blog.chainalysis.com Open in urlscan Pro
104.196.239.80  Public Scan

URL: https://blog.chainalysis.com/reports/2022-crypto-crime-report-introduction/
Submission: On August 31 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

<form id="mktoForm_1232" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Arial, Verdana, sans-serif; font-size: 24px; color: rgb(51, 51, 51); width: 486px;" __bizdiag="2048253403" __biza="WJ__">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoDownloadButton .mktoButton {
      position: relative;
      display: inline-block;
      vertical-align: top;
      height: 36px;
      line-height: 35px;
      padding: 0 20px;
      font-size: 13px;
      color: white;
      text-align: center;
      text-decoration: none;
      text-shadow: 0 -1px rgba(0, 0, 0, 0.4);
      background-clip: padding-box;
      border: 1px solid;
      border-radius: 2px;
      cursor: pointer;
      -webkit-box-shadow: inset 0 1px rgba(255, 255, 255, 0.1), inset 0 0 0 1px rgba(255, 255, 255, 0.08), 0 1px 2px rgba(0, 0, 0, 0.25);
      box-shadow: inset 0 1px rgba(255, 255, 255, 0.1), inset 0 0 0 1px rgba(255, 255, 255, 0.08), 0 1px 2px rgba(0, 0, 0, 0.25);
      background: #3b5ca0;
      border-color: #2d477b #2d477b #263c68;
      background-image: -webkit-linear-gradient(top, #4369b6, #3b5ca0 66%, #365391);
      background-image: -moz-linear-gradient(top, #4369b6, #3b5ca0 66%, #365391);
      background-image: -o-linear-gradient(top, #4369b6, #3b5ca0 66%, #365391);
      background-image: linear-gradient(to bottom, #4369b6, #3b5ca0 66%, #365391);
    }

    .mktoForm .mktoButtonWrap.mktoDownloadButton .mktoButton:before {
      content: "";
      position: absolute;
      top: 0;
      bottom: 0;
      left: 0;
      right: 0;
      pointer-events: none;
      background-image: -webkit-radial-gradient(center top, farthest-corner, rgba(255, 255, 255, 0.08), rgba(255, 255, 255, 0));
      background-image: -moz-radial-gradient(center top, farthest-corner, rgba(255, 255, 255, 0.08), rgba(255, 255, 255, 0));
      background-image: -o-radial-gradient(center top, farthest-corner, rgba(255, 255, 255, 0.08), rgba(255, 255, 255, 0));
      background-image: radial-gradient(center top, farthest-corner, rgba(255, 255, 255, 0.08), rgba(255, 255, 255, 0));
    }

    .mktoForm .mktoButtonWrap.mktoDownloadButton .mktoButton:hover:before {
      background-image: -webkit-radial-gradient(farthest-corner, rgba(255, 255, 255, 0.18), rgba(255, 255, 255, 0.03));
      background-image: -moz-radial-gradient(farthest-corner, rgba(255, 255, 255, 0.18), rgba(255, 255, 255, 0.03));
      background-image: -o-radial-gradient(farthest-corner, rgba(255, 255, 255, 0.18), rgba(255, 255, 255, 0.03));
      background-image: radial-gradient(farthest-corner, rgba(255, 255, 255, 0.18), rgba(255, 255, 255, 0.03));
    }

    .mktoForm .mktoButtonWrap.mktoDownloadButton .mktoButton:active {
      background: #3b5ca0;
      border-color: #263c68 #2d477b #2d477b;
      -webkit-box-shadow: inset 0 1px 2px rgba(0, 0, 0, 0.2);
      box-shadow: inset 0 1px 2px rgba(0, 0, 0, 0.2);
    }

    .mktoForm .mktoButtonWrap.mktoDownloadButton .mktoButton:active:before {
      content: none;
    }

