55 lines
2.5 KiB
JSON
55 lines
2.5 KiB
JSON
{
|
||
"namespace": "cryptocurrency-threat",
|
||
"description": "Threats targetting cryptocurrency, based on CipherTrace report.",
|
||
"version": 1,
|
||
"predicates": [
|
||
{
|
||
"value": "SIM Swapping",
|
||
"expanded": "An identity theft technique that takes over a victim's mobile device to steal credentials and break into wallets or exchange accounts to steal cryptocurrency."
|
||
},
|
||
{
|
||
"value": "Crypto Dusting",
|
||
"expanded": "A new form of blockchain spam that erodes the recipient's reputation by sending cryptocurrency from known money mixers."
|
||
},
|
||
{
|
||
"value": "Sanction Evasion",
|
||
"expanded": "Nation states using cryptocurrencies has been promoted by the Iranian and Venezuelan governments."
|
||
},
|
||
{
|
||
"value": "Next-Generation Crypto Mixers",
|
||
"expanded": "Money laundering services that promise to exchange tainted tokens for freshly mined crypto, but in reality, cleanse cryptocurrency through exchanges."
|
||
},
|
||
{
|
||
"value": "Shadow Money Service Businesses",
|
||
"expanded": "Unlicensed Money Service Businesses (MSBs) banking cryptocurrency without the knowledge of host financial institutions, and thus exposing banks to unknown risk."
|
||
},
|
||
{
|
||
"value": "Datacenter-Scale Crypto Jacking: ",
|
||
"expanded": "Takeover attacks that mine for cryptocurrency at a massive scale have been discovered in datacenters, including AWS."
|
||
},
|
||
{
|
||
"value": "Lightning Network Transactions",
|
||
"expanded": "Enable anonymous bitcoin transactions by going \"off-chain,\" and cannow scale to $2,150,000."
|
||
},
|
||
{
|
||
"value": "Decentralized Stable Coins",
|
||
"expanded": "Stabilized tokens that can be designed for use as private coins."
|
||
},
|
||
{
|
||
"value": "Email Extortion and Bomb Threats",
|
||
"expanded": "Cyber-extortionists stepped up mass-customized phishing emails campaigns using old passwords and spouse names in 2018. Bomb threat extortion scams demanding bitcoin spiked in December."
|
||
},
|
||
{
|
||
"value": "Crypto Robbing Ransomware",
|
||
"expanded": "Cyber-extortionists began distributing new malware that empties cryptocurrency wallets and steals private keys while holding user data hostage."
|
||
},
|
||
{
|
||
"value": "Rag Pull",
|
||
"expanded": "Crypto scam that occurs when a team pumps their project’s token before disappearing with the funds, leaving their investors with a valueless asset."
|
||
}
|
||
],
|
||
"refs": [
|
||
"https://ciphertrace.com/wp-content/uploads/2019/01/crypto_aml_report_2018q4.pdf"
|
||
]
|
||
}
|