Wasabi Wallet White Paper
How Cognyte can help you get your
investigation back on track
Due to its wide usage among criminals, the detection of the Wasabi Wallet and the identification of its illicit
users are highly prioritized by law enforcement and other government agencies. While the use of Wasabi
is not illegal in most jurisdictions, identifying suspects who use it can be a valuable tool in confirming a
suspicion of money laundering via Bitcoin, especially in conjunction with additional evidence pointing to
illegal activity.
It is easy to visually identify Wasabi Wallet transactions on the blockchain using traditional tracing tools
and blockchain analytics methodologies. But while these tools and methodologies can identify most of the
crypto addresses involved, they cannot de-mix the transactions and attribute the inputs and outputs or
reveal the real identity of illicit transaction makers.
Cognyte’s blockchain analytics platform is a revolutionary cryptocurrency de-anonymization solution. This
groundbreaking, patent pending technology helps investigative organizations clarify crypto investigations and
gain valuable new insights into complex cases.
Cognyte’s blockchain analytics advanced algorithm inspects Wasabi wallets’ distinctive patterns, providing a
unique solution to de-anonymize Wasabi users.
Cognyte’s solution delivers crypto-centric analytics and intelligence, derived from leveraging siloed data
sources and analytics techniques, such as blockchain analytics and open-source analytics, to track
blockchain transactions and tag services and malicious addresses. The solution harnesses additional
sources and techniques to enhance financial investigations with zero dependency on collaborative
exchanges. Cognyte’s blockchain analytics and advanced algorithms do more than detect criminal activity
on the blockchain and identify the use of Wasabi for this criminal activity, they also de-anonymize illicit
Wasabi transaction makers. Moreover, our solution enables financial investigators to accelerate crypto
investigations by:
Revealing both historical and ongoing transactions performed by suspects.
Uncovering connections between known suspects and other entities to
pinpoint new areas for investigation.
To find out how you can fight crypto-enabled crime and terror,
we invite you to schedule a demo
Identifying crypto activity performed by suspects across hundreds of
cryptocurrency services on diverse platforms, wallets and coins.
12