    .mktoForm .mktoButtonWrap.mktoDownloadButton button.mktoButton {
      background: #101729;
    }
  </style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 0px;">
          <div class="mktoAsterix">*</div>
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" placeholder="Email Address" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth"
          style="width: 600px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoDownloadButton" style="margin-left: 25px;"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="1232"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="503-FAP-074"><input type="hidden" name="converting_timestamp__c" value="2022-08-31 22:05:09"><input type="hidden" name="converting_source__c"
    value="direct"><input type="hidden" name="converting_medium__c" value="none"><input type="hidden" name="converting_term__c" value="not provided"><input type="hidden" name="converting_landing_page__c"
    value="https://blog.chainalysis.com/reports/2022-crypto-crime-report-introduction/"><input type="hidden" name="original_timestamp__c" value="2022-08-31 22:05:09"><input type="hidden" name="original_source__c" value="direct"><input type="hidden"
    name="original_medium__c" value="none"><input type="hidden" name="original_term__c" value="not provided"><input type="hidden" name="original_landing_page__c"
    value="https://blog.chainalysis.com/reports/2022-crypto-crime-report-introduction/"><input type="hidden" name="converting_timestamp__c" class="mktoField mktoFieldDescriptor" value="2022-08-31 22:05:09"><input type="hidden"
    name="converting_source__c" class="mktoField mktoFieldDescriptor" value="direct"><input type="hidden" name="converting_medium__c" class="mktoField mktoFieldDescriptor" value="none"><input type="hidden" name="converting_term__c"
    class="mktoField mktoFieldDescriptor" value="not provided"><input type="hidden" name="converting_landing_page__c" class="mktoField mktoFieldDescriptor" value="https://blog.chainalysis.com/reports/2022-crypto-crime-report-introduction/"><input
    type="hidden" name="original_timestamp__c" class="mktoField mktoFieldDescriptor" value="2022-08-31 22:05:09"><input type="hidden" name="original_source__c" class="mktoField mktoFieldDescriptor" value="direct"><input type="hidden"
    name="original_medium__c" class="mktoField mktoFieldDescriptor" value="none"><input type="hidden" name="original_term__c" class="mktoField mktoFieldDescriptor" value="not provided"><input type="hidden" name="original_landing_page__c"
    class="mktoField mktoFieldDescriptor" value="https://blog.chainalysis.com/reports/2022-crypto-crime-report-introduction/">
</form>

GET https://blog.chainalysis.com/

<form method="get" class="search-form" action="https://blog.chainalysis.com/" __bizdiag="115" __biza="WJ__">
  <input type="search" class="search-field" name="s" placeholder="Search..." value="" required="">
  <button type="submit" class="search-submit visuallyhidden">Submit</button>
  <p class="message"> Type above and press <em>Enter</em> to search. Press <em>Esc</em> to cancel. </p>
  <input type="hidden" name="converting_timestamp__c" value="2022-08-31 22:05:09"><input type="hidden" name="converting_source__c" value="direct"><input type="hidden" name="converting_medium__c" value="none"><input type="hidden"
    name="converting_term__c" value="not provided"><input type="hidden" name="converting_landing_page__c" value="https://blog.chainalysis.com/reports/2022-crypto-crime-report-introduction/"><input type="hidden" name="original_timestamp__c"
    value="2022-08-31 22:05:09"><input type="hidden" name="original_source__c" value="direct"><input type="hidden" name="original_medium__c" value="none"><input type="hidden" name="original_term__c" value="not provided"><input type="hidden"
    name="original_landing_page__c" value="https://blog.chainalysis.com/reports/2022-crypto-crime-report-introduction/">
</form>

<form novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Arial, Verdana, sans-serif; font-size: 24px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"
  __bizdiag="-1844941971" __biza="WJ__"><input type="hidden" name="converting_timestamp__c" value="2022-08-31 22:05:09"><input type="hidden" name="converting_source__c" value="direct"><input type="hidden" name="converting_medium__c"
    value="none"><input type="hidden" name="converting_term__c" value="not provided"><input type="hidden" name="converting_landing_page__c" value="https://blog.chainalysis.com/reports/2022-crypto-crime-report-introduction/"><input type="hidden"
    name="original_timestamp__c" value="2022-08-31 22:05:09"><input type="hidden" name="original_source__c" value="direct"><input type="hidden" name="original_medium__c" value="none"><input type="hidden" name="original_term__c"
    value="not provided"><input type="hidden" name="original_landing_page__c" value="https://blog.chainalysis.com/reports/2022-crypto-crime-report-introduction/"></form>

Text Content

 * Products
 * Solutions
 * Services
 * Insights
 * Company
 * Contact Us

WHY CHAINALYSIS

Turn blockchain transactions into insights and risk into compliance

 * Reactor Blockchain analysis for financial crime investigations
 * KYT Transaction Monitoring for AML/CFT compliance
 * Address Screening Prevent high-risk users from connecting to your platform
 * Business Data Customer intelligence for crypto businesses
 * Kryptos Free Sanctions Screening

 * Compliance Ensure you meet evolving local and global regulations
 * Investigations Detect and investigate crypto crime
 * DeFi Safely participate in the DeFi revolution
 * NFTs Ensure safe access and controls for NFTs with purpose-built solutions

 * Investigations & Special Programs Professional investigators providing
   forensic analysis to resolve cybersecurity breaches and trace stolen funds
 * Crypto Incident Response Professional expertise and investigative
   capabilities for recovering lost funds in the event of a cyber incident
 * Training & Certification Crypto fundamentals and product courses Chainalysis
   Academy Get started with short training courses

