{"id":45887,"date":"2021-07-12T07:00:00","date_gmt":"2021-07-12T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=45887"},"modified":"2025-09-01T13:35:38","modified_gmt":"2025-09-01T10:35:38","slug":"the-ransomware-pandemic-whats-fueling-the-wave-of-hacker-attacks-and-how-it-could-affect-bitcoin","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/the-ransomware-pandemic-whats-fueling-the-wave-of-hacker-attacks-and-how-it-could-affect-bitcoin\/","title":{"rendered":"The ransomware pandemic: what&#8217;s fueling the wave of hacker attacks and how it could affect Bitcoin"},"content":{"rendered":"<p>Since last year, many companies and government agencies have faced ransomware attacks.\u00a0<\/p>\n<p>Due to breaches they not only lose the money demanded by ransomware operators for the decryption key, but also suspend operations \u2014 after <a href=\"https:\/\/u1f987.com\/en\/news\/hackers-from-russia-linked-to-colonial-pipeline-attack-via-ransomware\">the attack on Colonial Pipeline<\/a> there were temporary fuel-supply disruptions, causing some U.S. states <a href=\"https:\/\/edition.cnn.com\/us\/live-news\/us-gas-demand-hack-05-11-21\/index.html\">to declare<\/a> a state of emergency.<\/p>\n<p>After several high-profile attacks by authorities in various countries, especially the United States, they effectively <a href=\"https:\/\/u1f987.com\/en\/news\/us-raises-the-priority-of-cyberattack-investigations-to-the-level-of-terrorism-cases\">equated the ransomware threat with terrorism<\/a>.\u00a0<\/p>\n<p>The search for a solution to ransomware could lead to tighter regulation of cryptocurrencies\u2014an industry favourite for collecting the ransom. In the United States, calls have grown for closer tracing of crypto transactions and tougher KYC\/AML procedures.<\/p>\n<p>ForkLog has examined what lies behind the heightened ransomware threat and what consequences this will have for the cryptocurrency industry.\u00a0<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\" id=\"block-b7975d37-c071-4a69-b7d0-5e77589ae1ed\">\n<li>Ransomware has existed for a long time, but recently it has drawn close attention due to the rising damage from attacks and the focus on businesses rather than individual users.<\/li>\n<li>Experts tie the heightened activity of encryptors to the spread of the &#8216;ransomware-as-a-service&#8217; model and the growing popularity of cryptocurrencies.<\/li>\n<li>The Biden administration has named tracking cryptocurrency transactions as one of the possible options to combat ransomware. Some have even proposed banning cryptocurrencies.<\/li>\n<li>Experts note that the industry has all the tools to counter criminals&#8217; use of cryptocurrencies \u2014 for example, tracking suspicious transactions, something impossible with cash.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\"><strong>What are ransomware programs?<\/strong><\/h2>\n<p>The principle behind ransomware is simple: attackers infect devices, encrypt data or disrupt computer systems, and demand a ransom for the decryptor key.<\/p>\n<p>Ransomware has existed for a long time, but recently it has drawn heightened attention due to the rising damage from attacks and the focus on businesses rather than individual users.<\/p>\n<p>The standard infection method is phishing. Hackers send emails containing malware or links.<\/p>\n<p>These emails are often signed with well-known brands\u2014such as delivery services, banks, or business partners close to the victim\u2014information that fraudsters gather in advance during the preparation of a targeted attack, ForkLog&#8217;s ESET experts said.<\/p>\n<p>The history of ransomware began in the late 1980s. One of the first such viruses was the AIDS Trojan. Its author is believed to be Dr. Joseph Popp, who taught at Harvard. The virus was distributed on floppy disks packaged as educational programs about AIDS by a certain PC Cyborg Corporation.<\/p>\n<p>After 90 reboots, the virus on the disks encrypted files and hid folders, demanding $189 for a &#8216;license extension&#8217;.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/6yw7_JHIXvXZQpkx23qUKeprHRZIfnwAJmUrXM9RQwREjpWIcg94g8cOWWbazfc8UJD6s9gsoWuWBmx_mLWeLs3Xyr9Cugq6SdCD0610f7BNlwf_KbAFFmnuJlF4D4WtNPxZIrtb\" alt=\"\u00ab\u041f\u0430\u043d\u0434\u0435\u043c\u0438\u044f \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439\u00bb: \u0441 \u0447\u0435\u043c \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0432\u043e\u043b\u043d\u0430 \u0430\u0442\u0430\u043a \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438 \u043a\u0430\u043a \u043e\u043d\u0430 \u043e\u0442\u0440\u0430\u0437\u0438\u0442\u0441\u044f \u043d\u0430 \u0431\u0438\u0442\u043a\u043e\u0438\u043d\u0435\"\/><figcaption>Image: <a href=\"https:\/\/en.wikipedia.org\/wiki\/AIDS_(Trojan_horse)\">Wikipedia<\/a>.\u00a0<\/figcaption><\/figure>\n<p>Over time, ransomware evolved, but truly large-scale attacks began after 2010. In addition to improving malware and finding new intrusion methods, the internet spread worldwide at unprecedented speed, and the number of potential victims grew by hundreds and thousands.\u00a0<\/p>\n<p>New ways to obtain a ransom and evade law enforcement emerged \u2014 at least initially.\u00a0\u00a0<\/p>\n<p>In 2013 hackers began distributing CryptoLocker, targeting Windows users, via emails with malicious attachments, botnets and compromised sites. As ZDNet, citing Dell SecureWorks, reports, CryptoLocker harmed at least 250,000 victims in its early days.