears to have been secondary to simply causing chaos for targeted groups. In fact, the Russian-linked NotPetya attacks didn’t even appear to have functioning mechanisms for collecting payment or decrypting user’s files.

How do hackers determine who they target with ransomware? Victims typically fall into one or more of the following four categories.

27

Page 31: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

High-value business targets refers to small or medium sized businesses. According to Beazley Breach Response Services, 70% of ransomware victims were small businesses in 2018, with a heavy preference for financial services companies. This isn’t surprising, as these organizations tend to have less robust security than larger companies and are often willing to pay up and resume business as usual.

Organizations with sensitive data. Organizations dealing with the potential loss of sensitive data have a huge incentive to pay up fast if they get hit by ransomware. Hospitals are a good example. Every second they don’t have access to patients’ medical data puts those patients at risk. Other frequently-targeted companies in this category include police protection programs and news organizations.

Low-security organizations. These targets are the low-hanging fruit for hackers in that they don’t have high IT security. For instance, many educational institutions have limited technology budgets, leaving them vulnerable to cyber attacks. HR departments have proven to be a weak point at many companies, as hackers have breached their systems by submitting fake job applications with malware attached.

Organizations with sensitive government information. State-sponsored actors specifically target organizations connected to their adversaries, such as government agencies, defense contractors, or political campaigns.

2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Typical ransomware targets today

28

Page 32: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

What happens when a ransomware attack hits an organization?

Step 1

The organization notifies law enforcement

Step 2

Investigators track the flow of cryptocurrency via blockchain analytics software

Step 3

Conversion services used by attackers are identified

Step 4

Law enforcement, InfoSec teams and organization coordinate to build case

When organizations are hit by a ransomware attack, cyber security experts recommend that they contact law enforcement immediately and provide them with the ransomware payment address. Investigators can then use blockchain analysis software like Chainalysis to examine the flow of funds to and from the address, identify the services the ransomware operators use to convert funds and cash out, and hopefully link the address to a real-world entity.

Terrorist financing

How it works

Examples

Possible exploit

Social media or one-on-one private conversations, often via encrypted channels

Hamas, Al Sadaqah, Incite The Believers (Al-Qaeda affiliate)

Severe

On the rise, with varying (but increasing) levels of sophistication

Terrorist groups’ fundraising campaigns soliciting cryptocurrency

Risk type

Innovations (e.g. privacy coins) might increase terrorists’ adoption

Description

Emerging trends

What happens when a ransomware attack hits an organization?

29

Page 33: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

Terrorist organizations are increasingly using cryptocurrency to raise money, typically soliciting donations through public fundraising efforts and one-on-one conversations on private, encrypted chat apps.

Terrorist groups are often quite explicit in stating what these donations will be used for. Check out the poster below produced by Jaysh Al-Ummah, a militant group in Gaza. They tell potential donors exactly what weapons their donations to the advertised Bitcoin address (obscured) will help their fighters buy.

Other solicitations are a bit more subtle and ambiguous in letting their audience know exactly who they’re donating to. Some terrorist-linked organizations may present themselves as regional charities raising money for medical supplies or to help the inhabitants of war-torn areas. The following image shows messages from a charity group claiming not to be linked to any militant groups, but later soliciting donations for reconnaissance drones to be used by mujahideen fighters.

2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

30

Page 34: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

While the amounts of cryptocurrency being donated to terrorists are generally small today, the ability for these groups to solicit relatively frictionless donations from anyone in the world represents a troubling trend. Not to mention, the costs of executing a terrorist attack are very low. As former Under Secretary to the Treasury for Terrorism and Financial Intelligence Sigal Mandelker noted in a recent presentation, the average remittance payment with suspected terrorism links is only $600, which is more than enough to pay for a homemade suicide bomb or similar weapon. The activity could grow as anonymity-bolstering technology such as mixers and the like continue to improve.

