Site iconSite icon ForkLog

Cybercriminals accelerate laundering of cryptoassets

Cybercriminals accelerate laundering of cryptoassets

The speed with which criminals move funds after breaches has become the crypto industry’s chief headache, according to a new Global Ledger report shared with ForkLog.

Analysts say that in the first half of the year, hackers stole more than $3.01bn across 119 incidents—one and a half times the industry’s total losses for all of last year.

Hackers’ new weapon

In 84% of cases, security systems recorded incidents on the day they occurred, Global Ledger found. That proved insufficient: in 68.1% of attacks, stolen funds were moved before companies detected the breach.

In 10.1% of cases, funds were moved instantly; in 64.7%, within the first 24 hours.

Source: Global Ledger.

The record transfer speed was four seconds. On average, 15 hours elapsed between an attack and the first movement of funds. Public disclosure typically took 37 hours, leaving cybercriminals more than 20 hours to cover their tracks.

“Even where there are technical means to track and freeze digital assets, legal systems are failing to adapt to the speed of illicit operations,” said Recoveris CEO Marcin Zarakowski.

In 22.7% of cases (over $34m), laundering was completed before the incident was disclosed; in 31.1%, within 24 hours of the first movement. The fastest end-to-end laundering—from incident to final deposit—took two minutes 57 seconds, which outpaced the fastest response time (five minutes one second) by 70%.

Because of AML delays, the fastest hackers enjoy a 75-fold advantage. Source: Global Ledger.

Only 4.2% of stolen funds were recovered, despite the ability to track addresses, the researchers noted. They blamed sluggish legal mechanisms and shortcomings in international co-operation.

“While the fastest movements can be detected, the slowest laundering cases have yet to be identified—including those related to the Bybit incident, as the funds are still in motion,” the report said.

After major breaches, hackers move funds more slowly as they split transfers to mask flows, the experts said. Averages, therefore, “can create a false sense that compliance teams and investigators have more time than they actually do”.

Prime targets and attack methods

Centralised exchanges (CEXs) are the main targets. In the first half, they accounted for 54.26% of losses—$1.63bn.

Source: Global Ledger.

“CEX remain the primary channel for cashing out stolen funds. Credit where it is due: many platforms already block high-risk deposits that exceed internal risk thresholds, routing them to manual review. But this works only with constant monitoring. Even a brief delay—just a few minutes—gives attackers a critical edge,” the analysts said.

Exploiting smart-contract vulnerabilities was the most common attack type, at 69.75%. Yet it led to “relatively moderate” losses of $365.5m, or 12.15% of the total stolen.

Malicious transaction signatures were rarer—6.72%—but caused the biggest financial damage: $1.46bn (48.51%).

Compromised private keys ranked second by incident count, costing the industry $650.05m (21.61%). They were followed by rug pulls, which accounted for $514.07m (17.08%).

All figures, however, are skewed by the Bybit incident, which greatly increased the weight of the malicious-signatures category. Excluding that case:

“The data reveal a clear trend: attackers are shifting from exploiting technical bugs to systemic weaknesses in key management, the behaviour of transaction signers and user interfaces,” Global Ledger noted.

Bridges as a laundering tool

The researchers also found that cross-chain bridges are hackers’ primary laundering tool. Some $1.5bn (50.1% of stolen funds) flowed through them—4.4 times more than through mixers ($339m).

“Bridges are displacing mixers as the preferred tool for large-scale laundering—likely due to their speed, liquidity and lower regulatory attention,” the Global Ledger specialists concluded.

Around 15% ($453m) reached CEXs and 5.6% ($170m) went into DeFi. Meanwhile, 53.6% of stolen assets ($1.6bn) remain idle—perhaps waiting for the heat to die down before further laundering.

Some inter-chain bridges have begun fighting abuse, for instance by blocking suspect wallets. They face a dilemma, the report said: they wish to remain open and decentralised, yet must also accommodate regulatory demands.

In August, researchers discovered an undisclosed hack of the LuBian mining pool involving 127,426 BTC.

Exit mobile version