Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Chinese Money Launderers Drive Global Ecosystem Worth $82bn
News

Chinese Money Launderers Drive Global Ecosystem Worth $82bn

Team-CWDBy Team-CWDJanuary 28, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Chinese money laundering networks (CMLNs) now dominate global activity thanks to illicit cryptocurrency flows, Chainalysis has warned.

The blockchain analytics firm said its analysis revealed Chinese-language money launderers processed 20% of these funds over the past five years. Last year alone, the value of these was estimated at $16bn – approximately $44m per day across 1799+ active wallets.

They’ve helped the global money laundering ecosystem grow from $10bn in 2020 to over $82bn last year.

“This substantial topline growth reflects the growing accessibility and liquidity of cryptocurrencies, as well as a fundamental shift in how this laundering activity occurs and by whom,” Chainalysis said in a report yesterday.

Read more on money laundering: Money Laundering Dominates UK Fraud Cases

CMLNs are increasingly preferred to centralized exchanges, which can freeze suspect funds. Some 10% of the funds stolen in romance baiting (pig butchering) scams is attributed to these networks.

Compared to other laundering endpoints, money laundering inflows to CMLNs grew 7325 times faster than those to centralized exchanges, the report claimed. They also grew 1810 times faster than those to decentralized finance (DeFi) and 2190 times faster than “intra-illicit on-chain flows.”

Uncovering Six Service Types

Chainalysis investigated 1799 active on-chain wallets linked to CMLNs in 2025. It claimed they fell into one of six service types, with some ramping up activity to launder $1bn+ just 236 days after launching.

They market themselves via platforms like Huione Guarantee and Xinbi, which also provide handy escrow infrastructure.

“As with legitimate e-commerce platforms, service ratings and reviews create accountability within the illicit ecosystem, and vendors often cultivate their market reputation through public attestations of their reliability and service quality,” said Chainalysis.

The six CMLN typologies are:

  • Running point brokers, which serve as entry channels for illicit fund transfers. Individuals are recruited through ads to “rent out” their bank accounts, digital wallets or deposit addresses at mainstream exchanges
  • Money mule motorcades, which orchestrate the layering phase by forming networks of accounts and wallets to hide the origin of funds. Transactions often switch between fiat and crypto. They could include: ATM cash withdrawals converted to crypto; digital wallet transfers through third-party payment platforms; and credit cards and gift cards exchanged for crypto
  • Over-the-counter (OTC) and P2P services, which process fund transfers without know your customer (KYC) checks. They are advertised as “clean funds” or “White U” and charge exchange rates that exceed market rates
  • Black U services, whereby buyers purchase illicitly sourced funds knowingly at 10-20% below standard exchange rates
  • Gambling services such as casinos and online betting platforms which offer an effective way to “place, layer, and integrate proceeds” into the regular financial system. Most accept crypto and do not require KYC details
  • Money movement services: specialist vendors offer “swapping-as-a-service” to enable clients to convert crypto into multiple assets



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNorth Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews
Next Article Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex
Team-CWD
  • Website

Related Posts

News

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
News

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
News

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

How it preys on personal data – and how to stay safe

October 23, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.