Cryptocurrency Crime Tactics Quiz
81 Questions
4 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What method is commonly used in laundering proceeds from scams?

  • Utilizing tokens and stablecoins (correct)
  • Transferring funds through traditional banks
  • Investing in high-risk cryptocurrencies
  • Using cryptoasset ATMs for fiat conversion
  • Which activity is characteristic of money mules in the cryptocurrency space?

  • Using stolen identities for transactions (correct)
  • Conducting legitimate exchanges
  • Investing in decentralized finance projects
  • Harvesting funds from cryptocurrency mining
  • Privacy coins are typically used for which of the following purposes?

  • Enhancing transaction speeds
  • Layering illicit proceeds (correct)
  • Acting as a secure wallet
  • Providing transparent transaction records
  • What is one of the risks associated with decentralized exchanges (DEXs)?

    <p>Facilitating money laundering</p> Signup and view all the answers

    Chain hopping in cryptocurrency generally refers to what behavior?

    <p>Transferring assets from one blockchain to another</p> Signup and view all the answers

    Which of the following is a common tactic used in laundering hacked tokens?

    <p>Converting tokens to fiat currency</p> Signup and view all the answers

    What type of risk does indirect exposure to cryptoassets present for banks?

    <p>Involvement in criminal activities indirectly</p> Signup and view all the answers

    What is a significant advantage that DEXs offer to criminals?

    <p>Ability to bypass compliance controls</p> Signup and view all the answers

    Which of the following exchanges is NOT mentioned as a non-compliant exchange?

    <p>Binance</p> Signup and view all the answers

    How do DEXs compare to traditional exchanges in the context of criminal activity?

    <p>They facilitate greater anonymity</p> Signup and view all the answers

    What is the primary concern regarding DEXs as mentioned in the context of criminal exploitation?

    <p>Inability to track transactions</p> Signup and view all the answers

    What type of trading volume is implied to be higher in DEXs compared to traditional exchanges?

    <p>Criminal trading volume</p> Signup and view all the answers

    What was BTC-e primarily known for?

    <p>Facilitating illicit activities</p> Signup and view all the answers

    Who established BTC-e?

    <p>Alexander Vinnik</p> Signup and view all the answers

    What significant penalty did BTC-e face from FinCEN?

    <p>$110 million</p> Signup and view all the answers

    What type of information did BTC-e collect from its customers?

    <p>Only a username, password, and email address</p> Signup and view all the answers

    What was one of the illegal activities BTC-e was involved in?

    <p>Computer hacking and ransomware</p> Signup and view all the answers

    How did BTC-e attempt to hide its operations?

    <p>Through a web of corporate structures</p> Signup and view all the answers

    What did US authorities estimate about ransomware payments related to BTC-e?

    <p>95% of ransomware payments were cashed out via BTC-e</p> Signup and view all the answers

    What types of cryptocurrencies did BTC-e allow access to?

    <p>Privacy coins like Dash</p> Signup and view all the answers

    Which of the following statements is true regarding BTC-e's ownership structure?

    <p>It involved numerous shell companies</p> Signup and view all the answers

    What is a primary concern regarding OTC desks and their operations?

    <p>They can be used for money laundering activities.</p> Signup and view all the answers

    Which country's OTC brokers have been notably linked to large money laundering operations?

    <p>China</p> Signup and view all the answers

    What was a common operational model of the SUEX and Chatex exchange service?

    <p>Enabling crypto-to-cash swaps without KYC.</p> Signup and view all the answers

    How did US law enforcement describe the involvement of Chinese crypto brokers?

    <p>Laundering funds for Mexican drug cartels.</p> Signup and view all the answers

    What measure did Chinese authorities take regarding OTC traders?

    <p>Implemented a crackdown due to laundering concerns.</p> Signup and view all the answers

    What method do criminals often employ to deceive legitimate exchanges?

    <p>Using fraudulent KYC documents.</p> Signup and view all the answers

    What role do money mules play in money laundering operations?

    <p>They open accounts to move funds for criminals.</p> Signup and view all the answers

    What is one of the potential risks associated with using regulated exchanges?

    <p>They can be used by criminals to launder funds.</p> Signup and view all the answers

    Which type of currency swap was facilitated by some OTC brokers allowing users in the UK?

