National-Level Players Enter the Game: The 2025 Revelation of Cryptocurrency Crime Spiraling Out of Control

marsbitОпубліковано о 2026-01-10Востаннє оновлено о 2026-01-10

Анотація

Summary: In 2025, state-level cryptocurrency activity surged, marking a new phase in the maturation of illicit on-chain ecosystems. Illicit addresses received at least $154 billion, a 162% year-over-year increase, largely driven by a 694% spike in transactions involving sanctioned entities. Stablecoins dominated these flows, accounting for 84% of all illicit transaction volume. Key trends include North Korean hackers stealing a record $2 billion, including the largest crypto theft in history from Bybit. Russia launched the ruble-backed A7A5 token, which saw $93.3 billion in transaction volume within a year, facilitating large-scale evasion. Chinese money laundering networks emerged as dominant, sophisticated operators offering full-service criminal enterprises. Iran-linked proxy networks moved over $2 billion for activities including oil sales and weapons procurement. Illicit actors and nations increasingly rely on full-stack infrastructure providers resistant to takedowns and sanctions. Furthermore, the connection between crypto and real-world violent crime is growing, with increased use in human trafficking and a rise in violent coercion attacks to seize crypto assets during price peaks. Collaboration between law enforcement, regulators, and crypto firms is crucial to counter these evolving, interconnected threats.

Original Author: Chainalysis

Original Compilation: Chopper, Foresight News

In 2025, we observed a significant increase in cryptocurrency-related activities at the national level, marking a new mature stage in the development of the illegal on-chain ecosystem. Over the past few years, the professionalization of the cryptocurrency crime sector has deepened; illegal organizations have now established large-scale on-chain infrastructure to support transnational criminal networks in procuring goods and services and laundering proceeds from crypto crimes. Against this backdrop, governments have also begun to enter this field, leveraging these mature professional service providers on one hand, while building their own customized infrastructure on the other to evade sanctions on a large scale. As governments connect to this cryptocurrency supply chain originally built for cybercriminals and organized crime groups, government agencies, compliance, and security teams now face severe challenges in terms of consumer rights protection and national security.

What are the specific on-chain manifestations of these trends and other industry changes? Next, we will analyze them by combining data and macro trends.

According to our monitoring data, the scale of funds flowing into illegal cryptocurrency addresses in 2025 reached at least $154 billion, a sharp increase of 162% year-on-year. This growth was primarily driven by a surge in fund inflows to sanctioned entities, which soared by 694% year-on-year. However, even excluding the growth from sanctioned entities, 2025 was still a record year for cryptocurrency crime, as the scale of the vast majority of illegal activities increased.

Nevertheless, the scale of these illegal transactions still pales in comparison to the overall cryptocurrency economy, as the main participants in the cryptocurrency market remain legitimate transactions. According to our estimates, although the proportion of illegal transactions in the total traceable cryptocurrency transaction volume in 2025 increased slightly compared to 2024, it remained below 1%.

As shown in the figure below, we also observed a continuous shift in the types of assets involved in cryptocurrency crimes.

Over the past few years, stablecoins have gradually become the dominant asset in illegal transactions, currently accounting for 84% of the total illegal transaction volume. This trend aligns with the overall development characteristics of the cryptocurrency ecosystem: with advantages such as convenient cross-border transfers, low volatility, and wide application scenarios, stablecoins continue to expand their share in the overall cryptocurrency transactions.

The following sections will delve into the core trends that defined the cryptocurrency crime landscape in 2025, which remain worthy of attention in the future.

National-Level Threats Drive Transaction Scale: North Korea Sets New Record in Theft, Russia's A7A5 Token Facilitates Large-Scale Sanction Evasion

In 2025, stolen funds remained a major threat to the cryptocurrency ecosystem, with hacking groups linked to North Korea alone stealing $2 billion. This figure was primarily driven by several highly destructive large-scale hacking incidents, the most notable of which was the attack on the Bybit exchange in February. The incident involved nearly $1.5 billion, making it the largest digital asset theft in the history of cryptocurrency. Although North Korean hackers have long been a major force threatening the cryptocurrency ecosystem, the past year set new records both in terms of the amount stolen and the sophistication of intrusion and money laundering methods.

Particularly noteworthy is that the scale of on-chain activities by governments reached unprecedented levels in 2025. Russia introduced relevant legislation in 2024 to promote the use of cryptocurrencies to evade sanctions, and this measure was officially implemented in February 2025. The country launched the ruble-backed token A7A5, which achieved a transaction volume of over $93.3 billion in less than a year since its launch.

