Stealing crypto is easy, security experts say, but spending it is so hard that some hackers prefer to just hold the loot ransom

Imagine this: You’re a bad person who has stolen millions of dollars worth of cryptocurrency.

If you’re particularly bad, you’re proud of yourself, thinking you’ve gotten away with a big payday. But now you have to figure out how to cash out the crypto without getting caught.

Despite what you may think, it’s not so simple.

“The skill set required for the initial exploit and subsequent laundering are very different,” Arda Akartuna, a cryptocurrency threat analyst at blockchain analytics and compliance firm Elliptic, told Fortune.

The blockchain ecosystem just isn’t designed for processing large volumes of money anonymously. The options for laundering stolen crypto are limited, especially if massive sums are involved. For example, in the recent hack of the network underpinning the popular play-to-earn, blockchain-based game Axie Infinity, Akartuna predicted that the hacker “will face practical and logistical difficulties if they try to cash out the entire $600 million” stolen.

“Hacking is the easiest part,” Jonah Michaels, communications lead at Web3 bug bounty platform Immunefi, told Fortune. “The hardest part is planning enough in advance to make sure that cashing out the funds is successful. Moreover, the larger the hack, the more unlikely it is that hackers will be able to make off with all the funds.”

After a hacking, thieves usually (and obviously) want to launder the cryptocurrency they snagged without authorities tracing it back to them.

However, each movement of cryptocurrency and transactions is documented on the blockchain, a public digital ledger. Though addresses, or the random string of letters and numbers that represent cryptocurrency wallets, are seemingly anonymous, they can be often traced to individuals.

To hide their trail, cyber thieves often use “mixers,” which let anyone deposit cryptocurrency and “mix” it with other people’s cryptocurrency. Users can later withdraw the same amount they put in, but it’s not the same cryptocurrency.

Tornado Cash, one of the most popular cryptocurrency mixers, breaks the on-chain link between the deposit and withdrawal to “improve transaction privacy,” according to its website. It allows a different address to withdraw.

“Tornado Cash is the typical first destination that we see after exploits, small or large,” Akartuna said. Overall, mixers are “perhaps the most common” post-exploit blockchain activity by hackers, he added.

Indeed, as Michaels said, “Almost all hacks involve mixers like Tornado Cash, since after a hack, everyone is watching that hacker’s wallet address like a hawk.” Much can be learned from examining a wallet because it can give clues to hackers’ identities, such as previous transactions or whether they have other wallets that they’ve sent funds to.