The Dual Nature of Cryptocurrencies

The Impact of Technological Innovations behind Cryptocurrencies on Cybercrime, Part 1

  • Bálint Péter Benke
doi: 10.32567/hm.2025.3.2

Abstract

The dynamic evolution of the digital world has fundamentally transformed the nature of financial transactions, ushering in a new era with the emergence of cryptocurrencies. Decentralized assets such as Monero, Zcash, and Dash enable fast and anonymous transfers, posing significant challenges to traditional regulatory mechanisms. While these technologies offer several benefits, they also entail serious security risks. Their anonymity and lack of oversight make them particularly attractive to criminals for activities such as money laundering, fraud, ransomware attacks, and terrorism financing. Dark web marketplaces further amplify their illicit use by facilitating anonymous access to illegal services, significantly complicating the work of law enforcement agencies. The first part of the study series provides an overview of the topic through the analysis of relevant scientific and professional literature, as well as case studies. The second part builds on empirical research to examine the practical experiences of law enforcement agencies regarding crimes related to cryptocurrencies.

Keywords:

Cybercrime Cryptocurrency Privacy coin Law enforcement Anonymity

How to Cite

Benke, B. P. (2026). The Dual Nature of Cryptocurrencies: The Impact of Technological Innovations behind Cryptocurrencies on Cybercrime, Part 1. Military Engineer, 20(3), 25–48. https://doi.org/10.32567/hm.2025.3.2

References

ALBRECHT, Chad et al. (2019): The Use of Cryptocurrencies in the Money Laundering Process. Journal of Money Laundering Control, 22(2), 210–216. Online: https://doi.org/10.1108/JMLC-12-2017-0074

ALFIERI, Carolyn (2022): Cryptocurrency and National Security. International Journal on Criminology, 9(1), 21–48. Online: https://doi.org/10.18278/ijc.9.1.3

BAUM, Stafford C. (2018): Cryptocurrency Fraud: A Look Into the Frontier of Fraud. Honors College Theses, 2018. november 19. Online: https://digitalcommons.georgiasouthern.edu/honors-theses/375

BEERMAN, Jack et al. (2023): A Review of Colonial Pipeline Ransomware Attack. 2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW), 8–15. Online: https://doi.org/10.1109/CCGridW59191.2023.00017

BERRY, Hala Strohmier (2022): The Evolution of Cryptocurrency and Cyber Attacks. 2022 International Conference on Computer and Applications (ICCA), 1–7. Online: https://doi.org/10.1109/ICCA56443.2022.10039632

Chainalysis (2024): The Chainalysis 2024 Crypto Crime Report. Online: https://go.chainalysis.com/crypto-crime-2024.html

Chainalysis (2025): 2025 Crypto Crime Report. Online: https://go.chainalysis.com/2025-Crypto-Crime-Report.html

CoinMarketCap (2024): Binance Delists Privacy-Focused Cryptocurrencies in Multiple European Countries. Online: https://coinmarketcap.com/academy/article/binance-delists-privacy-focused-cryptocurrencies-in-multiple-european-countries

CUSTERS, Bart – OERLEMANS, Jan-Jaap – POOL, Ronald (2020): Laundering the Profits of Ransomware: Money Laundering Methods for Vouchers and Cryptocurrencies. European Journal of Crime, Criminal Law and Criminal Justice, 28, 121–152. Online: https://doi.org/10.1163/15718174-02802002

European Union (2023): Regulation 2023/1114. Online: https://eur-lex.europa.eu/eli/reg/2023/1114/oj/eng

European Union (2024a): Directive 2024/1640. Online: https://eur-lex.europa.eu/eli/dir/2024/1640/oj/eng

European Union (2024b): Regulation 2024/1624. Online: https://eur-lex.europa.eu/eli/reg/2024/1624/oj/eng

Europol (2015): Darknets - IOCTA 2015. Online: https://www.europol.europa.eu/iocta/2015/darknets.html

FATF (2021): 12 Month Review of the Revised FATF Standards. Virtual Assets and VASPs. Online: https://www.fatf-gafi.org/en/publications/Fatfrecommendations/12-month-review-virtual-assets-vasps.html

