- While creating numerous wallets can help obscure transactions, it also increases the complexity of managing those wallets and ensuring their security. Each wallet would require careful handling to avoid linking them back to the attackers.
Dust attacks involve sending tiny amounts of cryptocurrency to many wallets to confuse tracking efforts. However, they require additional resources and may not always effectively obscure the source of funds, especially with forensic tools used by law enforcement and security researchers.
In some cases, groups might become overconfident in their ability to evade detection, believing that their established tactics and patterns are sufficient to avoid scrutiny.