Chainalysis Crypto Theft Hotline

The blockchain analytics company Chainalysis is starting a 24/7 hotline for cyber attack victims that have lost crypto funds.

The service will accept reports on incidents of hackers demanding crypto currency payments from organisations and companies. The company explains its decision to launch the reporting service  as due to “national security concerns” and issues with confidence in the crypto industry.

In a blog post, Chainalysis said its "Crypto Incident Response" service would operate 24/7 for victims of a “hack, ransomware attack, code exploit or flash loan attack” in which “crypto-currency funds are either demanded or stolen.” 

According to Chainalysis, hackers were responsible for the loss of more than $3 billion in crypto value through theft and ransom demands from 251 attacks in 2021, with transactions to and from illicit addresses representing 0.15% of total transaction volume in the space.

On receiving a report, the firm said a team would work with the victim to trace funds, if necessary, and potentially coordinate with local authorities. 

“Attacks are increasing in frequency and severity, presenting a significant barrier to building trust in crypto-currency, we’re investing in this service not just to assist organisations in their times of need, but also to help bring bad actors to justice and demonstrate that crypto is not the asset class of anonymity and crime,” said Chainalysis.

According to Kim Grauer, Chainalysis’ head of research, ransomware gangs are only getting more sophisticated. The average ransomware payment jumped 34% in 2021 as criminals went after bigger targets, and it shows no sign of slowing down.

Chainalysis has previously worked with authorities in the US government to address high-profile ransomware attacks and cyberattacks threatening the country's infrastructure. 

Chainanalysis:   Coin Telegraph:    Investing:    Binance:  Decrypt:    IQStock:  Tokensight:    Business Insider

You Might Also Read: 

Bitcoin Tanks:
 

« History Of Cyber Crime - Part 3 - Overview
Elon Musk Isn't Buying Twitter »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Zybert Computing

Zybert Computing

Zybert Computing provide server solutions with built-in security and information protection features for the SME market.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

NetMotion Software

NetMotion Software

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

SecureKey Technologies

SecureKey Technologies

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

KeepSolid

KeepSolid

KeepSolid is a Virtual Private Network services provider offering secure encrypted access to the internet.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

Learn How To Become

Learn How To Become

At LearnHowToBecome.org, our mission is to help any job-seeker understand what it takes to build and develop a career. We cover many specialist areas including cybersecurity.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

gener8tor

gener8tor

The gener8tor Cybersecurity Accelerator offers a cutting-edge program in San Antonio, home to the second-largest concentration of cybersecurity experts in the United States.

CertiProf

CertiProf

CertiProf has been enhancing professional lives since 2015, offering a wide range of IT certifications and agile framework training.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

Awareness Software Limited (ASL)

Awareness Software Limited (ASL)

As Hosting Specialists, Awareness Software offer practical and affordable hosting solutions including backup and disaster recovery and a range of cybersecurity services.

Security4Media

Security4Media

Security4Media is a non-profit association set up to reduce risks and support trust in media, in the face of increasing cybersecurity threat levels.

CorePLUS Technologies

CorePLUS Technologies

CorePlus solutions are designed to empower organizations with the tools they need to ensure the utmost protection for their assets, people, and information.