Intel 471 (2025): How Cryptomixers Allow Cybercriminals to Clean Their Ransoms. Online: https://intel471.com/blog/cryptomixers-ransomware

KAMPS, Josh – KLEINBERG, Bennett (2018): To the Moon: Defining and Detecting Cryptocurrency Pump-and-Dumps. Crime Science, 7, 18. Online: https://doi.org/10.1186/s40163-018-0093-5

KAVALLIEROS, Dimitrios et al. (2021): Understanding the Dark Web. In AKHGAR, Babak et al. (szerk.): Dark Web Investigation. Security Informatics and Law Enforcement. Cham: Springer, 3–26. Online: https://doi.org/10.1007/978-3-030-55343-2_1

KERR, David S. et al. (2023): Cryptocurrency Risks, Fraud Cases, and Financial Performance. Risks, 11(3), 51. Online: https://doi.org/10.3390/risks11030051

LEVI, Michael (2002): Money Laundering and Its Regulation. The ANNALS of the American Academy of Political and Social Science, 582(1), 181–194. Online: https://doi.org/10.1177/000271620258200113

LI, Yannan et al. (2021): Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Transactions on Dependable and Secure Computing, 18(2), 679–691. Online: https://doi.org/10.1109/TDSC.2019.2910058

MAJUMDER, Amit – ROUTH, Megnath – SINGHA, Dipayan (2019): A Conceptual Study on the Emergence of Cryptocurrency Economy and Its Nexus with Terrorism Financing. In DAS, Ramesh Chandra (szerk.): The Impact of Global Terrorism on Economic and Political Development. Emerald Publishing Limited, 125–138. Online: https://doi.org/10.1108/978-1-78769-919-920191012

MARIANI, Juraj – HOMOLIAK, Ivan (2025): SoK: A Survey of Mixing Techniques and Mixers for Cryptocurrencies. arXiv, 2025. április 28. Online: https://doi.org/10.48550/arXiv.2504.20296

Monero (2024): Moneropedia: Ring Signature. Online: https://www.getMonero.org/resources/Moneropedia/ringsignatures.html

MUKHOPADHYAY, Ujan et al. (2016): A Brief Survey of Cryptocurrency Systems. 2016 14th Annual Conference on Privacy, Security and Trust (PST), 745–752. Online: https://doi.org/10.1109/PST.2016.7906988

NAKAMOTO, Satoshi (2008): Bitcoin: A Peer-to-Peer Electronic Cash System. Online: https://www.researchgate.net/publication/228640975_Bitcoin_A_Peer-to-Peer_Electronic_Cash_System

NOETHER, Shen (2015): Ring Signature Confidential Transactions for Monero. Cryptology ePrint Archive. Online: https://eprint.iacr.org/2015/1098

SCHNEIDER, Friedrich – WINDISCHBAUER, Ursula (2008): Money Laundering: Some Facts. European Journal of Law and Economics, 26(3), 387–404. Online: https://doi.org/10.1007/s10657-008-9070-x

Southern District of New York (2025): Founders of Samourai Wallet Cryptocurrency Mixing Service Plead Guilty. United States Department of Justice, 2025. augusztus 6. Online: https://www.justice.gov/usao-sdny/pr/founders-samourai-wallet-cryptocurrency-mixing-service-plead-guilty

TEKINER, Ege et al. (2021): SoK: Cryptojacking Malware. 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 120–139. Online: https://doi.org/10.1109/EuroSP51992.2021.00019

The Hacker News (2024): Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation. Online: https://thehackernews.com/2024/10/bohemia-and-cannabia-dark-web-markets.html

TRM Labs (2025): 2025 Crypto Crime Report. Online: https://www.trmlabs.com/resources/reports/2025-crypto-crime-report

Unix Autó Kft. (2024): Hírlevél. Online: https://www.unixauto.hu/hirlevel/hackertamadas

ZHANG, Zongyang et al. (2020): A Refined Analysis of Zcash Anonymity. IEEE Access, 8, 31845–31853. Online: https://doi.org/10.1109/ACCESS.2020.2973291