{"id":57726,"date":"2022-02-14T19:37:24","date_gmt":"2022-02-14T17:37:24","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=57726"},"modified":"2025-09-04T13:10:51","modified_gmt":"2025-09-04T10:10:51","slug":"chainalysis-names-moscow-city-firms-linked-to-laundering-cybercriminals-funds","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/chainalysis-names-moscow-city-firms-linked-to-laundering-cybercriminals-funds\/","title":{"rendered":"Chainalysis names Moscow City firms linked to laundering cybercriminals&#8217; funds"},"content":{"rendered":"<p>In 2021, cryptocurrency from ransomware passed through Russia-linked addresses for more than $400 million. This accounted for about 74% of total ransomware revenue, according to Chainalysis in a report.<\/p>\n<p>Analysts noted that many forms of ransomware are linked to Russian cybercriminals. Chainalysis emphasised that their ties to Russia are determined by the following criteria:<\/p>\n<ul class=\"wp-block-list\">\n<li>connection to the hacker group Evil Corp, based in Russia. Its leaders are <a href=\"https:\/\/u1f987.com\/en\/news\/lawyer-cites-reason-for-detention-of-co-founder-of-bitcoin-exchange-group-coyote-crypto-and-eggchange\">is suspected<\/a> of interacting with the Russian authorities;<\/li>\n<li>avoiding attacks on companies from the CIS;<\/li>\n<li>other indicators, such as the use of the Russian language.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/ktijREI0wjKdl_hWQDHg6mHdsht-zP2U32hRi_RAUd3_biJlowPUxo-vRV59Ldii3F_z1zhpb9iEbCJQdmyTEYLiqptEy4JhBARwb86HLSOW4CiNZOk0grXYnk_ISzQaLc6iJmPx\" alt=\"Chainalysis names Moscow City firms linked to laundering funds of cybercriminals\"\/><figcaption class=\"wp-element-caption\"><meta charset=\"utf-8\">Data: <a href=\"https:\/\/blog.chainalysis.com\/reports\/2022-crypto-crime-report-preview-russia-ransomware-money-laundering\/\">Chainalysis<\/a>.<\/figcaption><\/figure>\n<p>Experts found that the bulk of ransomware proceeds are laundered through services, mainly aimed at Russian users.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/Bzg3qVk9A68OR5DVYVywpWPudEbDbg_UWlJUEhNEq1zG3zm-Wq8tFfxaQ6H50ygYQTpSMAWxzBjIHzb3IyYNLzpZNlR7_ezqpk4rGTAFiDa4Kv4dzi7nvsGGpTSZI6rq60iisU6m\" alt=\"Chainalysis names Moscow City firms linked to laundering funds of cybercriminals\"\/><figcaption class=\"wp-element-caption\"><meta charset=\"utf-8\">Data: <a href=\"https:\/\/blog.chainalysis.com\/reports\/2022-crypto-crime-report-preview-russia-ransomware-money-laundering\/\">Chainalysis<\/a>.<\/figcaption><\/figure>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cRussia is home to several cryptocurrency companies that processed a significant volume of transactions from illicit addresses,\u201d the report says.<\/p>\n<\/blockquote>\n<p>Analysts are tracking several dozen cryptocurrency firms operating in Moscow City. More than half of them are located, or were located, in Federation Tower.<\/p>\n<p>Together, from 2019 to 2021 these companies quarterly received cryptocurrency worth hundreds of millions of dollars, and the total in the second quarter of last year reached nearly $1.2 billion, Chainalysis calculated. During the period, almost $700 million flowed to their addresses from high-risk accounts.<\/p>\n<p>The bulk of illegal funds consisted of proceeds from fraud ($313 million) and darknet markets ($296 million); ransomware proceeds amounted to $38 million, in third place.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/k63UeEVC9_EqDGZmylRA7_ySbySWcAsN5UlXGyJhXJMjW5l6eGchd5EbrVgTUK3m3MP-08racl_AHJ_9ax0-BOYYonnpRNQbR-9BRh3imYxN_ERZOdt2CCDKspIRa1Ngw6C0tpQE\" alt=\"Chainalysis names Moscow City firms linked to laundering funds of cybercriminals\"\/><figcaption class=\"wp-element-caption\"><meta charset=\"utf-8\">Data: <a href=\"https:\/\/blog.chainalysis.com\/reports\/2022-crypto-crime-report-preview-russia-ransomware-money-laundering\/\">Chainalysis<\/a>.<\/figcaption><\/figure>\n<p>Analysts note that the share of high-risk transactions for some companies is small. This can be explained by a lack of awareness, not deliberate criminal activity.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cBut for other Moscow City cryptocurrency firms, illicit funds account for up to or more than 30% of all received cryptocurrency, suggesting they may deliberately serve cybercriminal clients,\u201d Chainalysis says.<\/p>\n<\/blockquote>\n<p>The firm singled out several companies that were in some way linked to laundering funds during 2019-2021:<\/p>\n<ul class=\"wp-block-list\">\n<li>Bitzlato. More than $966 million in funds related to illegal or high-risk operations. This amount accounts for almost half of all cryptocurrency that passed through the company. Chainalysis says Bitzlato received $206 million from darknet marketplaces, $224.5 million from various forms of fraud, and $9 million from ransomware groups;<\/li>\n<li>Garantex. More than $645 million linked to suspicious transactions \u2014 31% of the total volume. According to Chainalysis, the company received over $10 million from ransomware operators, including NetWalker, Phoenix Cryptolocker and Conti;<\/li>\n<li>EggChange. More than $3.7 million related to illegal operations \u2014 11% of the total volume. EggChange co-founder Denis Dubnikov <a href=\"https:\/\/u1f987.com\/en\/news\/lawyer-cites-reason-for-detention-of-co-founder-of-bitcoin-exchange-group-coyote-crypto-and-eggchange\">is suspected<\/a> of laundering money for Ryuk operators.