Latest on ATNET:

#yield #defi
#crypto-fundamentals #masternodes
Web3  · 05/17/22

Shocking Facts About Cryptocurrency Heists [Infographics]

04/08/22 · Reports
Altcoin Trading Blog

Note: This report was written in 2019 and remains published for reference purposes.


Glossary entries for this post
cryptocurrency-wallet
crypto-opsec
blockchain-technology
blockchain-technology
Browse The Most Searched-For Topics
hub
dca
 

If there is one question in the history of Bitcoin that cannot be answered with anything more than an estimate, it is the problem of how much of Bitcoin’s supply is actually ever available on the market. How much is locked up in wallets with lost keys, and how much is set to cool off for a few years because it was stolen?

As for the stolen crypto, the estimates are somewhat easier to make than for the cryptocoins that are “burned” and never to be moved again. According to Jameson Lopp, over 35% of Bitcoin’s supply has changed its owner in a heist - an estimate that draws from data on known cryptocurrency thefts and hacks.

With some alternative cryptocurrencies that are focused on anonymity more than the pseudonymous Bitcoin, the statistics get even more mind-blowing. According to one study, over 4% of Monero’s total supply is currently held by cybercriminals and hackers. At the price level on the day of publishing, that corresponds to over 37 million USD.

It’s no wonder that through 2018, cryptojacking became the most popular way to monetize cyber exploits. Cryptojacking, or illicit crypto mining, is done particularly easily for Monero and similar cryptocurrencies that have mining optimized for some form of ASIC-resistance. The original aim of that was to allow for wider community participation in mining by making it less profitable to use special single-purpose integrated circuits rather than your everyday ordinary laptop or phone.

The unintended but now prevailing effect is that cybercriminals can easily monetize access to any kind of infrastructure that has some spare disk space and memory - that’s practically any laptop or phone, but the juiciest plunder are the corporate ones as these usually have more available resources.

With cryptojacking, the owners or maintainers of the infected device typically have no idea there is a miner operating, and more sophisticated cryptojacking campaigns have developed various optimizations to stay under foot for as long as possible.

There are new ways of how malwares spread developed every day and the baseline of the cheap commodity malware you can buy for a couple of bucks is becoming more advanced every day.

It is safe to say that the malware industry has fully integrated the use of cryptocurrencies and is currently the most thriving cryptocurrency application.

Latest Airdrops & Bounties (Updates Mo + Thu nights)

airdrop BicycleFi Airdrop - A Telegram bot that wants you to follow a few things. Rew...
airdrop Slingshot Finance NFT airdrop - Slingshot finance is a new Web3 platform that airdrops NF...
airdrop AREA Metaverse airdrop (100k pool) - AREA tokens from a pool of 100k worth are airdropped to 2...
airdrop DYOR token airdrop - Follow and retweet for a chance to win some DYOR tokens.
bounty X Meta Fans Bounty (BSC BEP20) - Long running marketing bounty with 75k USD pool. Facebook...
bounty WhisperMSG Escrowed Bounty - 50k USD pool in $VOLR with escrow. Shilling on YouTube, T...
bounty UnitedCrowd (BSC) Bounty - 50k USD pool of tokens mostly for Bitcointalk (Twitter ge...
exchange promo Bitforex (all get paid) win 1 BTC by trading 10 USD of BTC - 🍕 22 May - 29 May
exchange promo Phemex Deposit Dazzle (up to 4500 USD, everyone gets paid) - until 1 Jun
exchange promo Kine DEX fee exclusive fee discount on ETH, SHIB and more - code 0B4D73C1
exchange promo Independent Reserve lists SOL - 17 May
exchange promo LocalCryptos Win 250 USD Amazon gift card - live