{"id":15174,"date":"2024-07-12T16:49:49","date_gmt":"2024-07-12T13:49:49","guid":{"rendered":"https:\/\/forklog.com\/en\/chainalysis-estimates-100-billion-in-laundered-cryptocurrency\/"},"modified":"2024-07-12T16:49:49","modified_gmt":"2024-07-12T13:49:49","slug":"chainalysis-estimates-100-billion-in-laundered-cryptocurrency","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/chainalysis-estimates-100-billion-in-laundered-cryptocurrency\/","title":{"rendered":"Chainalysis Estimates $100 Billion in Laundered Cryptocurrency"},"content":{"rendered":"<p>Since 2019, crypto platforms have received digital assets worth approximately $100 billion from known illicit wallets, according to a report by Chainalysis.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Our Money Laundering report reveals how bad actors now use crypto to launder funds from off-chain crimes \u2014 not just crypto-native crimes like ransomware. We explore advanced tracing techniques and how blockchain data is leading the fight against fincrime.<a href=\"https:\/\/t.co\/32ApuphHpU\">https:\/\/t.co\/32ApuphHpU<\/a><\/p>\n<p>\u2014 Chainalysis (@chainalysis) <a href=\"https:\/\/twitter.com\/chainalysis\/status\/1811389435176427683?ref_src=twsrc%5Etfw\">July 11, 2024<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The largest amount, $30 billion, was recorded in 2022, linked to activities of sanctioned platforms such as the Russian exchange Garantex.<\/p>\n<p>Experts classify illicit wallets as those associated with criminal proceeds from hacks, crypto scams, darknet market trading, and other activities.<\/p>\n<p>The funds tracked by analysts represent the dollar equivalent of digital currencies sent for the initial stage of laundering to conversion services. These include crypto mixers, exchanges, DeFi protocols, gambling sites, and cross-chain bridges.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/121212121212.webp\" alt=\"121212121212\" class=\"wp-image-236859\"\/><figcaption class=\"wp-element-caption\">Data: Chainalysis.<\/figcaption><\/figure>\n<p>The company&#8217;s assessment does not include laundered funds whose illicit origin is unidentified or off-chain.<\/p>\n<p>They also did not account for coin transfers between intermediaries, which may involve &#8220;dozens or hundreds of separate transactions.&#8221; This method is used by criminals to obscure links to illicit proceeds before reintegrating assets into the economy.<\/p>\n<p>Chainalysis noted a trend of increasing numbers of wallets involved in the &#8220;whitening&#8221; of cryptocurrencies.<\/p>\n<p>Experts also observed that since 2021, the share of stablecoins in laundered digital assets has increased compared to traditional cryptocurrencies.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/32112312321.webp\" alt=\"32112312321\" class=\"wp-image-236860\"\/><figcaption class=\"wp-element-caption\">Data: Chainalysis.<\/figcaption><\/figure>\n<p>In May, Tether, the issuer of the largest stablecoin by market capitalization, USDT, and Chainalysis <a href=\"https:\/\/forklog.com\/en\/news\/tether-and-chainalysis-to-develop-secondary-market-monitoring-solution\">partnered<\/a> to track coin movements in the secondary market.<\/p>\n<p>As reported by Chainalysis, illicit revenues from crypto scams and hacks <a href=\"https:\/\/forklog.com\/en\/news\/chainalysis-reports-decline-in-illicit-crypto-revenues-for-2023\">declined<\/a> by 29.2% and 54.3% respectively in 2023.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since 2019, crypto platforms have received digital assets worth approximately $100 billion from known illicit wallets, according to a report by Chainalysis. Our Money Laundering report reveals how bad actors now use crypto to launder funds from off-chain crimes \u2014 not just crypto-native crimes like ransomware. We explore advanced tracing techniques and how blockchain data [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":15173,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[274,1154,1252],"class_list":["post-15174","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-chainalysis","tag-crimes","tag-reports"],"aioseo_notices":[],"amp_enabled":true,"views":"33","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/15174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=15174"}],"version-history":[{"count":0,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/15174\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/15173"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=15174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=15174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=15174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}