    <p>Stablecoins for fiat cash.</p> Signup and view all the answers

    What is a characteristic of the trading environment for OTC desks?

    <p>Often anonymous and less regulated.</p> Signup and view all the answers

    What is the typical initial step in a money mule operation at a cryptoasset exchange?

    <p>Individuals establish accounts at the exchange shortly after one another.</p> Signup and view all the answers

    During the money muling operations described, what type of documentation do new customers commonly provide?

    <p>Passports and driving licenses.</p> Signup and view all the answers

    What monetary amount were students reportedly offered to act as money mules?

    <p>£500 to £1,000 per week.</p> Signup and view all the answers

    What type of funds were transferred into the students' bank accounts?

    <p>Round value denominations of £700.</p> Signup and view all the answers

    How did the criminals instruct the students to handle the illicit funds?

    <p>They were instructed to buy cryptoassets using the funds.</p> Signup and view all the answers

    What was a potential result of students acting as money mules in this operation?

    <p>They aided criminals in laundering the proceeds of fraud.</p> Signup and view all the answers

    What role did personal information play in the money mule operations?

    <p>It was necessary for criminals to manipulate accounts.</p> Signup and view all the answers

    What did the criminal organization posing as job recruiters assure the students?

    <p>The process would be completely legal.</p> Signup and view all the answers

    Why might students have provided selfies as part of their identity verification?

    <p>To match their identities with the accounts they opened.</p> Signup and view all the answers

    What was the final goal of the money mule operation using student accounts?

    <p>To launder illicit funds through cryptoasset exchanges.</p> Signup and view all the answers

    What major event occurred on March 29th, 2022 involving Ronin Network?

    <p>A large-scale hack resulted in $615 million being stolen.</p> Signup and view all the answers

    What indicates a possible red flag related to customer activity on a decentralized exchange (DEX)?

    <p>A customer suddenly attempts to cash out a large sum.</p> Signup and view all the answers

    What method did the attacker use to steal funds from the Ronin bridge?

    <p>Compromising the private keys of validator nodes.</p> Signup and view all the answers

    Which of the following actions was taken by the US Treasury in response to the Ronin bridge hack?

    <p>Initiated sanctions against the identified thief's Ethereum address.</p> Signup and view all the answers

    What percentage of the stolen funds from the Ronin hack was estimated to have been laundered as of April 14th?

    <p>18%</p> Signup and view all the answers

    What common characteristic do individuals involved in money mule schemes often share?

    <p>They usually belong to the same nationality and reside at similar addresses.</p> Signup and view all the answers

    What was one specific instruction given to students acting as money mules?

    <p>To transfer illicit funds to cryptoasset exchanges and purchase cryptoassets.</p> Signup and view all the answers

    What type of identity documentation was typically needed from new customers at cryptoasset exchanges involved in such operations?

    <p>Government-issued identification like passports and driving licenses.</p> Signup and view all the answers

    What type of funds did the criminal organization transfer to the students' bank accounts?

    <p>Illicit funds derived from online fraud.</p> Signup and view all the answers

    How did the criminal organization initially attract students to the money muling scheme?

    <p>By offering high paying job advertisements on social media.</p> Signup and view all the answers

    What was the primary purpose of the money mule accounts in the scheme targeting students?

    <p>To act as fronts for laundering illicit funds.</p> Signup and view all the answers

    What monetary range was offered to students who acted as money mules?

    <p>£500 to £1,000 per week.</p> Signup and view all the answers

    Which of the following describes a method used by criminals to manipulate money mule accounts?

    <p>Transfer and withdraw funds to/from different cryptoexchanges.</p> Signup and view all the answers

    What kind of financial activities were the students initially unaware of during their participation in the scheme?

    <p>The nature of the job advertisement's legality.</p> Signup and view all the answers

    What role do compliance teams play in monitoring blockchain activity?

    <p>To manage risk exposure related to illicit activities</p> Signup and view all the answers

    Which of the following is NOT considered a high-risk jurisdiction for money laundering?

    <p>Regions with effective AML/CTF regulations</p> Signup and view all the answers

    What type of exposure do exchanges risk when associated with cryptoasset mixers?

    <p>Transactional exposure to sanctioned wallets</p> Signup and view all the answers

    What is a key characteristic of countries with ineffective regulatory frameworks for cryptoassets?