Sanctions

How it works

Examples

Possible exploit

Entity names and cryptocurrency addresses are listed (in the US, it’s the Specially Designated Nationals list, or SDN)

SamSam ransomware individuals, fentanyl traffickers

Severe

Illicit activity can involve addresses at exchanges or uniquely generated ones (e.g. Hamas 3rd cryptocurrency fundraising attempt)

Anyone who falls under the authority jurisdiction issuing a sanction, including nationals operating elsewhere or businesses abroad that directly operate into the issuing jurisdiction, are prohibited from business dealings with the sanctioned entity.

Risk type

Jurisdictions such as Iran and Venezuela have indicated intent to use cryptocurrencies to get around sanctions

Description

Emerging trends

31

Page 35: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

Sanctions are issued by governments to designate individuals and organizations with whom citizens are forbidden from doing business. Sanctions typically cover not just the prohibited entities themselves, but also any instrumentalities owned or controlled by those entities, including operating companies, bank accounts, and most recently, cryptocurrency addresses. You can find the list of those sanctioned by the U.S., for instance, on OFAC’s Specially Designated Nationals (SDN) list.

As mentioned in the ransomware section, the two Iran-based hackers who created the SamSam ransomware campaign became the first people to have their cryptocurrency addresses added to their entries on the OFAC sanctions list in 2018. But others have joined them since then. In August of 2019, OFAC sanctioned two Chinese nationals accused of manufacturing fentanyl and trafficking it into the U.S. for sale, and included the cryptocurrency addresses they used to accept payments.

Any exposure to sanctioned cryptocurrency addresses could draw heavy scrutiny from law enforcement for cryptocurrency businesses and any financial institutions working with those cryptocurrency businesses, including potential obligations to block assets from continuing transit or returning to designated senders, or otherwise benefiting designated entities, such as relieving debts. Exposure may also trigger Suspicious Activity Report (SAR) requirements.

A small, opaque subset of darknet websites specialize in the sale of child sexual abuse material (CSAM), often using cryptocurrency to facilitate the transactions. These sites typically don’t stay in operation for very long, possibly due to law enforcement operations and efforts by those running the sites to avoid detection.

Child sexual abuse material sites

How it works

Examples

Possible exploit

Buyers often become (re)sellers of content (it’s difficult to create and the same content be consumed over and over again by new buyers)

Welcome to Video site

Severe

Smaller sites don’t remain open for long (may be due to law enforcement efforts). Also, Monero increasingly being accepted.

Smaller scale websites on dark web that specialize in the sale of child sexual abuse material (also referred to as child pornography)

Risk type

Scam / fake sites; mirror sites (reselling material from another site)

Description

Emerging trends

2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

32

Page 36: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Little is known to the general public about how these sites operate, so WTV provides a useful case study. WTV operated out of South Korea and allowed users to either buy CSAM with Bitcoin or upload their own content in exchange for points they could use to download more. Users received their own unique Bitcoin address upon signing up to use the site, which they would then use to send funds in exchange for content. WTV had 1.3 million Bitcoin addresses ready to be assigned at the time it was shut down, indicating it could support a large user base. Between 2015 and 2018, the site received more than $353,000 in payments.

Some CSAM sites function similarly to darknet markets in that they bring buyers and sellers together in a central marketplace. Others act as the sole seller themselves, and some demand users upload their own CSAM content to access the site’s material. Oftentimes, users will buy CSAM on one site and then turn around and sell it somewhere else.

In 2018, Chainalysis worked with the IRS Criminal Investigations unit, Department of Homeland Security, and other law enforcement agencies around the globe to take down Welcome to Video (WTV), the largest known CSAM website to date by volume of material available.

33

Page 37: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

Investigators used Chainalysis Reactor to trace the flow of cryptocurrency funds in and out of the WTV operator’s Bitcoin address, as shown in the graph. That analysis enabled investigators to identify the exchanges the site’s users and operator were using, who they then subpoenaed to uncover more leads.