Meanwhile, over the past few years, Iran's proxy networks have conducted money laundering, illegal oil transactions, and bulk commodity procurement for weapons through confirmed wallet addresses that have been placed on the sanctions list, with a cumulative transaction volume exceeding $2 billion. Despite multiple military strikes, Iran-supported terrorist groups such as Hezbollah, Hamas, and the Houthis continue to use cryptocurrencies on an unprecedented scale.

In 2025, Chinese money laundering networks emerged as a dominant force in the illegal on-chain ecosystem. These organizations operate with high precision, greatly driving the diversification and professionalization of cryptocurrency crimes, offering specialized criminal services including "money laundering services." Building on early illegal operation models such as "Huiyin Guarantee," these networks have established full-service criminal enterprises, covering areas such as fraud, scams, laundering proceeds from North Korean hacking thefts, sanction evasion, and terrorism financing.

Full-Stack Illegal Infrastructure Providers Fuel Malicious Network Activities

While governments are increasing their use of cryptocurrencies, traditional cybercrime activities remain rampant: ransomware operators, child sexual abuse and cybercrime platforms, malware distributors, scammers, and illegal trading markets still rely on extensive support networks to maintain operations. Illegal actors and governments are increasingly dependent on full-stack on-chain infrastructure providers, including domain registrars, secure and reliable hosting services, and other technical infrastructure that can be used to carry out malicious network activities.

These infrastructure providers have evolved into comprehensive infrastructure platforms capable of resisting platform takedowns, abuse complaints, and sanction enforcement. As the scale of these services continues to expand, they may become key drivers in expanding the scope of malicious network activities for economic crime and state-supported forces.

The Increasing Correlation Between Cryptocurrency and Violent Crime

In the perception of many, cryptocurrency crime is still confined to the virtual world. The masterminds are merely anonymous figures hiding behind keyboards, posing no real-world threat. However, in reality, the connection between on-chain activities and violent crime is deepening. Human trafficking groups are increasingly using cryptocurrencies for transactions; at the same time, disturbingly, the number of violent coercion attacks has risen significantly, with criminals using violent means to force victims to transfer crypto assets, and such assaults often occur during peak cryptocurrency price periods.

Looking ahead, collaboration between law enforcement agencies, regulatory bodies, and cryptocurrency companies will be key to addressing these complex, ever-changing, and interconnected threats. Although the proportion of illegal transactions in legitimate cryptocurrency transaction volume remains limited, maintaining the integrity and security of the cryptocurrency ecosystem has never been more important.

Пов'язані питання

QWhat was the total value of illicit cryptocurrency transactions in 2025, and what was the primary driver of this growth?

AThe total value of illicit cryptocurrency transactions in 2025 reached at least $154 billion, representing a 162% year-over-year increase. This growth was primarily driven by a massive 694% surge in transaction volume from sanctioned entities.

QWhich asset has become the dominant currency for illicit transactions and what percentage of the total illicit volume does it represent?

AStablecoins have become the dominant asset for illicit transactions, currently accounting for 84% of the total illicit transaction volume.

QWhat significant role did nation-states play in the 2025 crypto crime landscape according to the article?

ANation-states significantly escalated their involvement in 2025. Russia launched the ruble-backed A7A5 token, which processed over $93.3 billion in volume to circumvent sanctions. North Korean hacking groups stole a record $2 billion, and Chinese money laundering networks emerged as dominant, sophisticated players in the illicit ecosystem.

QWhat new concerning trend connects cryptocurrency to real-world physical violence?

AA concerning trend is the rise in violent coercion attacks, where criminals use physical violence to force victims to transfer their cryptocurrency assets. These attacks often occur during periods of peak cryptocurrency prices.

QDespite the growth in illicit activity, how does its scale compare to the overall cryptocurrency economy?

ADespite the significant growth, illicit transactions still represent less than 1% of the total traceable cryptocurrency transaction volume, meaning the vast majority of cryptocurrency market activity remains legitimate.

Пов'язані матеріали

Why Pricing Social Interactions is Doomed to Fail?

