SlideShare a Scribd company logo
1 of 30
Download to read offline
SESSION ID:
MODERATOR:
PANELISTS:
SESSION ID:
#RSAC
LAW-F02
Kathryn Haun
Stanford University, Assistant United States
Attorney, Northern District of California*
* In her personal capacity
Alan Cohn
Co-Chair, Blockchain and Digital Currency Practice, Steptoe & Johnson LLP and Counsel, Blockchain Alliance
@fifteencharlie
Fighting Cybercrime Using the
Blockchain
Jonathan Levin
Co-Founder and CRO
Chainalysis, Inc.
@jony_levin, @chainalysis
#RSAC
Fighting cybercrime using the
blockchain
Two short stories
#RSAC
Act 1: The Ransom
#RSAC
Introducing some characters
4
Alan Cohn
“The Strategy Guy”
Kathryn Haun
“The Investigator”
Jonathan Levin
“The Analyst”
???????
“The Villan”
#RSAC
Emergence of Ransomware
5
#RSAC
Ransom Sum
6
Your files have been encrypted and you are required to pay a 3 BTC to
following Bitcoin address : 12z5dAHP7GJjZsYvHHVsmwjqQLREwHZqix
#RSAC
FBI Guidance
7
While the FBI does not support paying a ransom, it recognizes executives, when faced with inoperability
issues, will evaluate all options to protect their shareholders, employees, and customers.
When Reporting Ransomware to a local field office please give
Date of Infection
Ransomware Variant (identified on the ransom page or by the encrypted file extension)
Victim Company Information (industry type, business size, etc.)
How the Infection Occurred (link in e-mail, browsing the Internet, etc.)
Requested Ransom Amount
Actor’s Bitcoin Wallet Address (may be listed on the ransom page)
Ransom Amount Paid (if any)
Overall Losses Associated with a Ransomware Infection (including the ransom amount)
Victim Impact Statement
How do I contact the FBI?
Visit nomoreransom.org
#RSAC
Locky Infection
8
#RSAC
Teslacrypt Infection
9
#RSAC
Ransom on the blockchain
10
https://blockchain.info/address/12z5dAHP7GJjZsYvHHVsmwjqQLREwHZqix
#RSAC
Analyzing the Ransomware behavior
11
Same cluster
My wallet
(e.g. CoinBase)
Ransom wallet
(may be unique)
Ransom wallet
(may be unique)
Sweeper Deposit Wallet
Another victim’s
wallet
Full
payment
Partial
payment
Legend
Victims
Ransomware
Exchange
Each exchangedeposit
wallet corresponds to one
ransomware operation.
#RSAC
Analyzing the Ransomware behavior
12
#RSAC
We are not the only victim
13
#RSAC
Geographic distribution of victims
14
#RSAC
Following the money
15
#RSAC
Subpoena to exchange
16
Main Street Bitcoin Exchange
#RSAC
Subpoena Response
17
John Locky
939-876-9874
jlocky@google.com
IBAN NUMBER: 2139-12312394
BANK: BIG BANK
#RSAC
Private-Public Partnerships
18
#RSAC
Act 2: The Vendor
#RSAC
Malware shopping
20
#RSAC
Controlled buy requires BTC
21
#RSAC
Top up my alphabay account
22
#RSAC
Revenues estimates
23
#RSAC
Encrypted communications
24
#RSAC
OSINT Gathering
25
DarkNetSoftware | Alphabay User Profile
NO DELIVERY IS GUARANTEED ON A SPECIFIC DATE
After some downtime of Alphabay, we have added our listings of our same products
ABRAXAS – DarkNetSoftware1
DREAM MARKET – DarknetSofrtware12
REAL DEAL – DarkNetSoftware
ATTENTION New BTC address
1D4h7KYG3F7XjiNbvT1y1YGzVziiKXqS3M
1GZbTevmN1qob8sHFY57ohh2ksam3R7opR
#RSAC
Tracking the Bitcoin
26
#RSAC
Physical search warrant
27
#RSAC
Epilogue
#RSAC
Apply What You Have Learned Today
29
After today’s session, you should understand:
How law enforcement conducts cybercrime investigations using the blockchain
What resources exist to assist law enforcement and private companies with
blockchain analytics
Should you become the victim of a ransomware attack or other
cybercrime involving digital currencies, you should be able to:
Effectively engage with law enforcement and prosecutors with respect to
investigating and prosecuting the crime
Take steps to make it easier to investigate and prosecute the crime
#RSAC
Contact
30
Alan Cohn – acohn@steptoe.com
Jonathan Levin – jonathan@chainalysis.com
Kathryn Haun – kathryn.haun@usdoj.gov

