Cryptocurrency Mixer

A service or platform that pools and redistributes digital assets from multiple participants, obscuring direct traceability between the original sending and receiving addresses.

[
Code
AT0090
]
[
Name
Cryptocurrency Mixer
]
[
Version
1.0
]
[
Category
Criminal & Illicit Networks
]
[
Created
2025-01-22
]
[
Modified
2025-04-02
]

Related Techniques

Criminals use mixing protocols or CoinJoin transactions to commingle illicit proceeds with legitimate funds, breaking the direct chain of transactions.

  • By consolidating multiple participants’ coins into pooled transactions, mixers introduce significant obfuscation, hindering investigators' and financial institutions' traceability.
  • This technique disguises beneficial ownership and complicates monitoring systems, impeding the detection of underlying criminal activity.
T0003.001
|
|

Custodial mixer operators manage a single wallet that combines user deposits and redistributes withdrawals to new addresses, breaking the direct link between inputs and outputs. Their centralized custody of funds and minimal (or absent) compliance measures hinder financial institutions and investigators from tracing illicit proceeds, as all transactions appear to originate from the same broad pool rather than from individual users.

  • Darknet actors rely on mixing or tumbling services to obscure blockchain transaction trails, pooling multiple users’ assets and redistributing them in ways that detach the funds from their original addresses.
  • This technique severely hampers conventional analysis methods, hindering financial institutions’ transaction monitoring and investigative efforts.
  • The resulting anonymity makes it difficult to link deposited funds back to criminal activity on Darknet marketplaces.

Mixers are employed to:

  • Blend digital asset transactions from multiple sources, severing direct links between sender and receiver.
  • Impede investigative efforts by making NFT-related fund flows untraceable on public ledgers.
T0070.002
|
|

Criminals route peeled funds through mixers to:

  • Combine small transfers with other users’ deposits, obscuring the source of each portion.
  • Break the transaction chain, making it more difficult for investigators or financial institutions to connect funds back to the original illicit address.

By cycling micro-transactions through mixers, launderers significantly reduce the traceability of the peeled amounts.

Ransomware operators use mixers to:

  • Pool and shuffle incoming ransom funds with other transactions, obscuring ownership and transaction histories.
  • Break the chain of custody by severing direct links between sending and receiving addresses.

This service frustrates due diligence efforts by financial institutions and investigators, making it difficult to attribute illicit funds to the initial ransomware event.

Mixers pool and redistribute digital assets, obscuring their original source or destination. By using mixers, sanctioned parties can further mask cryptocurrency transaction trails, undermining financial institutions' ability to identify and block blacklisted wallets or addresses.