    <p>They may not be categorized as high-risk in other contexts</p> Signup and view all the answers

    Which type of illicit actors might compliance teams specifically monitor in blockchain transactions?

    <p>Connections to dark web markets and cybercriminals</p> Signup and view all the answers

    What common aspect do high-risk jurisdictions share regarding cryptoasset activities?

    <p>They present risk for money laundering and terrorist financing</p> Signup and view all the answers

    What is a critical function of a comprehensive dashboard used by compliance teams?

    <p>To assess the risk of illicit transactional exposure</p> Signup and view all the answers

    What primary mechanism do criminals use to convert illicit funds through DEXs?

    <p>Swapping Ether or Ethereum-based tokens for new tokens</p> Signup and view all the answers

    Which group was noted for frequently using DEXs in 2022 to hide stolen funds?

    <p>Lazarus Group from North Korea</p> Signup and view all the answers

    What advantage do DEXs offer in terms of transaction visibility?

    <p>They provide transparency through public blockchain records.</p> Signup and view all the answers

    What process typically follows after a criminal swaps tokens at a DEX?

    <p>They deposit the new tokens at a legitimate exchange.</p> Signup and view all the answers

    What is one of the limitations of laundering funds through DEXs?

    <p>Funds through DEXs can be analyzed using blockchain analytics.</p> Signup and view all the answers

    Which technology enables the visibility of transactions on DEXs?

    <p>Smart contracts recorded on the blockchain</p> Signup and view all the answers

    How do DEXs differ from centralized exchanges in terms of user oversight?

    <p>DEXs lack a central administrator with oversight.</p> Signup and view all the answers

    What role does Tornado Cash play in the ecosystem surrounding DEXs?

    <p>It is a mixing service that obscures transaction origins.</p> Signup and view all the answers

    What is a common first step in a money laundering typology involving DEXs?

    <p>Obtaining Ether or Ethereum-based tokens through hacking.</p> Signup and view all the answers

    What potential risk might arise from DEXs concerning law enforcement activities?

    <p>Transactions are more transparent, making tracking easier.</p> Signup and view all the answers

    What is a primary feature of decentralized exchanges (DEXs) compared to centralized exchanges?

    <p>DEXs prioritize user control over funds.</p> Signup and view all the answers

    How much money has been laundered through DEXs according to the research mentioned?

    <p>$1.2 billion</p> Signup and view all the answers

    What type of trading do DEXs facilitate?

    <p>Peer-to-peer trading through smart contracts</p> Signup and view all the answers

    Which factor has contributed to the increase of vulnerabilities in DEXs?

    <p>Explosive trading volumes and liquidity</p> Signup and view all the answers

    What is a significant challenge in monitoring money laundering activities on DEXs?

    <p>Immediate and anonymous transactions</p> Signup and view all the answers

    Which of the following statements is true regarding the competition between DEXs and centralized exchanges?

    <p>DEX trading volumes can match large centralized exchanges.</p> Signup and view all the answers

    What is one of the primary methods used by money launderers on DEXs?

    <p>Layering large volumes of funds through DEXs</p> Signup and view all the answers

    What technological advancement has Elliptic pioneered to combat risks in cross-chain crime?

    <p>Holistic Screening capabilities</p> Signup and view all the answers

    What was one outcome of the increased liquidity on DEXs?

    <p>Increased vulnerability to exploitation</p> Signup and view all the answers

    Study Notes

    Executive Summary 2024

    • Elliptic's 2024 report details recent developments in the nexus between cryptoassets and financial crimes, including new findings from FinCEN and OFAC.
    • Key developments included increased use of stablecoins in scams and sanctions evasion, and cryptoasset exchanges in high risk jurisdictions continuing to facilitate criminal activity.
    • Criminals are using AI-enhanced tools like deepfakes and botnets to perpetrate crimes involving cryptoassets more effectively and at a larger scale
    • Elliptic's report aims to equip investigators and analysts with the necessary tools and information to identify new financial crime risks in the quickly developing crypto asset landscape.
    • Increased use of stablecoins and cryptoasset exchanges in high-risk jurisdictions; and criminals are using AI for more effective crime.