<\/li>\n<\/ul>\n<p>Chainalysis also noted Buy-bitcoin, Tetchange, Cashbank and Suex.<\/p>\n<p>Suex in September the US Treasury <a href=\"https:\/\/u1f987.com\/en\/news\/us-sanctions-bitcoin-exchange-suex-with-offices-in-moscow-and-saint-petersburg\">included on the sanctions list<\/a>. The agency says that funds of ransomware operators, scam projects, darknet marketplaces and the now-defunct BTC-e passed through the exchange.<\/p>\n<p>Chainalysis found that Suex, among other things <a href=\"https:\/\/u1f987.com\/en\/news\/millions-of-dollars-moved-from-wex-to-the-sanctioned-bitcoin-exchange-suex\">processed transactions with the cryptocurrency exchange WEX<\/a> for several millions of dollars. According to Elliptic, through the exchange <a href=\"https:\/\/u1f987.com\/en\/news\/elliptic-calculates-amount-laundered-through-the-suex-bitcoin-exchange\">more than $370 million<\/a> related to cybercriminals passed.<\/p>\n<p>Garantex, in a reply to ForkLog, said that criteria for \u201ctoxic\u201d transactions are still being formed on the market, and databases with information about them are continually expanded:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cAny cryptocurrency exchange operating for more than a year will face (or sooner or later will face) a situation in which its long-standing transactions may later be deemed \u2018toxic\u2019. Partly, this relates to ongoing investigations into highly resonant crimes.\u201d<\/p>\n<\/blockquote>\n<p>Currently, Garantex uses the Crystal service and, since late 2021, has been negotiating with Chainalysis to ensure \u201cthe maximum possible level of analytics\u201d of the exchange\u2019s operations:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cAll incoming transactions, labeled by Crystal as \u2018ransomware\u2019 at the moment they arrive at Garantex, were promptly blocked in accordance with our AML policies.\u201d<\/p>\n<\/blockquote>\n<p>Representatives said they operate under the Estonian-licence regime and adhere to a \u201czero tolerance\u201d stance toward transactions linked to illicit activity.<\/p>\n<p>Bitzlato said that reports of the company\u2019s Moscow office are incorrect and that the service is merely a broker between buyers and sellers. The company also noted it actively cooperates with law enforcement \u2014 in 2021 Bitzlato provided information to authorities in various countries no fewer than 200 times and blocked 1,157 users suspected of laundering funds. In a ForkLog comment, Bitzlato representatives added that the claim they belong to a crypto-criminal ecosystem is incorrect and erroneous.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cWe consider the information about classifying Bitzlato as part of the crypto-criminal ecosystem to be incorrect and erroneous,\u201d said the company representatives in a ForkLog interview.<\/p>\n<\/blockquote>\n<p><meta charset=\"utf-8\">ForkLog also approached Eggchange, Tetchange and Cashbank for comment but did not receive a reply by publication time.<\/p>\n<p>In January, the FSB announced the <a href=\"https:\/\/u1f987.com\/en\/news\/fsb-says-it-dismantled-the-revil-hacker-group\">takedown<\/a> of the REvil ransomware group, which had been behind distributing ransomware. It was described as one of the world\u2019s largest hacker collectives.<\/p>\n<p>Follow ForkLog\u2019s bitcoin news on our <a href=\"\/\/telegram.me\/forklog\" target=\"\u201c_blank\u201d\" rel=\"\u201cnofollow\u201d noopener\">Telegram<\/a> \u2014 cryptocurrency news, prices and analytics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2021, cryptocurrency from ransomware passed through Russia-linked addresses for more than $400 million. This accounted for about 74% of total ransomware revenue, according to Chainalysis.<\/p>\n","protected":false},"author":1,"featured_media":57727,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1635,274,1154,1470],"class_list":["post-57726","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-bitzlato","tag-chainalysis","tag-crimes","tag-garantex"],"aioseo_notices":[],"amp_enabled":true,"views":"34","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/57726","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=57726"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/57726\/revisions"}],"predecessor-version":[{"id":57728,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/57726\/revisions\/57728"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/57727"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=57726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=57726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=57726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}