Wednesday, 29 Apr 2026 • 14:00–15:00
Alexander Wilczek
Tracing Cybercriminal Financial Operations
An investigation into cybercriminal financial operations, following the money to examine how threat actors generate, transfer, and launder illicit proceeds, including the operational security and threat modelling required to safely perform this research and which OSINT and blockchain tools and techniques to use. This workshop covers the full chain, from how cyber criminals steal or extort money to how they get to spend it. Participants will start with OpSec, learning how to set up operations to conduct this kind of research, the threat modelling involved and what options are available, from air-gapped laptops and Tails to Qubes OS and Vms. Since the majority of cybercrime transactions happen in crypto, we'll do a deep dive, from the basics of KYC, CEX, DEX and bridges and how they are used by criminals, then exploring in detail how chains like Monero are being leveraged and how smart contracts like Tornado Cash are used to successfully launder money. Participants will learn which techniques and tools to use to track transactions on and off chain, with a mix of OSINT, Tor and block explorer tools. We'll look at the masters of the game, the Lazarus Group, which managed to launder hundreds of millions, as well as how InfoStealers and ransomware groups go from demanding a ransom to laundering it.