Frame-2085666935

Blind Spot Audit

Secure fraud your IDV already approved.

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

Frame-2085666935

Deepfake Detection

Check where deepfake IDs slipped
through your stack.

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

Frame-2085666935

Liveness Detection

Find the replay gaps in your passed
liveness checks.

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

Frame-2085666935

Document Deepfake Detection

Spot synthetic documents hiding in
verified users.

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

Frame-2085666935

Document Originality Detection

Stop fake documents before they pass.

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

.

Introducing Blind Spot Audit. Spot AI-generated forgeries with advanced document analysis. Teg-1 Run Now on AWS right-arrow-2

Introducing Blind Spot Audit Teg-1

Spot AI-generated forgeries with advanced document analysis.

Run Now right-arrow-2
  • .

    Introducing Deepfake Detetction. Detect deepfakes with precision your stack has missed. Teg-1 Run Now on AWS right-arrow-2

    Introducing Deepfake DetetctionTeg-1

    Detect deepfakes with precision your stack has missed.

    Run Now right-arrow-2
  • .

    Introducing Liveness Detection. Detect spoofs with technology built for sophisticated fraud. Teg-1 Run Now on AWS right-arrow-2

    Introducing Liveness DetectionTeg-1

    Detect spoofs with technology built for sophisticated fraud.

    Run Now right-arrow-2
  • .

    Introducing Document Deepfake Detection. Spot AI-generated forgeries with advanced document analysis. Teg-1 Run Now on AWS right-arrow-2

    Introducing Document Deepfake DetectionTeg-1

    Spot AI-generated forgeries with advanced document analysis.

    Run Now right-arrow-2
  • .

    Introducing Document Originality Detection. Verify document authenticity before your next audit. Teg-1 Run Now on AWS right-arrow-2

    Introducing Document Originality DetectionTeg-1

    Verify document authenticity before your next audit.

    Run Now right-arrow-2
  • us

    216.73.216.219

    Scammers and Hackers Use Cloud Mining to Launder Cryptocurrencies

    n-img-scammers

    According to new research, the use of cloud mining methods to conceal crypto funds has intensified amongst those who commit ransomware and cryptocurrency scams.

    The use of cloud mining services by ransomware actors and scammers to launder digital assets and cryptocurrency has been increasing in recent years. “Cryptocurrency mining is a crucial part of our industry, but it also holds special appeal to bad actors, as it provides a means to acquire money from an immaculate on-chain original source,” stated Chainalysis. In March, Google Mandiant revealed how North Korean-based APT43 hid the stolen cryptocurrency’s forensic trail through cloud mining and hash rental services.

    The cloud mining method enables users to rent a computer system for the purpose of mining cryptocurrencies using that computer’s computational power. Moreover, the mining hardware does not need to be managed by the user. However, Chainalysis reports that nation-states are using more than just such services. In this case, funds were sent to an unnamed mainstream crypto exchange using mining pools and wallets associated with ransomware actors.

    A significant chunk of the funds was routed through an intermediary network of wallets and pools, totalling $19.1 million from accounts associated with four ransomware attacks and $14.1 million obtained from three cryptocurrency mining pools. “In this scenario, the mining pool acts similarly to a mixer in that it obfuscates the origin of funds and creates the illusion that the funds are proceeds from mining rather than ransomware,” Chainalysis noted.

    There is a growing trend of ransomware wallet assets being sent to exchanges via mining pools, rising substantially from less than $10,000 in Q1 2018 to approximately $50 million in Q1 2023. Additionally, at least $1 million worth of cryptocurrency has been received by 372 exchange deposit addresses originating from mining pools and ransomware. “Overall, the data suggest that mining pools may play a key role in many ransomware actors’ money laundering strategy,” Chainalysis said.

    It was recently discovered that the BitClub Network mixed its illicit Bitcoin proceeds with assets and BTC-e, a cryptocurrency exchange that was established as a means of laundering the proceeds of the Mt. Gox hack. Mining pools have also been included in scam operators’ playbooks.