    Part I: Money Laundering

    • Cryptoasset Exchanges:
      • Criminals frequently utilize unlicensed or non-compliant exchanges to move funds.
      • Exchanges in high-risk jurisdictions often facilitate money laundering.
      • Money mules and fraudulent documents are commonly used to disguise illicit transactions.
      • Use of non-compliant and unlicensed exchanges allows criminals to bypass regulations and ensure fewer obstacles in moving illicit funds between fiat and cryptoasset platforms or crypto-to-crypto.
    • Mixers and Privacy Wallets:
      • Mixing services obscure transaction trails, making it harder to trace money laundering activities.
      • Law enforcement has actively targeted and disrupted key mixing services like Helix and Bitcoin Fog.
      • Increasingly, evasion is reliant on multiple techniques.
    • Decentralized Finance (DeFi) and Cross-chain Crime:
      • Decentralized exchanges (DEXs) are increasingly utilized for money laundering due to their decentralized and transparent nature.
      • Cross-chain bridges facilitate the seamless transfer of funds across different blockchain networks, enabling rapid laundering.
      • Funds are frequently moved between numerous addresses as evasion techniques.
    • Tokens and Stablecoins:
      • Misleading token projects or initial coin offerings (ICOs) are frequently used to defraud investors.
      • Unregulated and non-compliant exchange services or those in high-risk jurisdictions are preferred by criminals for layering illicit funds in stablecoins.
      • Stablecoins are increasingly used to launder illicit funds, particularly in "pig butchering" scams.
    • Privacy Coins and Chain Hopping:
      • Privacy coins such as Monero, Dash, and Zcash are commonly employed to layer illicit funds.
      • Chain hopping enables criminals to swap funds between different blockchains.
      • Coinswap services are primarily used by criminals and are frequently located in high-risk regions.
    • Wallet-specific Behaviors:
      • Criminals employ techniques like chain peeling to obscure their transaction history and avoid detection.
        • Frequently repeating new wallet addresses during transactions
      • Multi-customer cross-wallet activities (simultaneously operating multiple accounts) facilitate transactions involving multiple parties in a criminal network.

    Part II: Terrorist Financing

    • Some specific money laundering trends include fraud schemes, use of crypto ATMs, and cryptocurrency for terrorist financing.
      • There appears to be an ongoing trend of using digital currencies to fund terrorist activities.
    • Hackers and Cybercriminals:
      • Hackers and cybercriminals use complex and sophisticated money laundering techniques to move funds from illicit activities.
      • They utilize a range of complex financial crime methods.
    • Dark Web Vendors:
      • The sale of illicit goods and services on the dark web often involves cryptocurrencies and specialized money laundering methods.
    • Fraudsters:
      • Fraudsters use the internet and social media to deceive individuals, and cryptocurrencies are often used in these scams to obscure the trail.
    • Professional Money Launderers:
      • Sophisticated professionals use cryptocurrencies for large-scale laundering operations.
    • Street Drug Dealers:
      • Drug dealers use cryptocurrencies to facilitate transactions and avoid traditional financial institutions.
    • Human Traffickers and Sex Traders:
      • These groups employ cryptocurrency for transactions within their business models.
    • Tax Evaders:
      • Individuals use cryptoassets to evade tax obligations.
    • State Actors/Sanctions Evaders:
      • State-sponsored cybercriminals and sanctioned actors frequently use cryptocurrencies for sanctions evasion.
    • Terrorists/Political Extremists:
      • Terrorists use crypto assets to fund activities outside traditional banking systems.
    • Many actors employ multiple methods to obscure the origin and movement of their funds.
    • Overall, the use of cryptocurrencies for illicit activities is increasing and becoming more sophisticated.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on the various tactics and risks associated with cryptocurrency fraud and decentralized exchanges. This quiz covers money laundering methods, characteristics of money mules, and the advantages and concerns of DEXs. Explore how these elements interact in the crypto landscape.

    More Like This

    Cryptocurrency Basics Quiz
    10 questions

    Cryptocurrency Basics Quiz

    WellRoundedSanctuary avatar
    WellRoundedSanctuary
    Cryptocurrency 101 Quiz 1
    3 questions

    Cryptocurrency 101 Quiz 1

    RazorSharpPlateau avatar
    RazorSharpPlateau
    Use Quizgecko on...
    Browser
    Browser