This research paper delves into the evolving landscape of cybercrime, specifically examining the intersection of crypto-currencies and malicious activities. The paper investigates the various types of malware, including CryptoLocker, ransomware, rootkits, and spyware, employed by cybercriminals to exploit vulnerabilities and obtain crypto-currencies. It identifies the vulnerabilities exploited, such as phishing, missing hot wallet protection, data breaches, and transaction vulnerabilities, providing a comprehensive overview of the threats. The report also explores effective mitigation techniques, including identifying threats, implementing two-factor authentication, providing training and education, ensuring strong sign-off policies, and utilizing firewalls and cryptography tools, to safeguard against cybercrime. The paper concludes by emphasizing the importance of proactive security measures and continuous adaptation to combat the ever-changing tactics of cybercriminals in the crypto-currency ecosystem. The research paper provides insights into the current trends, challenges, and potential solutions in the fight against cybercrime.