Bitcoin Under Siege: Crime Records and Quantum Fears Explained

Crypto-related crime hit an unprecedented $154 billion in 2025, driven overwhelmingly by state-sponsored sanctions evasion — while quantum computing fears, though real, remain far more manageable than headlines suggest.
Bitcoin's Twin Threat Narrative: Separating Panic from Reality
Two narratives are dominating Bitcoin discourse in 2025: the explosion of crypto-enabled crime to record levels, and the looming spectre of quantum computers dismantling the network's cryptographic foundations. Taken together, they paint an alarming picture. Examined carefully, however, they tell a more nuanced story — one about geopolitical realignment, technological evolution, and Bitcoin's remarkable resilience. For investors and users alike, understanding the distinction between genuine risk and amplified fear has rarely been more important.
The numbers are striking enough to demand serious attention. But the question is not simply how large the threat is — it is what kind of threat it actually represents, and what the Bitcoin ecosystem is doing about it.
The Facts
According to a new report by blockchain analytics firm Chainalysis, criminal wallet addresses received a staggering $154 billion in 2025 — an all-time record representing a 162 percent increase compared to the previous year [1]. At first glance, the figure sounds catastrophic. Context matters enormously, however: analysts at Chainalysis were quick to note that illicit transactions still account for less than one percent of total global crypto volume [1].
What has changed is the composition of that criminal activity. Earlier cycles of crypto crime were dominated by hacks, scams, and ransomware. The 2025 data reveals a structural shift: the overwhelming driver is now sanctions evasion and state-backed networks [1]. Sanctioned actors alone moved approximately $104 billion through cryptocurrency channels, with related transaction volumes surging 694 percent year-over-year — the single largest category of illicit crypto activity recorded [1]. Russia's ruble-backed stablecoin A7A5, launched in 2025, processed over $93 billion in transactions within its first year of operation, functioning as an alternative settlement rail beyond the reach of Western financial infrastructure [1]. Iran's Revolutionary Guards, meanwhile, are reported to have channelled more than $3 billion through crypto addresses for goods transfers, oil deals, and support for regional militias [1]. North Korea's state hacking apparatus added a further $2 billion-plus to the tally [1].
Perhaps most revealing is the asset of choice: stablecoins now account for 84 percent of all illicit crypto transactions, with Bitcoin and more volatile assets losing significant ground [1]. The logic is straightforward — stablecoins offer fast cross-border settlement, a stable peg to fiat currencies, and relatively frictionless movement across chains and service providers, making them ideal instruments for actors cut off from the conventional financial system [1]. The European Union responded in February with a sweeping sanctions package, prohibiting all crypto dealings with Russia outright [1].
On the quantum computing front, Christopher Bendiksen, Head of Bitcoin Research at CoinShares, offers a measured rebuttal to doomsday scenarios. Asked directly whether quantum computers could destroy Bitcoin, his answer was unambiguous: no [2]. The theoretical risk exists — a sufficiently powerful quantum computer could potentially derive a private key from a known public key, enabling theft — but the architecture of most Bitcoin addresses significantly limits actual exposure [2]. The majority of Bitcoin holdings sit behind hash addresses where the public key is not visible until a transaction is broadcast; from that moment, the network has roughly ten minutes on average before confirmation, an extraordinarily tight window for any attacker to exploit [2]. The most vulnerable addresses are older Pay-to-Public-Key types where the public key is permanently visible on-chain — but even targeting these would be a slow, address-by-address process rather than a sudden systemic collapse [2]. Bendiksen's preferred solution is a soft fork introducing a new quantum-resistant address type, allowing users to migrate voluntarily — preserving property rights rather than imposing top-down confiscation of potentially exposed coins [2].
Analysis & Context
The crypto crime data demands a reframing. This is not primarily a story about Bitcoin being a haven for hackers or fraudsters — it is a story about geopolitics and the weaponisation of financial infrastructure. Russia, Iran, and North Korea have been progressively locked out of SWIFT and dollar-denominated systems over the past decade. Their pivot to stablecoins is less a commentary on crypto's illicit utility and more a commentary on the inadequacy of existing sanctions enforcement mechanisms. The irony is profound: stablecoins, predominantly dollar-pegged assets like USDT and USDC, are being used to circumvent dollar-based sanctions. Regulators in Washington and Brussels are slowly waking up to this paradox, but enforcement remains years behind the technology. For Bitcoin specifically, the data is almost vindicating — the network's transparency and traceability appear to be making it less attractive for state-level bad actors, not more.
The quantum computing debate follows a familiar pattern in Bitcoin's history: an external technological development is identified as an existential threat, headlines amplify worst-case scenarios, and the underlying reality turns out to be considerably more manageable. Bitcoin has navigated analogous cycles before — from claims that governments would simply ban it into irrelevance, to fears that mining centralisation would fatally compromise its security model. In each case, the network adapted. Bendiksen's point that a quantum breakthrough would simultaneously threaten the entire internet's cryptographic infrastructure — not just Bitcoin — is critical and consistently overlooked in crypto-specific coverage [2]. If and when practical quantum computers capable of breaking elliptic curve cryptography emerge, they will represent a civilisational-level problem, prompting a global cryptographic overhaul of which Bitcoin's soft fork would be one relatively small component. The development community's awareness of the issue, combined with the gradual and detectable nature of quantum computing progress, means Bitcoin is far more likely to adapt proactively than to be blindsided.
For investors, neither development should trigger panic — but both warrant vigilance. The sanctions evasion trend will invite heavier regulatory scrutiny of the broader crypto ecosystem, and stablecoin issuers in particular face increasing political pressure. Bitcoin's comparative transparency may paradoxically strengthen its regulatory standing relative to opaque alternatives.
Key Takeaways
- The $154 billion crypto crime record is real, but 67 percent of it stems from state-sponsored sanctions evasion — this is a geopolitical story, not a referendum on Bitcoin's trustworthiness [1]
- Stablecoins have become the dominant tool for illicit finance, representing 84 percent of criminal crypto transactions, raising serious questions for regulators about dollar-pegged asset oversight [1]
- Quantum computing poses a theoretical but not imminent risk to Bitcoin; most holdings are protected by hash addresses, and any attack would be gradual and detectable rather than sudden [2]
- Burning vulnerable coins as a protective measure has been explicitly rejected by leading researchers as a violation of property rights and a dangerous precedent — voluntary migration via soft fork is the preferred path [2]
- Both threats — rising illicit volumes and quantum risk — are already on the radar of regulators and Bitcoin developers respectively; neither represents the existential crisis that sensationalist coverage implies
Sources
- [1]btc-echo.de
- [2]btc-echo.de
AI-Assisted Content
This article was created with AI assistance. All facts are sourced from verified news outlets.