The rise of Ransomware-as-a-Service (RaaS) has further escalated cyber extortion, allowing criminals to execute attacks without technical expertise. Cryptocurrencies, especially Bitcoin and Monero, are commonly used for ransom payments due to their pseudonymity and global reach. While Bitcoin’s transparent ledger aids forensic investigations, Monero’s privacy features make tracing transactions difficult. In response, governments are enhancing blockchain surveillance and enforcing stricter regulations to combat crypto-enabled cybercrime. Cryptocurrency provides both financial innovation and potential for criminal use, posing problems to regulators and law enforcement.

The Rise Of Crypto Fraud
- Besides Hydra operators, other DNM administrators faced criminal prosecution in 2024.
- Furthermore, we analyse the seller-to-seller (S2S) network, i.e., the network composed only of transactions among sellers, which can be regarded as a supply chain network of illicit goods and services.
- As cryptocurrency has gained greater acceptance, illicit on-chain activity, too, has become more varied.
- The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) specifically cited the market’s role in the fentanyl trade as a reason for the bust.
- Additionally, transactions are made with cryptocurrencies, mostly Bitcoin, which also provide anonymity to the transaction parties6,36.
For example, threat actors may employ AI tools to gather information about individuals from social media and other online sources, crafting highly targeted attacks that are harder to detect. According to the FBI’s Internet Crime Complaint Center (IC3), losses from social engineering scams reached over $2.4 billion in 2022, and this figure is expected to rise as attackers refine their methods. While this week’s takedown recalls the 2013 shutdown of Silk Road, the evolution of darknet commerce is stark. Silk Road popularized the use of Bitcoin, anonymizing technologies like Tor, and vendor reputation systems. The U2U network is formed by the entire set of interacting users (black and gray arrows with their respective users). Using the evolving activity-driven model31, U2U pairs are divided in either stable (black arrows and respective users) or non-stable (gray arrows and respective users).
Network Structure Of Transactions
It is believed that Abacus’s operators likely chose to exit with user funds, possibly to avoid Archetyp’s fate. TRM Labs noted that darknet users tend to migrate to the next “reputable” option when a marketplace falls. Although the site’s administrator, Vito, attributed the problems to DDoS attacks and a spike in traffic, TRM Labs observed that this pattern closely resembles known exit scams. These marketplaces generally fall into two major ecosystems, Russian and Western. The indictment alleges that Parsarad founded Nemesis in March 2021, and that the marketplace grew to serve more than 150,000 users and register around 1,100 vendor accounts worldwide. As the first media outlet to report on blockchain-powered applications, we provide early adopters, developers, and visionary leaders with access to emerging technological landscapes, including wallets and games.
Ransomware attacks have surged in recent years, and the RaaS model is becoming increasingly popular on the darknet. This model allows even low-skilled cybercriminals to launch ransomware attacks by purchasing or renting malware from experienced developers. A report from the Cybersecurity and Infrastructure Security Agency (CISA) indicates that ransomware attacks have increased by 150% since 2020.
Cryptocurrency Wallets For Safe Transactions

Moreover, the number of multibuyers increases, which suggests a fast response from buyers to external shocks by trying to diversify their sources. With the advent of several markets at the beginning of 2014, the number of multisellers rapidly grows, representing more than 20% of all sellers until the beginning of 2016 (see Supplementary Information Section S3). During 2016 and 2017, AphaBay becomes the dominant market (see Fig. 3), polarizing sellers around its own ecosystem, such that the fraction of multisellers decreases to 10% of all sellers until its closure. Then, after operation Bayonet, the number of sellers in all categories and multisellers significantly drops, as shown in Fig.
- Importantly, these newly formed stable pairs persist over time and transact for several months even after the closure of the DWM that spurred their formation.
- “As international authorities have disrupted DNMs large and small in the last few years, cybercriminals and drug dealers have learned firsthand the consequences of running BTC-accepting DNMs, given the currency’s inherent transparency.
- Nemesis operated primarily on Tor, offering a menu of contraband that extended from counterfeit documents and hacking tools to narcotics in their most dangerous forms.
- In each network, links are directed and the arrows point at the receiver of Bitcoin.
By controlling your own keys, you significantly reduce the risk of losing access to your money if a market exit scams, gets seized, or simply goes offline. Cryptocurrencies offer financial innovation and decentralization but also pose risks related to money laundering, fraud, and cybercrime. The pseudonymous nature and evolving tactics of criminals make regulatory oversight challenging. Strengthening Anti-Money Laundering (AML) and Know Your Customer (KYC) measures, along with advanced blockchain analytics and AI-driven monitoring, can help mitigate illicit activities while preserving the benefits of digital finance. Darknet markets are an important part of the underground criminal economy and facilitate the trade of illicit goods and services ranging from narcotics to hacking tools.

