Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Use PlugX DLL Sideloading in PlugX-Like Chain
May 11, 2026
Hackers Deliver Malware via Fake DeepSeek TUI GitHub Rep
May 11, 2026
Cybercrime Network Takedown Exposes 22, Crimenetwork Users
May 11, 2026
Home/Threats/Cybercriminal Cryptocurrency Transactions Peaked in 2025 Following
Threats

Cybercriminal Cryptocurrency Transactions Peaked in 2025 Following

Illicit cryptocurrency addresses received at least $154 billion in 2025, a figure that represents an unprecedented peak in the cryptocurrency crime landscape. This staggering figure represents a 162...

David kimber
David kimber
January 12, 2026 2 Min Read
3 0

Illicit cryptocurrency addresses received at least $154 billion in 2025, a figure that represents an unprecedented peak in the cryptocurrency crime landscape.

This staggering figure represents a 162 percent increase compared to the previous year, driven largely by nation-states moving into cryptocurrency ecosystems to evade international sanctions at scale.

The shift marks a critical turning point where geopolitical tensions are now directly manifesting within blockchain networks, creating new challenges for regulatory bodies and security teams worldwide.

Over the past few years, the crypto crime ecosystem has become remarkably professionalized.

Illicit actors have developed sophisticated on-chain infrastructure to support transnational criminal networks, enabling them to procure goods and services while laundering stolen digital assets.

Three waves of crypto crime (Source - Chainalysis)
Three waves of crypto crime (Source – Chainalysis)

The landscape has evolved through distinct waves: from early rogue cybercriminals operating in isolated niches between 2009 and 2019, to organized illicit actor organizations providing infrastructure services from 2020 to 2024, and now to 2025’s large-scale nation-state activity fundamentally reshaping the entire ecosystem.

Chainalysis analysts identified that this transformation represents the maturation phase of illicit on-chain infrastructure, where government agencies now face significantly higher stakes on both consumer protection and national security fronts.

The most striking development involves Russia’s creation of the ruble-backed A7A5 token in February 2025.

This purpose-built infrastructure processed over 93.3 billion in transactions within less than one year, demonstrating how nation-states have shifted from theoretical sanctions evasion strategies to operational on-chain activities.

Stablecoin Dominance and Infrastructure Evolution

The technical shift in illicit cryptocurrency activity reveals a critical pattern in asset utilization.

Stablecoins now account for 84 percent of all illicit transaction volume, up from smaller percentages in previous years.

Total cryptocurrency value received by illicit addresses (Source - Chainalysis)
Total cryptocurrency value received by illicit addresses (Source – Chainalysis)

Their practical advantages including easy cross-border transferability, lower volatility, and broader utility across trading platforms have made them the preferred choice for actors seeking to move value quickly and securely.

Beyond direct nation-state participation, Chainalysis researchers documented how North Korean-linked hackers stole over 2 billion in 2025, including the February Bybit exploit marking the largest digital heist in cryptocurrency history at nearly 1.5 billion.

Simultaneously, Iranian proxy networks facilitated money laundering operations totaling 2 billion through confirmed wallets in sanctions designations, while Chinese money laundering networks emerged as dominant forces providing full-service criminal infrastructure including laundering-as-a-service capabilities.

This professionalization of illicit infrastructure now supports everything from traditional ransomware operations to state-level sanctions evasion, representing a fundamental restructuring of cryptocurrency crime itself.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

ExploitHackerransomwareSecurity

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

ValleyRAT_S2 Malware Steals Financial Details from Organizations

Next Post

10 Best Product Management Tools – 2026

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
GhostLock Attack Locks Files Via Windows Sharing Like Ransom
May 11, 2026
Hackers Deploy Trojanized ScreenConnect via Malicious JPEG
May 11, 2026
macOS Malware Spread via Google Ads & Claude.ai Leverages Legitimate
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us