**6. Conclusions**

To conclude our study, we highlight that the storage and processing of information spaces are at the forefront of the attackers' preferences, and there are gaps in regulations, similar to those in the cryptostream area. There are very few companies covering the risk of data corruption or compromising privacy, just as there are very few companies that provide the risk of volatility of cryptocurrencies. The fraudulent outflow of information packs, coupled with concerted intervention on quotations and counterfeiting of indicators, are possible attributes of manipulating a financial market. The term "financial market" may have di fferent connotations, its influence being likely to manifest itself on one or more components of the set of values. Primary ingredients are to be dissolved to combat the complex, concentrated, or distributed e ffect. Therefore all evaluation steps should include an audit chapter, but it is impossible to foresee in the absence of precise, classifiable, input and output data.

Jurisdictional competencies or, more precisely, undefining them clearly, also induce constraints that should be eliminated. The link between cybercrime and cryptocurrencies is biunivocal, and therefore, the regulations in the field of cryptocurrencies must be harmonized with those in the field of cybercrime. The rights and responsibilities of international bodies need to be reviewed in the sense that they have the legal framework and the tools to allow them to intervene promptly to prevent, avoid, or counteract criminal slippage.

Distributed Ledger Technology has grea<sup>t</sup> potential to revolutionize the way activities can be coordinated and o ffers many benefits. However, the step from exploration to implementation must first be tested on the test environment and on models that allow for real-life simulation. All public or private entities should be interested in identifying the best forms of collaboration to ensure security and stability. The role of central banks in this context is decisive while encouraging competition and cooperation.

The contribution that we consider to bring to the literature of the studied field is the summary of what has been studied and a grea<sup>t</sup> opening of a new path to empirical studies related to the interferences between cryptocurrency and cybercrime. The approached topic lends itself to more detailed development, which is why it remains a topic of future research. Our study is limited by the lack of consolidated and verifiable data in the field of cryptocurrencies and especially in terms of the influence of cryptocurrencies in cybercrime. We intend to identify suitable methods in the future to substantiate our finding both in the study of the impact of cybercrime in the evolution of cryptocurrencies, and of the influence of cryptocurrencies in cybercrime.

**Author Contributions:** Conceptualization, M.C.S, . and S.L.C.; Methodology, M.C.S. and S.L.C.; Formal analysis, I.B.; Investigation, M.C.S, ., I.B., and M.V.A.; Resources, I.B.; Data curation, M.C.S, . and S.L.C. Writing—original draft preparation, M.C.S, .; Writing—review and editing, M.C.S, ., I.B., and M.V.A.; Visualization, M.V.A.; Supervision, M.V.A.; Project administration, M.V.A.; Funding acquisition, M.C.S, . All authors have read and agreed to the published version of the manuscript.

**Funding:** This work was supported by the gran<sup>t</sup> POCU 380/6/13/123990, co-financed by the European Social Fund within the Sectorial Operational Program Human Capital 2014–2020.

**Conflicts of Interest:** The authors declare no conflict of interest.
