{"id":88305,"date":"2023-12-15T13:24:38","date_gmt":"2023-12-15T11:24:38","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=88305"},"modified":"2025-09-13T17:12:05","modified_gmt":"2025-09-13T14:12:05","slug":"over-300-million-in-stolen-bitcoin-passed-through-mixers-in-2023","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/over-300-million-in-stolen-bitcoin-passed-through-mixers-in-2023\/","title":{"rendered":"Over $300 million in stolen Bitcoin passed through mixers in 2023."},"content":{"rendered":"<p>In 2023, cryptocurrency mixers processed Bitcoin transactions totaling more than $300 million, stolen in various cyber incidents, according to CertiK analysts.<\/p>\n<p>\\n\\n\\n\\n<\/p>\n<blockquote class=\\\"twitter-tweet\\\">\n<p lang=\\\"en\\\" dir=\\\"ltr\\\">Over $300M in <a href=\\\"https:\/\/twitter.com\/hashtag\/stolen?src=hash&#038;ref_src=twsrc%5Etfw\\\">#stolen<\/a> <a href=\\\"https:\/\/twitter.com\/hashtag\/crypto?src=hash&#038;ref_src=twsrc%5Etfw\\\">#crypto<\/a> assets made their way into Bitcoin mixers in 2023: Data<\/p>\n<p>Data shared by <a href=\\\"https:\/\/twitter.com\/hashtag\/CertiK?src=hash&#038;ref_src=twsrc%5Etfw\\\">#CertiK<\/a> showed that a third of the <a href=\\\"https:\/\/twitter.com\/hashtag\/losses?src=hash&#038;ref_src=twsrc%5Etfw\\\">#losses<\/a> from 50 of the largest <a href=\\\"https:\/\/twitter.com\/hashtag\/crypto?src=hash&#038;ref_src=twsrc%5Etfw\\\">#crypto<\/a> exploits in #2023 ended up in the <a href=\\\"https:\/\/twitter.com\/hashtag\/Bitcoin?src=hash&#038;ref_src=twsrc%5Etfw\\\">#Bitcoin<\/a> <a href=\\\"https:\/\/twitter.com\/hashtag\/Network?src=hash&#038;ref_src=twsrc%5Etfw\\\">#Network<\/a>. <a href=\\\"https:\/\/t.co\/RNlNrwTpnn\\\">pic.twitter.com\/RNlNrwTpnn<\/a><\/p>\n<p>\u2014 Mystie.Eth (@mystie_eth) <a href=\\\"https:\/\/twitter.com\/mystie_eth\/status\/1735285276514398678?ref_src=twsrc%5Etfw\\\">December 14, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\\\"https:\/\/platform.twitter.com\/widgets.js\\\" charset=\\\"utf-8\\\"><\/script>\\n\\n\\n\\n<\/p>\n<p>According to their calculations, a third of losses from the 50 largest exploits fell on the Bitcoin network.<\/p>\n<p>\\n\\n\\n\\n<\/p>\n<p>After sanctions were imposed on the popular <a href=\"https:\/\/forklog.com\/en\/news\/what-is-the-tornado-cash-mixer-and-why-was-it-sanctioned\">mixers Tornado Cash<\/a>, criminals shifted attention to similar services to hamper tracking of stolen funds.<\/p>\n<p>\\n\\n\\n\\n<\/p>\n<blockquote class=\\\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\\\"><p>\\n<\/p>\n<p>&#8216;Mixers are in demand not only among users who care about privacy, but also among various cybercriminals. While this scenario poses a problem, it is important to recognise it as an inherent aspect of decentralized systems,&#8217; said Joe Green, head of CertiK&#8217;s incident-response group.<\/p>\n<p>\\n<\/p><\/blockquote>\n<p>\\n\\n\\n\\n<\/p>\n<p>He also added that increasingly sophisticated methods for money laundering require prompt action from <span data-descr=\\\"anti-money laundering\\\" class=\\\"old_tooltip\\\">AML<\/span>-services.<\/p>\n<p>\\n\\n\\n\\n<\/p>\n<blockquote class=\\\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\\\"><p>\\n<\/p>\n<p>&#8216;The most effective countermeasure may be comprehensive tracking of &#8216;dirty&#8217; funds. Information sharing with relevant parties, such as exchanges, is also an important step,&#8217; Green said.<\/p>\n<p>\\n<\/p><\/blockquote>\n<p>\\n\\n\\n\\n<\/p>\n<p>In late November, the Bitcoin mixer Sinbad.io <a href=\"https:\/\/forklog.com\/en\/news\/bitcoin-mixer-sinbad-io-sanctioned-by-the-united-states-after-server-seizures\">was sanctioned by the United States<\/a> after servers were seized.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2023, cryptocurrency mixers processed Bitcoin transactions totaling more than $300 million, stolen in various cyber incidents.<\/p>\n","protected":false},"author":1,"featured_media":88306,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1204,44],"class_list":["post-88305","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-certik","tag-cybercrime"],"aioseo_notices":[],"amp_enabled":true,"views":"19","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/88305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=88305"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/88305\/revisions"}],"predecessor-version":[{"id":88307,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/88305\/revisions\/88307"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/88306"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=88305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=88305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=88305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}