This is an opinion editorial by Matthew Green and Brian Mondoh, contributors for Bitcoin Magazine.
With all the available cryptocurrencies, including anonymity-designed bytecoin, monero and zcash, ransomware attackers continue to demand bitcoin and some reports show darknet markets are fuelled by bitcoin transactions (see pages 54 and 109 of the Chainalysis 2022 Crypto Crime Report[1]). Seemingly, bitcoin remains one of the most valuable assets for criminals utilizing blockchain technology given its relative stability, price and relevance.
Similarly, in many cases, where other cryptocurrencies have been stolen, obfuscated or paid as part of a scam, funds are transferred into bitcoin and then extracted as fiat. In August 2021, Liquid exchange announced[2] that 67 different ERC-20 tokens, along with large quantities of ether and bitcoin, had been moved by a party working on behalf of the Democratic People’s Republic of Korea. The attacker swapped numerous tokens including ERC-20 tokens to ether and then bitcoin before cashing out. As a result, approximately $91.35M was laundered. Similar transfers were made in the Spartan Protocol hack[3] in May 2021 where the attacker was able to steal approximately $30 million from the project.
While large-scale attacks worth hundreds of millions of dollars are investigated by the government bodies designed to fight criminal activity, similar values of bitcoin are extracted from people and businesses everyday. There are now systems in place to allow private individuals, including corporate entities, to trace their assets (and their proceeds) and use the court system to make them whole.
This approach has been exercised routinely in the English court system and is on the rise in other common law jurisdictions, which rely on precedents to match victims back with their funds. Below is a summary of the legal and practical