Criminals launder money through Bitcoin

The lower value of the digital currency means criminals aren't hoarding it anymore

The decreasing value of Bitcoin has reduced the number of cyber crimes related to the digital currency, IBM has revealed.

Although such crimes are still happening, the way people use the digital currency for nefarious means has changed, according to IBM Security.

Rather than people collecting and saving the digital currency to use for other purchases, they are now converting them to other currencies in order to launder the money as fast as possible.

But the dropping value of the currency means people are less likely to take part in illegal activity to obtain them because they will not get the returns they previuously obtained.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Etay Maor, senior fraud prevention strategist at IBM Security, said: "They use Bitcoin for the money laundering part and take payment with it, but they'll move it out almost immediately.

"Most of them [the cyber criminals] won't keep bitcoins - they don't like the valuations Bitcoin has - so they just use it as a layer of obfuscation, and move it to a different form of money."

In 2013, one bitcoin was worth 728, but now each is worth 155 and the reducing exchange rate means fewer people are partaking in the activity themselves, but instead using mules to make money.

Maor said the people behind creating ransomware malware are recruiting mules to farm the money for them, paying them between 15 and 20 per cent commission on funds they process.

He explained that in Europe, mules are normally retired people looking to supplement their pensions, but in Asia and Australasia, students are recruited to launder Bitcoin funds.

However, those who get involved don't normally know they're involved in illegal activity until they are contacted by police.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/technology/34286/us-court-orders-alleged-bitcoin-inventor-to-split-his-bitcoin-hoard
Technology

US court orders alleged Bitcoin inventor to split his hoard

28 Aug 2019
Visit/digital-currency/30249/what-is-cryptocurrency-mining
digital currency

What is cryptocurrency mining?

6 Jan 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020