 * BLOG
   
   Crime Markets Policy & Regulation Crypto Basics Chainalysis in Action Company
   News

 * WEBINARS
   
   View upcoming and on-demand webinars from our experts and industry leaders
   
   PODCAST
   
   Public Key is the cryptocurrency and compliance podcast
   
   MARKET INTEL
   
   Understand the cryptocurrency markets with live data

 * REPORTS
   
   The 2022 Crypto Crime Report The Chainalysis State of Web3 Report

 * Customers See why organizations around the world trust Chainalysis.
 * About Chainalysis Chainalysis is the blockchain data platform.
 * Careers Chainalysis is growing fast, globally. Join us today.
 * Chainalysis Government Solutions Partner Directory Become a Partner


 * Products
 * Solutions
 * Services
 * Insights
 * Company
 * Contact Us

Products


 * WHY CHAINALYSIS
   
   Turn blockchain transactions into insights and risk into compliance


 * REACTOR


 * KYT


 * ADDRESS SCREENING


 * BUSINESS DATA


 * KRYPTOS


 * FREE SANCTIONS SCREENING

Solutions


 * COMPLIANCE
   
   Ensure you meet evolving local and global regulations


 * INVESTIGATIONS
   
   Detect and investigate crypto crime


 * DEFI
   
   Safely participate in the DeFi revolution


 * NFTS
   
   Ensure safe access and controls for NFTs with purpose-built solutions

Services


 * INVESTIGATIONS & SPECIAL PROGRAMS
   
   Professional investigators providing forensic analysis to resolve
   cybersecurity breaches and trace stolen funds


 * CRYPTO INCIDENT RESPONSE
   
   Professional expertise and investigative capabilities for recovering lost
   funds in the event of a cyber incident


 * TRAINING & CERTIFICATION
   
   Crypto fundamentals and product courses


 * CHAINALYSIS ACADEMY
   
   Get started with short training courses

Insights


 * BLOG
   
   Crime Markets Policy & Regulation Crypto Basics Chainalysis in Action Company
   News


 * WEBINARS


 * PODCAST


 * MARKET INTEL


 * REPORTS

Company


 * CUSTOMERS
   
   See why organizations around the world trust Chainalysis.


 * ABOUT CHAINALYSIS
   
   Chainalysis is the blockchain data platform.


 * CAREERS
   
   Chainalysis is growing fast, globally. Join us today.


 * CHAINALYSIS GOVERNMENT SOLUTIONS


 * PARTNER DIRECTORY


 * BECOME A PARTNER

Crime


CRYPTO CRIME TRENDS FOR 2022: ILLICIT TRANSACTION ACTIVITY REACHES ALL-TIME HIGH
IN VALUE, ALL-TIME LOW IN SHARE OF ALL CRYPTOCURRENCY ACTIVITY

January 6, 2022
January 6, 2022 | By Chainalysis Team

Share
Share on Facebook Share on Twitter Email

This blog is a preview of our 2022 Crypto Crime Report. Sign up here to download
your copy now!

Cryptocurrency-based crime hit a new all-time high in 2021, with illicit
addresses receiving $14 billion over the course of the year, up from $7.8
billion in 2020.



But those numbers don’t tell the full story. Cryptocurrency usage is growing
faster than ever before. Across all cryptocurrencies tracked by Chainalysis,
total transaction volume grew to $15.8 trillion in 2021, up 567% from 2020’s
totals. Given that roaring adoption, it’s no surprise that more cybercriminals
are using cryptocurrency. But the fact that the increase was just 79% — nearly
an order of magnitude lower than overall adoption — might be the biggest
surprise of all. 

In fact, with the growth of legitimate cryptocurrency usage far outpacing the
growth of criminal usage, illicit activity’s share of cryptocurrency transaction
volume has never been lower.



Transactions involving illicit addresses represented just 0.15% of
cryptocurrency transaction volume in 2021 despite the raw value of illicit
transaction volume reaching its highest level ever. As always, we have to caveat
this figure and say that it is likely to rise as Chainalysis identifies more
addresses associated with illicit activity and incorporates their transaction
activity into our historical volumes. For instance, we found in our last Crypto
Crime Report that 0.34% of 2020’s cryptocurrency transaction volume was
associated with illicit activity — we’ve now raised that figure to 0.62%. Still,
the yearly trends suggest that with the exception of 2019 — an extreme outlier
year for cryptocurrency-based crime largely due to the PlusToken Ponzi scheme —
crime is becoming a smaller and smaller part of the cryptocurrency ecosystem.
Law enforcement’s ability to combat cryptocurrency-based crime is also evolving.
We’ve seen several examples of this throughout 2021, from the CFTC filing
charges against several investment scams, to the FBI’s takedown of the prolific
REvil ransomware strain, to OFAC’s sanctioning of Suex and Chatex, two
Russia-based cryptocurrency services heavily involved in money laundering. 

