Step by step: How crypto fraud and security breaches are investigated

Published at: March 3, 2021

It’s every exchange’s worst nightmare: Falling victim to a security breach. An incident can disrupt a trading platform’s operations for weeks, affect customer confidence and damage a carefully cultivated reputation — even causing crypto markets to fall in some cases.

Crypto companies have been ramping up their security measures in recent years, determined to ensure that malicious actors don’t get an opportunity to infiltrate their systems. This has prompted hackers, scammers and fraudsters to rely on more sophisticated techniques.

One crucial weapon has emerged that helps trading platforms take speedy action in the event that their infrastructure is compromised: Analytics software. But how do these companies go about their investigations whenever a breach is reported? What are the tools that can be relied upon to follow a thief’s tracks?

This is a step-by-step guide to investigating crypto fraud, security breaches and ransomware.

Hunting the hackers

Irrespective of whether cryptocurrencies are stolen through fraudulent activities or scams — with ransomware becoming an increasingly popular method for swindling victims — investigation techniques often follow a similar pattern.

The first step is to identify a criminal’s crypto address as soon as possible. This information can then be passed on to analytics software companies, which can immediately tag the address as high risk. Doing this quickly can ensure that the entity is easier to track. There can be times when there’s little information about an address hash, but this doesn’t mean that there’s a dead end. That’s because transaction and date filtering can be used instead.

Next, it’s a race against time to start tracking bad actors who may begin to obfuscate the funds that they have misappropriated. They may start sending transactions to other exchanges or use mixing services and darknet entities. Although this commonly happens immediately after crypto has been taken, it can sometimes take months or years for obfuscation to commence — when a criminal may think no one is looking. Analytics providers can offer transaction alerts to ensure that victims can be immediately notified when funds flow to or from an address.

These transaction alerts need to be acted upon as a matter of urgency, as work begins to follow the trail. A crucial step involves notifying exchanges that might end up receiving some of this crypto to ensure they are able to block stolen funds that flow into their accounts. Visualization tools can play a role in illustrating how misappropriated assets are distributed — and show the addresses that may be directly or indirectly connected to the criminal.

An investigation in action

Crystal Blockchain has shared an example of how investigations work in practice. The analytics software provider recently played an instrumental role in examining the aftermath of a hot wallet security breach that affected Eterbase in September 2020, which Cointelegraph reported on at the time.

Immediately after the theft took place, Eterbase sprang to action by publicly announcing the address that was used by the Bitcoin thief. This enabled Crystal to immediately tag this wallet as a high-risk entity.

Quickly, it became possible to piece together information about this address — including statistics on further transactions and connections. It soon emerged that this suspicious wallet had connections to 16 other addresses.

Through Crystal’s All Connections tool, it was revealed that this address had indeed received funds from Eterbase, as well as other exchanges, which had been sent on to a plethora of unnamed entities.

The company said it was able to look further than a one-hop distance — and include indirect connections in its results. From here, it was established that 80% of the total funds that were stolen had been sent to a mixing service.

Eterbase went live once again on Jan. 15 — with its team asking exchange users to stop using old crypto deposit addresses that belonged to their accounts. In an update at the end of January, the company said that an official investigation is still ongoing — and it stressed that affected users who are eligible for a refund will receive one as soon as possible.

Keeping track

Crystal Blockchain says crypto crime is growing in parallel with the crypto markets. The company recently released a map of security breaches and fraud within the digital assets sector over the past 10 years.

The interactive timeline tracks the number of incidents in every year since 2011, and also provides a total figure for the funds that were stolen. Its data suggests that $1.48 billion was taken across 28 incidents in 2020.

Users who visit this article can also use a spinning globe to find out the total volume of funds that have been stolen in countries around the world — with the hardest-hit nations colored in the darkest shade of red.