After shutting down the site and arresting its owner, investigators coordinated with other agencies around the world to arrest more than 330 WTV users and free at least 23 children from their abusers. You can read a more thorough breakdown of the case on our blog.

Chainalysis Reactor graph shows Bitcoin funds going in and out of Welcome to Video site.

2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

34

Page 38: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Some entities dealing in cryptocurrency don’t fit neatly into any of the existing typologies or are part of a category that, while worth noting, is too small to consider separately.

One example is publications who seek donations via Bitcoin, most of which tend to post legally sensitive information or have a kind of anti-establishment ethos. Some of these appear relatively benign. Sci-hub, for example, offers free access to academic research papers, many of which are paywalled by the publishing journals. While the mission may be noble, Sci-hub often faces legal challenges for violating copyright law.

Other, more controversial publications and forums accepting cryptocurrency donations include:

• Wikileaks, well-known for publishing sensitive government documents supplied by whistleblowers and hackers

• The Daily Stormer, a white supremacist website• DeepDotWeb, a now-inactive user guide for darknet markets (though not a

darknet market itself)

Another interesting mini-typology is the bitcoin faucet.

How it works

Examples

Possible exploit

Entities that accept cryptocurrency in return for goods/services

Freebitco.in, RubRatings, The Daily Stormer, DeepDotWeb, Wikileaks, Sci-hub

It varies

Alt-right forums, adult service “tip jars”

Fundraising, faucets, ASIC hardware, lending, advertising, etc

Risk type

Scams. Fundraising for illicit or violent activity.

Description

Emerging trends

Other

35

Page 39: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

Faucets like FreeBitco.in give users a small amount of cryptocurrency for completing simple tasks such as playing a game or watching an ad. Their business model is simple online ad arbitrage. After drawing users to the site with promises of free cryptocurrency, faucets try to then sell programmatic ads against the traffic coming in.

2 | THE COMPLETE GUIDE TO CRYPTOCURRENCY TYPOLOGIES

36

Page 40: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

3

37

Page 41: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

In this section, we share some of our research on how cryptocurrency moves between the different typologies we covered in the last section. We can’t provide a comprehensive view of all transactions; it’s too much data to visualize in a coherent way, and not all of it is relevant or interesting. Instead, we highlight a selection of particularly intriguing data points we’ve found.

OUR DATA: HOW CRYPTOCURRENCIES FLOW BETWEEN TYPOLOGIES

38

Page 42: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Currencies included: BCH, BTC, LTC, USDT

This data suggests that most darknet market customers send funds from exchange wallets when they make purchases — this amounts to 80% of all funds received by darknet markets from January through September of 2019 if you combine conventional exchanges with P2P exchanges.

Interestingly, the reverse is true as well. When it’s time to cash out, darknet market vendors send more cryptocurrency to exchanges than anywhere else.

Currencies: BCH, BTC, LTC

exchange

p2p exchange

darknet market

mixing

uncategorized

Currencies included: BCH, BTC, LTC, USDT

exchange

p2p exchange

darknet market

mixing

uncategorized

unspent

Currencies: BCH, BTC, LTC

exchange

p2p exchange

darknet market

mixing

uncategorized

exchange

p2p exchange

darknet market

exchange

p2p exchange

darknet market

Darknet markets transact most often with exchanges

39

Page 43: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

At first glance, this data may be surprising. With exchanges facing greater compliance scrutiny and implementing more and more security measures, why are so many darknet market vendors still using exchanges to cash out? The answer is likely a lack of alternatives — there simply aren’t other places to exchange large amounts of cryptocurrency for fiat currency. Even mixers are limited in their ability to cash out large amounts of illicit funds, since they rely on funds from many different sources to obfuscate their origins.