    Mt. Gox stated, “Crypto scammers and money launderers working on their behalf also use mining pools as part of their money laundering process. Deposit addresses [with receipts of at least $1 million worth of crypto from mining pools] have received just under $1.1 billion worth of cryptocurrency from scam-related addresses since 2018.”

    Suggested Reads:

    UPDATED AML REGULATION FOR AUSTRALIAN DIGITAL CURRENCY EXCHANGE

    CRYPTOCURRENCIES NEED REGULATION TO PREVENT MONEY LAUNDERING, SAYS SINGAPORE MINISTER

    CANADA’S FEDERAL AGENCIES TO CONSULT ON ANTI-MONEY LAUNDERING AND COUNTER-TERRORISM MEASURES

    Related Posts

    News

    Meta Blocks 544,000+ Accounts Under Australia’s Social Media Ban

    Meta Blocks 544,000+ Accounts Under Australia’s Social Media Ban

    Explore More

    News

    Ireland Calls for Compulsory ID Verification on Social Platforms Across the EU

    Ireland Calls for Compulsory ID Verification on Social Platforms Across the EU

    Explore More

    News

    France Targets Under-15 Social Media Use With Mandatory Age Verification For 2026

    France Targets Under-15 Social Media Use With Mandatory Age Verification For 2026

    Explore More

    News

    Malaysia Aims for 95% Public Service Integration With MyDigital ID By 2030

    Malaysia Aims for 95% Public Service Integration With MyDigital ID By 2030

    Explore More

    News

    Germany’s eID Under Scrutiny as EU Digital Identity Wallet Deadline Nears

    Germany’s eID Under Scrutiny as EU Digital Identity Wallet Deadline Nears

    Explore More

    News

    Federal Judge Blocks Louisiana Social Media Age Verification Law Ahead of Enforcement

    Federal Judge Blocks Louisiana Social Media Age Verification Law Ahead of Enforcement

    Explore More

    News

    Department of Education Says New ID Checks Blocked $1B in Student Aid Fraud Linked to “Ghost Students”

    Department of Education Says New ID Checks Blocked $1B in Student Aid Fraud Linked to “Ghost Students”

    Explore More

    News

    Meta Blocks 544,000+ Accounts Under Australia’s Social Media Ban

    Meta Blocks 544,000+ Accounts Under Australia’s Social Media Ban

    Explore More

    News

    Ireland Calls for Compulsory ID Verification on Social Platforms Across the EU

    Ireland Calls for Compulsory ID Verification on Social Platforms Across the EU

    Explore More

    News

    France Targets Under-15 Social Media Use With Mandatory Age Verification For 2026

    France Targets Under-15 Social Media Use With Mandatory Age Verification For 2026

    Explore More

    News

    Malaysia Aims for 95% Public Service Integration With MyDigital ID By 2030

    Malaysia Aims for 95% Public Service Integration With MyDigital ID By 2030

    Explore More

    News

    Germany’s eID Under Scrutiny as EU Digital Identity Wallet Deadline Nears

    Germany’s eID Under Scrutiny as EU Digital Identity Wallet Deadline Nears

    Explore More

    News

    Federal Judge Blocks Louisiana Social Media Age Verification Law Ahead of Enforcement

    Federal Judge Blocks Louisiana Social Media Age Verification Law Ahead of Enforcement

    Explore More

    News

    Department of Education Says New ID Checks Blocked $1B in Student Aid Fraud Linked to “Ghost Students”

    Department of Education Says New ID Checks Blocked $1B in Student Aid Fraud Linked to “Ghost Students”

    Explore More

    Take the next steps to better security.

    Contact us

    Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

    Contact us

    Request demo

    Get free access to our platform and try our products today.

    Get started
    Shufti-tick

    Thanks For Your Submission.

      close-form

      Run Document Deepfake on AWS

      Stop synthetic IDs and forged scans

      Enter your work email*