According to Crystal, the most common locations for exchange breaches include the U.S., the U.K., South Korea, Japan and China. The largest-ever crypto security breach remains the incident involving the Japanese exchange Coincheck in 2018, overtaking the Mt. Gox incident back in 2014.

Learn more about Crystal Blockchain

Disclaimer. Cointelegraph does not endorse any content or product on this page. While we aim at providing you all important information that we could obtain, readers should do their own research before taking any actions related to the company and carry full responsibility for their decisions, nor this article can be considered as an investment advice.

Tags
Related Posts
Wallet Creator Offers $250K to Anyone Who Can Crack the ‘Hack-Proof’
Offline cold storage cryptocurrency wallet service provider GK8 is offering a bug bounty of up to $250,000 to the first person who can hack its product. GK8 — which presents its solution as a “hack-proof digital vault” that needs no direct or indirect connection to the internet — will place 14 Bitcoin (BTC) (over $125,000 at press time) in its wallet. Anyone who succeeds in breaking into the wallet will pocket its proceeds, plus an additional $125,000 prize. The bounty program will run from Feb. 3 (9:00 a.m EST) through February 4, 2020 (9:00 AM EST). Mitigating state-sponsored attacks and …
Blockchain / Jan. 28, 2020
Trident Crypto Fund Data Breach: 266,000 Passwords Stolen
In a major privacy breach, the usernames and passwords of more than a quarter of a million Trident Crypto Fund customers have been stolen and published online. Technical director of cybersecurity firm DeviceLock Ashot Oganesyan told Russian news outlet IZ the database — which contains email addresses, cellphone numbers, encrypted passwords and IP addresses — had been uploaded to various file sharing websites on February 20. Earlier this week, hackers decrypted and published close to 120,000 of the passwords, potentially enabling them to log into affected users’ accounts and access their funds. 10,000 Russians affected Oganesyan said that while attacks …
Blockchain / March 6, 2020
Binance Falls From Top 10 in CryptoCompare’s New Crypto Exchange Rankings
London-based crypto data provider CryptoCompare has updated its crypto Exchange Benchmark, removing Binance cryptocurrency exchange from the list of the top 10 exchanges. Binance, the second biggest crypto exchange by daily trade volume to date, is not included in the CryptoCompare’s list as the rankings do not rely on aggregate volume data in its analysis, the firm said in a press release to Cointelegraph on Nov. 19. In order, the top 10 crypto exchanges in CryptoCompare’s second Exchange Benchmark are: Gemini, Paxos’ itBit, Coinbase, Kraken, Bitstamp, Liquid, OKEx, Poloniex, bitFlyer and Bitfinex. Binance was ranked seventh in the first Exchange …
Blockchain / Nov. 20, 2019
Crypto app targeting SharkBot malware resurfaces on Google app store
A newly upgraded version of a banking and crypto app targeting malware has recently resurfaced on the Google Play store, now with the capability to steal cookies from account logins and bypass fingerprint or authentication requirements. A warning about the new version of the malware was shared by malware analyst Alberto Segura and treat intelligence analyst Mike Stokkel on Twitter accounts on Sept. 2, sharing their co-authored article on Fox IT’s blog. We discovered a new version of #SharkbotDropper in Google Play used to download and install #Sharkbot! The found droppers were used in a campaign targeting UK and IT! …
Blockchain / Sept. 5, 2022
Main hacker in Transit Swap exploit agrees to return remaining funds
On Monday, decentralized finance (DeFi) protocol Transit Swap announced that it had reached an agreement with its biggest hacker for the return of funds. Approximately one week prior, a hacker exploited an internal bug on a swap contract within the protocol and caused other individuals to imitate the security breach, leading to a loss of over $23 million in user funds. However, the main hacker has since returned approximately 70% of exploited funds thanks to the help of security companies such as Peckshield, SlowMist, Bitrace, and TokenPocket. They quickly tracked down the hacker by identifying their IP address, email address, …
Blockchain / Oct. 10, 2022