Titled "Why Putting a Price on Social Interaction Is Doomed to Fail," this article critiques attempts to monetize social networks directly through SocialFi models, arguing their inevitable failure stems from a fundamental misunderstanding of media dynamics. Using Marshall McLuhan's theory of "hot" and "cold" media, the author posits that social networks are inherently "cold" media. Their value isn't contained in individual posts but is co-created through user participation, interpretation, and fragmented, ongoing interaction (e.g., replies, shares). This ambiguity and need for user involvement are core to their function. The article asserts that SocialFi projects like Friend.tech failed because introducing real-time, tradable financial pricing (a definitive "hot" signal) into this "cold" environment doesn't add a layer—it replaces the medium's essence. The unambiguous price signal overshadows and nullifies the nuanced, participatory social signal. Users become traders, not participants, and when speculative profits vanish, the underlying social ecosystem—never genuinely cultivated—collapses entirely. This principle extends beyond crypto. The author argues platforms like Twitter have gradually "heated up" through metrics (likes, retweets counts, algorithmically defined value), shifting users from participants to performers and eroding organic engagement. The solution isn't to abandon capital but to manage its entry point. Successful models like Substack, Patreon, or Bandcamp allow capital to "condense" at specific, isolated nodes (e.g., subscriptions, one-time payments) without permeating and "heating" every social interaction. They preserve the core "cold," participatory medium while enabling monetization at designated boundaries. The NFT boom and bust serves as a stark parallel: the ancient "cold" medium of collecting (valued for story, community, gradual accumulation) was rapidly destroyed by platforms that introduced real-time floor prices, rarity scores, and trading dashboards, transforming collectors into speculators and vaporizing cultural value when prices fell. The core lesson: "Liquidity equals heat." Injecting high liquidity and definitive pricing into a "cold" participatory medium doesn't optimize it; it fundamentally alters and destroys its value-creating mechanism. The future lies not in pricing every social gesture but in finding precise, non-invasive points for capital to condense without overheating the entire ecosystem.

marsbit6 хв тому

Why Pricing Social Interactions is Doomed to Fail?

marsbit6 хв тому

Jensen Huang's CMU Speech: In the AI Era, Don't Just Watch, Build

Jensen Huang, CEO of NVIDIA and a first-generation immigrant, delivered the commencement address to Carnegie Mellon University's class of 2026. He shared his personal journey from a humble background to founding NVIDIA, emphasizing resilience, learning from failure, and the responsibility that comes with leadership. Huang framed the present moment as the dawn of the AI revolution, a shift he believes is more profound than previous computing waves. He described AI as fundamentally resetting computing—moving from human-written software to machines that understand, reason, and use tools. This will create a new industry for generating intelligence and transform every sector. While acknowledging AI's potential to automate tasks and displace some jobs, Huang distinguished between the *tasks* of a job and its core *purpose*. He argued AI will augment human capability, not replace humans. The real risk, he stated, is not AI itself, but people being left behind by those who effectively use AI. He presented AI as a generational opportunity for massive infrastructure investment—in chip factories, data centers, energy grids, and advanced manufacturing—that could re-industrialize nations like the U.S. and bridge the digital divide by making computing and intelligent tools accessible to all. Huang called for a balanced approach: advancing AI safely and responsibly, establishing prudent policies, ensuring broad access, and encouraging universal participation. He urged the graduates not to fear the future but to engage with optimism and ambition, reminding them of CMU's motto, "My heart is in the work." His core message was clear: this is their moment to actively build and shape the AI-powered future, not merely observe it.

marsbit1 год тому

Jensen Huang's CMU Speech: In the AI Era, Don't Just Watch, Build

marsbit1 год тому

The Era Has Arrived Where Human Writers Must Prove They Are Not Machines

The article describes an era where AI-generated content is flooding the market, forcing human authors to prove they are not machines. It begins with the example of dozens of AI-written, error-ridden biographies of Henry Kissinger appearing on Amazon within hours of his death, a pattern repeated for other deceased celebrities and even living experts who find fraudulent books under their names. This spam content has exploded, with monthly new book releases on platforms like Amazon reaching 300,000 by late 2025. The issue spans genres, from suspiciously high proportions of AI-written teen romance and self-help books to dangerous, AI-generated foraging guides containing lethal advice. The platforms' automated review systems, designed to catch plagiarism and banned words, are ill-equipped to detect AI-generated text that avoids these pitfalls while being nonsensical or fraudulent. The problem has infiltrated traditional publishing. A major publisher, Hachette, had to recall a bestselling horror novel after AI detection tools suggested 78% of its content was machine-generated. An acclaimed European philosophy book was later revealed to be entirely written by AI under a fake author persona. In response, authors are fighting back. At the 2026 London Book Fair, 10,000 writers published a blank book titled "Don't Steal This Book" containing only their signatures—using emptiness as a protest weapon in an age of AI overproduction. Initiatives like the "Human Author Certification" program have emerged, ironically placing the burden on humans to prove their work is not machine-made. The article warns of a vicious cycle: AI-generated low-quality books pollute the data used to train future AI models, leading to "model collapse" and an ever-worsening flood of digital waste, eroding trust in publishing and devaluing human creativity.

marsbit1 год тому

The Era Has Arrived Where Human Writers Must Prove They Are Not Machines

marsbit1 год тому

Торгівля

Спот
Ф'ючерси
活动图片