Skip to main content

How Does an Attacker Cash out Their Illicit Gains?

After successfully double-spending, the attacker holds a liquid asset (e.g. Bitcoin, stablecoins) obtained from the exchange.

They typically move this asset through mixing services or multiple addresses to obscure the trail. Finally, they may use peer-to-peer exchanges or centralized exchanges with lax KYC/AML to convert the crypto into fiat currency or use it to purchase other, less traceable cryptocurrencies.

What Is the Difference between a VASP and a P2P Transaction under the Travel Rule?
What Is “Liquid Staking” and How Does It Affect Token Utility?
What Is the Difference between a ‘Fiat-Backed’ and a ‘Crypto-Backed’ Stablecoin?
How Do ‘Mixers’ or ‘Tumblers’ Relate to the Challenges of AML on Public Blockchains?