**1. Introduction**

In the area of influence of computer science, the terms undergo rapid mutations, both in sense and interpretability. Even if some have ephemeral appearances, those supported by well-defined reasons are assimilated and reclassified or regrouped, their similarities widening the spectrum of understanding the phenomenon.

According to a study by Data Bridge Market Research based on data from 2015 to date, without considering an a priori order, the top 10 cloud technologies that dynamically divide most of their market shares refer to Hybrid Cloud, Cloud Storage, Cloud Migration Services, Cloud Orchestration, Platform-As-A-Service, Disaster Recovery-As-A-Service, Multi-Cloud Management, Video-As-A-Service, Cloud Analytics, and Wi-Fi-As-A-Service. We do not estimate that the debate regarding the benefits and vulnerabilities introduced by modern storage and processing facilities, compared to traditional structures, will stop at any time soon. Perhaps a mixed architecture is a valid compromise until a new viable alternative emerges. Until then, we can only monitor adoption and note that financial organizations are more focused on saving and processing information in the cloud (96%), according to cybersecurity expert Ryan Brooks. In some instances (34%), there was a declarative improvement in the IT infrastructure security, while for others it worsened (22%) or reported no change (31%). Overall, 88% agreed to transfer sensitive data to the cloud, while 47% advocated a cloud-first approach.

These references can be correlated with those reported by Dan Williams, senior cybersecurity systems engineer, regarding ransomware. His 2017 statistics indicated a total of 9.2 billion global

attacks, a 101% increase in the number of developed variants; only 42% of companies managed to restore their databases using backups, and Petya was the most common malicious product during an email campaign.

We estimate that the connection between cloud, cyber-crime, and cryptocurrency is getting stronger, and the distributed consequences are directly proportional to the evolution graph of each one. Analog and inductive research methods are very well suited to the subject, and we believe that the reason–e ffect ratio and adjustable inflection points can be expressed with su fficient clarity by changing the parameters.

Cryptocurrencies feature both benefits and disadvantages. The subtle way in which they appear is the main reason why they have made changes in the financial market. This is where the most significant threats come from, specifically cybercriminal activities that are becoming easier to carry out. Additionally, blockchain technology can produce changes in various fields of activity, as long as there is no superior technology to challenge it. For this reason, careful study of cryptocurrency issues is an essential step in both economics and research.

The purpose of this research is to explain what cryptocurrency is, how important it is, how it has evolved, what its use brings to the economy, and what influence cryptocurrency has on cybercrime. This paper focuses more on the arguments, connections, implications, risks, algorithms, regulation, and standardization, and less on the technical aspects of blockchain, block of blocks, or multichain.

Deliberations on the advantages and disadvantages in this direction have been made and will probably continue to be the subject of other specialized studies for a long time. We can say that an optimum is identified if it responds positively to the evaluation criteria.
