Let's continue our analysis. Since the behavior does not conform to that seen in the other cases, let's try to focus on both addresses.
OsintOps
Once we get to the starting transaction as explained in part 1 and part 2 of this analysis, let's see what happened from there on.
If you have no doubts about the first, let's try to find an answer to the second question posed by our hypothetical decision maker: what happens to these bitcoins?
By reconstructing the flow of transactions and communicating the transactions of interest to the involved exchanges and intermediaries, it is possible to obtain further details on the examined actors, making use of judicial police powers unrelated to the Open Source Intelligence activities indicated below.
Sextorsion emails are becoming increasingly popular. Let's see what are the steps to follow to understand how the proceeds were monetized, identifying the exchanges to which the bitcoins were sent.
A while ago we talked to you about Kilos, the search engine for the Dark Web markets, putting it in close relationship with the late Grams. Today, however, Kilos has implemented Krumble, a service that promises to make our bitcoins anonymous. Let's see if it's true!