More Related Content

Similar to Fighting Cybercrime Using the Blockchain

CRYPTOCURRENCY
CRYPTOCURRENCYCRYPTOCURRENCY
CRYPTOCURRENCY
ParvinderKaur942099
 
The BitcoinHeist: Classifications of Ransomware Crime Families
The BitcoinHeist: Classifications of Ransomware Crime FamiliesThe BitcoinHeist: Classifications of Ransomware Crime Families
The BitcoinHeist: Classifications of Ransomware Crime Families
AIRCC Publishing Corporation
 

Similar to Fighting Cybercrime Using the Blockchain (20)

Hacking Blockchain
Hacking BlockchainHacking Blockchain
Hacking Blockchain
 
The Risks and Rewards of Trading Cryptocurrencies
The Risks and Rewards of Trading CryptocurrenciesThe Risks and Rewards of Trading Cryptocurrencies
The Risks and Rewards of Trading Cryptocurrencies
 
Cyber Attacks on Financial _ Vikjava
Cyber Attacks on Financial _ VikjavaCyber Attacks on Financial _ Vikjava
Cyber Attacks on Financial _ Vikjava
 
Cryptocurrency seminar topic presentation using MSWord.
Cryptocurrency seminar topic presentation using MSWord.Cryptocurrency seminar topic presentation using MSWord.
Cryptocurrency seminar topic presentation using MSWord.
 
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk Factors
 
Bitcoin & Blockchain Overview - What You Need To Know - Sean Walsh
Bitcoin & Blockchain Overview - What You Need To Know - Sean WalshBitcoin & Blockchain Overview - What You Need To Know - Sean Walsh
Bitcoin & Blockchain Overview - What You Need To Know - Sean Walsh
 
@jdrive btc deck 7.0
@jdrive btc deck 7.0@jdrive btc deck 7.0
@jdrive btc deck 7.0
 
Step by step guide on how to buy XRP in Canada
Step by step guide on how to buy XRP in CanadaStep by step guide on how to buy XRP in Canada
Step by step guide on how to buy XRP in Canada
 
Unchain Blockchain by Eva Rez
Unchain Blockchain by Eva RezUnchain Blockchain by Eva Rez
Unchain Blockchain by Eva Rez
 
Unchain Blockchain by Eva Rez
Unchain Blockchain by Eva RezUnchain Blockchain by Eva Rez
Unchain Blockchain by Eva Rez
 
The DAO attack - Ethereum
The DAO attack - EthereumThe DAO attack - Ethereum
The DAO attack - Ethereum
 
Blockchain & Cryptocurrency - Part II (Jose Paul Martin)
Blockchain & Cryptocurrency - Part II (Jose Paul Martin)Blockchain & Cryptocurrency - Part II (Jose Paul Martin)
Blockchain & Cryptocurrency - Part II (Jose Paul Martin)
 
CRYPTOCURRENCY
CRYPTOCURRENCYCRYPTOCURRENCY
CRYPTOCURRENCY
 
RIPPLE DIGI COIN
RIPPLE DIGI COINRIPPLE DIGI COIN
RIPPLE DIGI COIN
 
Rippledidgicoin
RippledidgicoinRippledidgicoin
Rippledidgicoin
 
Point of Sale (POS) Malware: Easy to Spot, Hard to Stop
Point of Sale (POS) Malware: Easy to Spot, Hard to StopPoint of Sale (POS) Malware: Easy to Spot, Hard to Stop
Point of Sale (POS) Malware: Easy to Spot, Hard to Stop
 
Let’s Find Out How To Buy XRP In Canada!
Let’s Find Out How To Buy XRP In Canada!Let’s Find Out How To Buy XRP In Canada!
Let’s Find Out How To Buy XRP In Canada!
 
10 Best Cryptocurrency to Invest in Today
10 Best Cryptocurrency to Invest in Today10 Best Cryptocurrency to Invest in Today
10 Best Cryptocurrency to Invest in Today
 
10 Best Cryptocurrency to Invest in Today
10 Best Cryptocurrency to Invest in Today10 Best Cryptocurrency to Invest in Today
10 Best Cryptocurrency to Invest in Today
 
The BitcoinHeist: Classifications of Ransomware Crime Families
The BitcoinHeist: Classifications of Ransomware Crime FamiliesThe BitcoinHeist: Classifications of Ransomware Crime Families
The BitcoinHeist: Classifications of Ransomware Crime Families
 

More from Priyanka Aash

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 

Fighting Cybercrime Using the Blockchain