However, we also have to balance the positives of the growth of legal
cryptocurrency usage with the understanding that $14 billion worth of illicit
activity represents a significant problem. Criminal abuse of cryptocurrency
creates huge impediments for continued adoption, heightens the likelihood of
restrictions being imposed by governments, and worst of all victimizes innocent
people around the world. In this report, we’ll explain exactly how and where
cryptocurrency-based crime increased, dive into the latest trends amongst
different types of cybercriminals, and tell you how cryptocurrency businesses
and law enforcement agencies around the world are responding. But first, let’s
look at a few of the key trends in cryptocurrency-based crime.


DEFI’S RISE LEADS TO NEW OPPORTUNITIES IN CRYPTO CRIME

What’s changed in the last year? Let’s start by looking at what types of
cryptocurrency-based crime increased the most in 2021 by transaction volume.



Two categories stand out for their growth: stolen funds and, to a lesser degree,
scams. DeFi is a big part of the story for both.

Let’s start with scams. Scamming revenue rose 82% in 2021 to $7.8 billion worth
of cryptocurrency stolen from victims. Over $2.8 billion of this total — which
is nearly equal to the increase over 2020’s total — came from rug pulls, a
relatively new scam type in which developers build what appear to be legitimate
cryptocurrency projects — meaning they do more than simply set up wallets to
receive cryptocurrency for, say, fraudulent investing opportunities — before
taking investors’ money and disappearing. Please keep in mind as well that these
figures for rug pull losses represent only the value of investors’ funds that
were stolen, and not losses from the DeFi tokens’ subsequent loss of value
following a rugpull.

We should note that roughly 90% of the total value lost to rug pulls in 2021 can
be attributed to one fraudulent centralized exchange, Thodex, whose CEO
disappeared soon after the exchange halted users’ ability to withdraw funds.
However, every other rug pull tracked by Chainalysis in 2021 involved DeFi
projects. In nearly all of these cases, developers have tricked investors into
purchasing tokens associated with a DeFi project before draining the tools
provided by those investors, sending the token’s value to zero in the process. 

We believe rug pulls are common in DeFi for two related reasons. One is the hype
around the space. DeFi transaction volume has grown 912% in 2021, and the
incredible returns on decentralized tokens like Shiba Inu have many excited to
speculate on DeFi tokens. At the same time, it’s very easy for those with the
right technical skills to create new DeFi tokens and get them listed on
exchanges, even without a code audit. A code audit is a process by which a
third-party firm or listing exchange analyzes the code of the smart contract
behind a new token or other DeFi project, and publicly confirms that the
contract’s governance rules are iron clad and contain no mechanisms that would
allow for the developers to make off with investors’ funds. Many investors could
likely have avoided losing funds to rug pulls if they’d stuck to DeFi projects
that have undergone a code audit – or if DEXes required code audits before
listing tokens.  

Cryptocurrency theft grew even more, with roughly $3.2 billion worth of
cryptocurrency stolen in 2021 — a 516% increase compared to 2020. Roughly $2.3
billion of those funds — 72% of the 2021 total — were stolen from DeFi
protocols. The increase in DeFi-related thefts represents the acceleration of a
trend we identified in last year’s Crypto Crime report. 



In 2020, just under $162 million worth of cryptocurrency was stolen from DeFi
platforms, which was 31% of the year’s total amount stolen. That alone
represented a 335% increase over the total stolen from DeFi platforms in 2019.
In 2021, that figure rose another 1,330%. In other words, as DeFi has continued
to grow, so too has its issue with stolen funds. As we’ll explore in more detail
later in the report, most instances of theft from DeFi protocols can be traced
back to errors in the smart contract code governing those protocols, which
hackers exploit to steal funds, similar to the errors that allow rug pulls to
occur. 

We’ve also seen significant growth in the usage of DeFi protocols for laundering
illicit funds, a practice we saw scattered examples of in 2020 and that became
more prevalent in 2021. Check out the graph below, which looks at the growth in
illicit funds received by different types of services in 2021 compared to 2020.



DeFi protocols saw the most growth by far in usage for money laundering at
1,964%. 