3 | OUR DATA: HOW CRYPTOCURRENCIES FLOW BETWEEN TYPOLOGIES

Currencies included: BCH, BTC, LTC, USDT

Above, we see the number of active darknet markets plotted against the average yearly revenue of those markets by year. In 2019, we see both the biggest drop in the number of active markets — due to both law enforcement action and voluntary closures — and the biggest jump in average revenue. The data suggests that users migrate to new markets when old ones close. Anecdotally, we can attest to the ability of both darknet vendors and users to coordinate with one another on forums to establish which markets have closed and which ones users ought to move to.

When darknet markets close, surviving markets pick up the slack

Currencies included: BCH, BTC, LTC, USDT

40

Page 44: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Currencies included: BCH, BTC

Our data reveals that exchanges, other mixers, and scams are the most common identifiable typologies that send funds to mixers. The scams figure is most interesting of the three. 13.3% may not sound like much, but it dwarfs the percentage of scam funds going to other typologies. In fact, if you add up funds sent from scams, stolen funds, and darknet markets, we see that 22% of funds entering mixers come from illicit activity, compared to just 1% of funds entering exchanges.

Currencies included: BAT, BCH*, BNB, BTC*, CRO, CRPT, DAI, ETH, GNO, GUSD, HT, ICX, LEO, LINK, LTC, MCO, MKR, MLN, OMG, PAX, TUSD, USDC, USDT, WETH, ZIL, ZRX *Entered both mixers and exchanges, others only entered exchanges

Currencies included: BCH, BTC

Currencies included: BAT, BCH*, BNB, BTC*, CRO, CRPT, DAI, ETH, GNO, GUSD, HT, ICX, LEO, LINK, LTC, MCO, MKR, MLN, OMG, PAX, TUSD, USDC, USDT, WETH, ZIL, ZRX

*Entered both mixers and exchanges, others only entered exchanges

Mixers primarily receive funds from exchanges, other mixers, and scams

41

Page 45: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

3 | OUR DATA: HOW CRYPTOCURRENCIES FLOW BETWEEN TYPOLOGIES

How did the cash out strategy differ between the hackers responsible for the Cryptopia, Binance, and Bitpoint hacks? The key difference is the use of mixers. The Binance and Bitpoint hackers relied heavily on mixers, while the Cryptopia hackers opted instead to send most of their funds to exchanges.

Currencies included: BCH, BTC* (**), ETH (**), GNO, LTC, OMG, TUSD, ZRX All of the above left Cryptopia, * also left Binance, (**) also left Bitpoint Please note that this graph doesn’t include unspent funds hackers have yet to move from their original wallets.

Currencies included: BCH, BTC* (**), ETH (**), GNO, LTC, OMG, TUSD, ZRX All of the above left Cryptopia, * also left Binance, (**) also left Bitpoint

76% 24% 29%

41% 17%

3%

2%

23% 33%24%

99% 32% 44%

54% 25%

4%

3%

Currencies included: BCH, BTC, ETH, LTC, MKR, OMG, USDT, WETH

Comparing the destinations of funds stolen in three exchange hacks

Mining pools receive most of their funds from mining, but also a substantial amount from exchanges

Currencies included: BCH, BTC, ETH, LTC, MKR, OMG, USDT, WETH

42

Page 46: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Currencies included: BCH, BTCPlease note that this graph doesn’t include unspent funds ransomware attackers have yet to move from their original wallets.

Unsurprisingly, the majority of funds going into mining pools come directly from mining activity. However, 15.2% comes from exchanges, which seems odd at first glance. Why would anyone send funds from an exchange to a mining pool? It turns out that the mining pools themselves often use exchanges to redistribute earned funds to members, rather than doing it themselves.

Just like darknet market vendors, most ransomware attackers prefer to send their funds to exchanges when they decide to move the funds. Again, we believe they do this because there aren’t other viable options for cashing out large amounts of illicit funds.

