Back to all postsUncover how trading algorithms and crypto liquidity solutions impact laundering activities, focusing on the notorious Lazarus Group and OTC trader Yicong Wang.
October 24, 2024

Crypto Laundering Exposed: Trading Algorithms and Liquidity Solutions at Play

Cryptocurrency is a double-edged sword. On one side, it offers groundbreaking advancements in finance; on the other, it provides a playground for illicit activities. As digital currencies gain traction, so do the methods employed to obscure their origins. This article sheds light on the complex world of crypto laundering, spotlighting the infamous Lazarus Group and their key player, Yicong Wang. We'll explore how trading algorithms and liquidity solutions are utilized in this hidden realm and examine the efforts underway to thwart such operations.

Understanding Crypto Laundering

The allure of cryptocurrency lies in its promise of privacy, security, and decentralization. Yet these very features make it an attractive option for those looking to engage in illegal activities like money laundering. The process involves sanitizing illegally acquired digital assets to make them appear legitimate—a task that poses immense challenges for regulators and law enforcement agencies globally.

The Story of Yicong Wang and Lazarus Group

Enter Yicong Wang, a Chinese OTC trader allegedly working with North Korea's notorious hacking faction, the Lazarus Group. Since 2022, he has been instrumental in converting tens of millions in stolen crypto into cash via bank transfers.

On-chain investigator ZachXBT brought Wang's operations to light after a victim contacted him about their frozen account post a P2P transaction with Wang. Armed with information from a WeChat conversation—including a TRON wallet address—Zach dug deeper.

The Mechanism of Laundering

Zach's investigation revealed that Wang was central to laundering funds from various hacks linked to Lazarus Group, including those targeting Alex Labs and EasyFi. One particular address controlled by him consolidated $17 million from these incidents; even after Tether blacklisted $374K USDT linked to this address in November 2023, Wang swiftly moved remaining funds into Tornado Cash.

Between November and December 2023 alone, he executed 13 transactions withdrawing 100 ETH each—subsequently bridging $45K into TRON where they landed into his wallets.

More Stolen Funds Flowing Through

In May 2024, another hack—this time on Alex Labs—resulted in losses amounting to $4.5 million. Almost immediately post-hack, one of the compromised addresses deposited 470 ETH into a privacy protocol; within hours, that same amount was withdrawn and sent off to new addresses—all leading back to Wang.

By August 13th of that year, he had laundered an additional $1.5 million USDT from another Lazarus hack using similar routes as before—even utilizing an Ethereum address subsequently blacklisted by Tether containing 948K USDT.

Despite facing bans from platforms like Paxful under aliases such as Greatdtrader or Seawang, Wang continued his operations unabated—making offsite transactions while assisting Lazarus Group in obscuring their tracks.

How Trading Algorithms Aid Detection

While crypto laundering may seem elusive at first glance—especially given its decentralized nature—advanced trading algorithms are pivotal in identifying such activities. These systems analyze transaction patterns across networks like Bitcoin or Ethereum pinpointing suspicious behaviors effectively.

Graph-Based Detection Methods

One innovative approach employs GTN2vec—a graph embedding algorithm specifically designed for detecting money laundering on Ethereum by incorporating gas prices & timestamps into its framework achieving remarkable accuracy rates upwards of 95%.

AI Models at Work

Another model developed collaboratively by Elliptic MIT & IBM focuses not just on individual illicit wallets but chains connecting them utilizing collections transactions known ones actors exploiting them successfully identified many including those associated frauds!

Subgraph Contrastive Learning Techniques

Bit-CHetG—a subgraph-based contrastive learning method detects groups engaging together employing predefined metapaths extracting topological representations enhancing detection capabilities!

Machine Learning Approaches

Various machine learning techniques have proven effective too! A study highlighted Deep Neural Networks Random Forest classifiers outperform traditional methods achieving high accuracies detecting suspicious transactions!

Real-Time Monitoring Systems

A comprehensive system leveraging real-time monitoring along with on-chain analysis identifies fraudulent addresses across Bitcoin & Ethereum utilizing decentralized transparent nature blockchain data flagging anomalies indicative crypto laundering activities!

The Role (and Limitations) Of Crypto Liquidity Solutions

While essential facilitating smooth trading operations current implementations fall short preventing money laundering activities due their inherent characteristics!

Decentralized Structures

Many liquidity pools operate without centralized intermediaries complicating enforcement measures traditional anti-money laundering (AML) protocols rely upon making harder implement effective KYC regulations!

Anonymity Issues

Decentralized exchanges often provide anonymity trades occur directly between participants obscuring origins destinations funds involved thereby facilitating illicit actions such as layering through multiple DEXs mixers like Tornado Cash!

Lack Of Oversight

Unlike traditional financial institutions which subject stricter regulatory requirements many crypto platforms lack adequate monitoring mechanisms leaving compliance largely dependent upon users themselves proving ineffective prevention means!

Summary: A Call For Enhanced Measures Against Crypto Laundering

As illustrated by case study surrounding Yicong Wang & his affiliations with Lazarus group complexities combating remain formidable however transparency offered blockchain technology could serve double-edged sword if utilized properly! Enhanced regulatory frameworks combined advanced detection methodologies may pave way towards mitigating risks posed emerging technologies!

Keep reading

Back to all posts