DeFi is one of the most exciting areas of the wider cryptocurrency ecosystem,
presenting huge opportunities to entrepreneurs and cryptocurrency users alike.
But DeFi is unlikely to realize its full potential if the same decentralization
that makes it so dynamic also allows for widespread scamming and theft. One way
to combat this is better communication — both the private and public sectors
have an important role to play in helping investors learn how to avoid dubious
projects. In the longer term, the industry may also need to take more drastic
steps to prevent tokens associated with potentially fraudulent or unsafe
projects from being listed on major exchanges.


ILLICIT CRYPTOCURRENCY BALANCES ARE GROWING. WHAT CAN LAW ENFORCEMENT DO?

One promising development in the fight against cryptocurrency-related crime is
the growing ability of law enforcement to seize illicitly obtained
cryptocurrency. In November 2021, for instance, the IRS Criminal Investigations
announced that it had seized over $3.5 billion worth of cryptocurrency in 2021 —
all from non-tax investigations — representing 93% of all funds seized by the
division during that time period. We’ve also seen several examples of successful
seizures by other agencies, including $56 million seized by the Department of
Justice in a cryptocurrency scam investigation, $2.3 million seized from the
ransomware group behind the Colonial Pipeline attack, and an undisclosed amount
seized by Israel’s National Bureau for Counter Terror Financing in a case
related to terrorism financing.

This raises an interesting question: How much cryptocurrency are criminals
currently holding? It’s impossible to know for sure, but we can estimate based
on the current holdings of addresses Chainalysis has identified as associated
with illicit activity. As of early 2022, illicit addresses hold at least $10
billion worth of cryptocurrency, with the vast majority of this held by wallets
associated with cryptocurrency theft. Addresses associated with darknet markets
and with scams also contribute significantly to this figure. As we’ll explore
later in this report, much of this value comes not from the initial amount
derived from criminal activity, but from subsequent price increases of the
crypto assets held. 

We believe it’s important for law enforcement agencies to understand these
estimates as they build out their blockchain-based investigative capabilities,
and especially as they develop their ability to seize illicit cryptocurrency. 


LET’S MAKE CRYPTOCURRENCY SAFER

DeFi-related crime and criminal cryptocurrency balances are just one area of
focus for this report. We’ll also look at the latest data and trends on other
forms of cryptocurrency-based crime, including:

 * The ongoing threat of ransomware
 * Cryptocurrency-based money laundering
 * Nation state actors’ role in cryptocurrency-based crime
 * NFT-related fraud
 * And much more!

As cryptocurrency continues to grow, it’s imperative that the public and private
sectors work together to ensure that users can transact safely, and that
criminals can’t abuse these new assets. We hope that this report can contribute
to that goal, and equip law enforcement, regulators, and compliance
professionals with the knowledge to more effectively prevent, mitigate, and
investigate cryptocurrency-based crime. 

This blog is a preview of our 2022 Crypto Crime Report. Sign up here to download
your copy now!

This material is for informational purposes only, and is not intended to provide
legal, tax, financial, or investment advice. Recipients should consult their own
advisors before making investment decisions. 

This website contains links to third-party sites that are not under the control
of Chainalysis, Inc. or its affiliates (collectively “Chainalysis”). Access to
such information does not imply association with, endorsement of, approval of,
or recommendation by Chainalysis of the site or its operators, and Chainalysis
is not responsible for the products, services, or other content hosted therein. 

Chainalysis does not guarantee or warrant the accuracy, completeness,
timeliness, suitability or validity of the information in this report and will
not be responsible for any claim attributable to errors, omissions, or other
inaccuracies of any part of such material.

ComplianceCryptocurrencyCybercrimeData

Author Chainalysis Team



 * Tumblr


SUBSCRIBE TO OUR WEEKLY NEWSLETTER

*




Subscribe

 * SOLUTIONS
   
   SOLUTIONS
    * Compliance
    * Investigations
    * DeFi
    * NFTs
   
   COMPANY
    * About
    * Become a Chainalysis Partner

 * PRODUCTS
   
   PRODUCTS
    * Chainalysis Reactor
    * Chainalysis KYT
    * Chainalysis Address Screening
    * Chainalysis Business Data
    * Chainalysis Kryptos
    * Free Sanctions Screening
   
   CAREERS
    * Open Positions

 * CONTACT US
   
   CONTACT US
    * Sales
    * Media

 * RESOURCES
   
   RESOURCES
    * Blog
    * Professional Services
    * Training & Certification

--------------------------------------------------------------------------------

© 2022, Chainalysis Inc.

 * Privacy Policy

 * Products
 * Industries
 * Services
 * Resources
 * Customers
 * Company
 * Contact Us

Submit

Type above and press Enter to search. Press Esc to cancel.