Currencies included: BCH, BTC

The vast majority of ransomware funds are cashed out at exchanges

43

Page 47: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

3 | OUR DATA: HOW CRYPTOCURRENCIES FLOW BETWEEN TYPOLOGIES

Looking at where exchanges have been receiving funds from over the years, three distinct periods emerge. In early 2011, when Bitcoin was just getting started and mining was extremely prominent, most funds were coming directly from miners. In 2012 and 2013, before exchanges were regulated, a high percentage of cryptocurrency entering exchanges came from darknet markets, presumably to be cashed out. By the end of 2013, most exchange activity was comprised of transactions with other exchanges, a trend that continued to grow steadily into the present day. Over half of all cryptocurrency received from services by exchanges since the start of 2013 has come from other exchanges, and today, that number sits around 75%.

Why do such a huge percentage of exchange transactions take place between two exchanges? Investment activity is one likely reason. Investment and trading are the two most prominent use cases for cryptocurrency today, and users frequently send funds from one exchange to another to access a wider variety of tokens, trading pairs, and investment products.

Arbitrage is another possible reason. In the traditional fiat world, markets are efficient and opportunities for arbitrage are few and far between. But cryptocurrency is a less mature asset class, so it’s not uncommon to see meaningful differences in price for the same cryptocurrencies on different exchanges.

exchanges (including p2p)

darknetmarkets

miningunnamedservices

other

terrorist financing, child abuse

material, sanctions

Today, exchanges transact most with other exchanges

44

Page 48: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Regardless of region, exchanges mostly transact with other exchanges. We also see interesting differences in where exchanges headquartered in different regions are receiving funds from. European exchanges received 5% of funds from merchant services in the first half of 2019. While exchanges in the “Other” regional category received 12% of funds from mining — mostly driven by Russian activity — APAC exchanges take in the highest absolute volume of mined Bitcoin. In Latin America, a staggering 11% of funds received by exchanges came from scams in the first six months of 2019.

5% 11%12%

($23 B) ($23 B) ($17 B) ($4 B) ($3 B) ($0.6 B)

Ukraine, Russia, South Africa, Turkey

(Total value received by exchanges in region)

84%79%69% 73% 76% 48%

Exchange receiving activity by region: Europe leads the way in merchant services, LatAm brings in outsized amounts of scam proceeds

45

Page 49: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

3 | OUR DATA: HOW CRYPTOCURRENCIES FLOW BETWEEN TYPOLOGIES

46

Page 50: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

4

47

Page 51: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

FINAL THOUGHTS

48

Page 52: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

Consider this your jumping off point for cryptocurrency. You should now have an understanding of the different typologies transacting on the blockchain and which ones are likely to be risky versus less so.

But as we’ve emphasized throughout the report, understanding the typologies is just the beginning of cryptocurrency expertise. In order to truly vet cryptocurrency services or get actionable information from services you’re investigating, you need to be able to trace their transactions on an individual level. That’s what Chainalysis allows you to do.

This graph produced in Chainalysis Reactor, our cryptocurrency investigation software, shows the movement of funds stolen from Japan-based Bitpoint exchange in a 2019 hack. In this case, hackers took $92 million worth of Ripple, a popular cryptocurrency. On the left, you can see funds moved from the exchange to addresses controlled by the attacker, before being sent to several exchanges to be traded for bitcoin, before being reconsolidated and eventually sent to a mixer. These are the kinds of insights that can help bring the attackers to justice and recover the stolen funds.

49

Page 53: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

If you’d like to learn more about how Chainalysis can help your team uncover similar insights and make the blockchain safer, visit our site to

learn more and sign up for a demo.

50

Page 54: Who’s Who On The Blockchains?...mining pools have entire server farms dedicated just to mining. BTC.com and NiceHash are two of the biggest, most successful mining pools operating

WHO’S WHO ON THE BLOCKCHAINS? | THE CHAINALYSIS GUIDE TO CRYPTOCURRENCY TYPOLOGIES

JANUARY 2020

BUILDING TRUST IN BLOCKCHAINS