Tokyo Police Arrest Buyers In $530M Cryptocurrency Hack

Two Men Arrested in Japan for Purchasing NEM Cryptocurrency Stolen from Coincheck
What Happened?
On March 11, 2020. Tokyo police arrested two Japanese citizens for alleged possession of NEM cryptocurrency that was stolen from the crypto exchange operator Coincheck in a massive cyberattack in 2018. According to investigative sources, the suspects were aware that the cryptocurrency they acquired was stolen from the exchange.
Who Is Impacted?
Virtual asset service providers, trustees, and OTC traders that buy, sell, or custody cryptocurrencies.
Why This Matters?
Supervisory technology for regulators, financial intelligence units, and law enforcement has become incredibly sophisticated. Firms such as CipherTrace, Elliptic, and Chainalysis allow regulators to follow the money, monitor wallets and entities in real-time, and quickly build a trail of evidence for prosecution. Exchanges and other virtual asset service providers need to respond to requests for information about the cryptocurrency transactions they facilitate.
What’s Next?
Any business that facilitates or promotes cryptocurrency or virtual asset transactions should ensure their anti-money laundering software is capable of identifying high-risk transactions.
Transaction monitoring software such as Alessa or ComplyAdvantage can help firms integrate blockchain data with know your customer (KYC) data, freeze or escalate transactions, and compile suspicious activity reports and regulatory filings.
learn more
Is your AML compliance too expensive, time-consuming, or ineffective?
iComply enables financial services providers to reduce costs, risk, and complexity and improve staff capacity, effectiveness, and customer experience.
Request a demo today.
Taking a Closer Look at Enhanced Due Diligence
Enhanced Due Diligence (EDD) is one of the best ways to protect your business, as well as your customers, against the risks associated with fraudulent activities, money laundering, terrorist funding, and more. As a higher level of verification and identity...
How Does Edge Computing Assist with KYC?
As one of the most formidable technical features available on the market, edge computing gives KYC and AML solutions such as iComplyKYC a huge advantage when it comes to ensuring the privacy and security of customer data during identity verification and compliance...
What is KYC? Breaking Down the Basics of Know Your Customer
Know Your Customer (KYC) protocols have become an essential part of anti-fraud legislation designed to circumvent money laundering, the funding of illicit activities, protect customer data and provide other levels of heightened security. KYC processes are heavily...