Data And Methods
The seizure of the Hydra servers and cryptocurrency wallets containing $25 million worth of bitcoin was made this morning in Germany by the German Federal Criminal Police (the Bundeskriminalamt), in coordination with U.S. law enforcement. Artificial intelligence (AI) is set to play an increasingly prominent role in cybercrime. Criminals are leveraging AI technologies to automate attacks, analyze vast amounts of data, and create more sophisticated phishing schemes. According to a 2023 report from the cybersecurity firm Cybersecurity Ventures, cybercrime costs are projected to reach $10.5 trillion annually by 2025, with AI-driven attacks contributing significantly to this figure.
We do not engage with darknet markets; our mission is exclusively dedicated to providing information for research and educational purposes. As the darknet continues to grow, its markets are expected to adopt even more sophisticated tools for secure trading, further enhancing the user experience and solidifying their role in modern commerce. Forums and magazines play a crucial role in keeping users informed about new market links and updates. Platforms like Dread and Darknet Live provide real-time discussions, vendor reviews, and security tips, ensuring users can navigate the darknet safely and efficiently. One of the most notable markets is PhantomX, which has gained popularity for its robust escrow system and multi-signature wallet integration. This ensures that funds are only released once both parties confirm the transaction, significantly reducing the risk of fraud.
The width of the edges is proportional to the number of multihomers acting between the markets. Throughout the whole period of observation, the dominant category of buyers is market-U2U buyers followed by market-only buyers, representing on average 52% and 42% of all buyers, respectively. The U2U-only category is comparatively small, representing only 6% of all buyers on average. The number of market-U2U and market-only buyers also drops as a consequence of operation Bayonet. However, compared to sellers, the drop is notably smaller, and the number of buyers rapidly recovers to previous values.

Pharmaceuticals And Digital Goods Thrive On Darknet Platforms

Criminals now purchase ready-to-use malware kits, phishing templates, and ransomware programs. These tools come with user manuals and customer support, enabling even non-technical actors to conduct complex cyberattacks. Litecoin, Zcash, and Dash also see usage, though Monero and Bitcoin dominate the dark web. Some marketplaces have even mandated Monero-only transactions, underscoring a strong preference for privacy-focused coins over traceable ones. Fill out the form to speak with our team about investigative professional services. Sixth, we consider the cumulative mean interevent time for each entity i at time t, defined as the mean of the sequence of time interval between consecutive transactions of an entity until time t, which we denote by \(\phi _i(t)\).
This transparency fosters a reliable trading environment, encouraging repeat transactions and long-term relationships between buyers and sellers. With law enforcement agencies improving their ability to track Bitcoin (BTC) transactions, darknet market operators and vendors are moving to Monero (XMR) as their cryptocurrency of choice. STYX Market, for example, concentrates on financial crimes, offering access to hacked bank accounts, forged documents, and money laundering services. Other platforms concentrate solely on narcotics, counterfeit items, or stolen digital identities. This specialization allows vendors to cater to targeted buyers and refine their offerings.
The Future Of Cryptocurrency And Crime

Exit scams involve the anonymous operator of a market simply disappearing – taking customers’ money, in the form of cryptocurrency, with them. For example, in late 2013 the operators of Sheep Marketplace are alleged to have disappeared with nearly 40,000 bitcoins – now worth around $1.7 billion – belonging to their customers. Moreover, advancements in forensic technologies will enhance law enforcement’s ability to trace illicit activities, even within decentralized environments. This ongoing battle between criminals and law enforcement will shape the future of darknet activities. Designed to resemble a legitimate e-commerce platform, Incognito offered a slick user experience with branding, advertising, and customer support.
As the Internet of Things (IoT) continues to expand, so do the opportunities for cybercriminals. The increasing number of connected devices creates a larger attack surface, and many IoT devices are inadequately secured. According to a report by the International Telecommunication Union (ITU), IoT vulnerabilities are expected to triple by 2025. In total, Abacus Market generated nearly USD 100 million in Bitcoin-enabled sales.
Seller-to-seller Network
Cryptocurrency-enabled drug sales also grew by over 19% from 2023 to 2024, reaching nearly USD 2.4 billion in volume. During the same period, the number of newly launched darknet marketplaces declined 42% year over year — indicating that while the ecosystem is consolidating, remaining actors may be becoming more operationally advanced. In early July, 2025, Abacus Market, the largest Bitcoin-enabled Western darknet marketplace (DNM), went offline, rendering all internet-facing infrastructure, including its clearnet mirror, inaccessible.
Fraud and scam operators are also leveraging guarantee services such as Huione (discussed below), while crypto ATM scams are a growing concern, especially as they relate to elder fraud. It stands to reason that 2024’s illicit cryptocurrency volume will exceed that of 2023. Since 2020, our annual estimates of illicit activity — which include both evidentiary attributions and Chainalysis Signals data — have grown by an average of 25% between annual reporting periods. Assuming a similar growth rate between now and next year’s Crypto Crime Report, our annual totals for 2024 could surpass the $51 billion threshold. Following Europol’s takedown of Archetyp Market (one of the most established darknet platforms) on the 16th of June, users migrated to Abacus, making it the largest Bitcoin-enabled darknet market in the West by volume.
By aggregating verified links and providing up-to-date information, these lists reduce the time users spend searching for reliable markets. They also include user reviews and ratings, helping newcomers identify trustworthy vendors and avoid scams. Another key player is NebulaTrade, which focuses on user anonymity through advanced Tor routing and zero-knowledge proofs. This market has also introduced AI-driven vendor verification systems, ensuring that only reputable sellers are allowed to operate.