<\/p>\n<p>The malware encrypted certain files and the victim received a ransom note with a countdown. Operators accepted payments via MoneyPak cards or in bitcoins. The note also warned that if the ransom was not paid in time, &#8216;no one will ever be able to recover the files&#8217;.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/FpVeU14RHmekTos7HcDqxB4yBg19qZfKksoJrHuVnz7J9pHAeg3R9PKx24lkh6wosTNqWESta-KoubcEvmtZ7s3m1aT5bG_lPbfCG3QYqzbfAGi7h-mFtXtbjPmADu8-HKDyZZcz\" alt=\"\u00ab\u041f\u0430\u043d\u0434\u0435\u043c\u0438\u044f \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439\u00bb: \u0441 \u0447\u0435\u043c \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0432\u043e\u043b\u043d\u0430 \u0430\u0442\u0430\u043a \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438 \u043a\u0430\u043a \u043e\u043d\u0430 \u043e\u0442\u0440\u0430\u0437\u0438\u0442\u0441\u044f \u043d\u0430 \u0431\u0438\u0442\u043a\u043e\u0438\u043d\u0435\"\/><figcaption>Image: <a href=\"https:\/\/arstechnica.com\/information-technology\/2013\/10\/youre-infected-if-you-want-to-see-your-data-again-pay-us-300-in-bitcoins\/\">ArsTechnica<\/a>.<\/figcaption><\/figure>\n<p>Later, hackers added the option to buy a decryptor key after the deadline through a dedicated service, but the price rose from 2 to 10 BTC.<\/p>\n<p>According to ZDNet, which tracked several Bitcoin addresses to which CryptoLocker victims paid the ransom, between 15 October and 18 December 2013 around 41,928 BTC passed through the hackers&#8217; wallets.<\/p>\n<p>In June 2014, the US Department of Justice announced the dismantling of the Gameover Zeus botnet, used to distribute CryptoLocker and other malware, and Russian national Evgeniy Bogachev was charged with involvement in operating the botnet and ransomware. In the operation, authorities also said they had destroyed CryptoLocker.<\/p>\n<p>Subsequently the world faced several more large-scale ransomware campaigns. The WannaCry damage, by some estimates, exceeded $1 billion, and the Petya worm not only encrypted data but also erased files, affecting many systems across companies and government agencies.\u00a0<\/p>\n<p>While law enforcement and cybersecurity firms fought one set of ransomware groups, others rose to take this crime to a whole new level.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abDespite the authorities&#8217; successes in curbing several ransomware groups, this form of malware has proved to be a hydra \u2014 you cut off one head, and several more appear\u00bb, \u2014 analysts emphasize.<\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\"><strong>New Horizons<\/strong><\/h2>\n<p>According to the analysts at <a href=\"https:\/\/securelist.ru\/kaspersky-security-bulletin-2016-story-of-the-year\/29788\/\">Kaspersky Lab<\/a>, 2016 was pivotal, &#8216;when in a few months the number of ransomware attacks on business tripled&#8217;. Data from Statista show that this year saw the highest number of attacks.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/zk38cqPfQftmdC9owCVNa3lYeCpjqMCOm-A0TIi2TqTlL5Hck3xZFQ9-9YRkaowRXCd8AQmwzVcLD-6LXNunJcOhmSYYZqeoEl8wi3qJ3mmwqgw1st8ja4knTGAWB_O9ZRTyPDat\" alt=\"\u00ab\u041f\u0430\u043d\u0434\u0435\u043c\u0438\u044f \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439\u00bb: \u0441 \u0447\u0435\u043c \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0432\u043e\u043b\u043d\u0430 \u0430\u0442\u0430\u043a \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438 \u043a\u0430\u043a \u043e\u043d\u0430 \u043e\u0442\u0440\u0430\u0437\u0438\u0442\u0441\u044f \u043d\u0430 \u0431\u0438\u0442\u043a\u043e\u0438\u043d\u0435\"\/><figcaption>Data: <a href=\"https:\/\/www.statista.com\/statistics\/494947\/ransomware-attacks-per-year-worldwide\/\">Statista<\/a>.<\/figcaption><\/figure>\n<p>Nevertheless, according to <a href=\"https:\/\/blog.checkpoint.com\/2021\/05\/12\/the-new-ransomware-threat-triple-extortion\/\">Check Point Research<\/a>, ransomware operators intensified in 2021. In the first four months of the year, the number of companies hit by ransomware attacks rose by 102% compared with the start of 2020.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/QEwd3CiQv-WL0i5Rb1focvU7jPbvMYwJyJFp0kYjX_IBYpGYSPYnWyDdavj_zjynQheRX6Vz-alHZqdrztprdsx7pRZRW1LXPSTFqxks5HtoYAGCzkAk21WWQp9H8VETlrr2YnN8\" alt=\"\u00ab\u041f\u0430\u043d\u0434\u0435\u043c\u0438\u044f \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439\u00bb: \u0441 \u0447\u0435\u043c \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0432\u043e\u043b\u043d\u0430 \u0430\u0442\u0430\u043a \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438 \u043a\u0430\u043a \u043e\u043d\u0430 \u043e\u0442\u0440\u0430\u0437\u0438\u0442\u0441\u044f \u043d\u0430 \u0431\u0438\u0442\u043a\u043e\u0438\u043d\u0435\"\/><figcaption>Data: <a href=\"https:\/\/blog.checkpoint.com\/2021\/05\/12\/the-new-ransomware-threat-triple-extortion\/\">Check Point Research<\/a>.<\/figcaption><\/figure>\n<p>Since the start of the year there have been several high-profile ransomware incidents \u2014 <a href=\"https:\/\/u1f987.com\/en\/news\/hackers-from-russia-linked-to-colonial-pipeline-attack-via-ransomware\">Colonial Pipeline<\/a>, <a href=\"https:\/\/u1f987.com\/en\/news\/russian-hackers-suspected-in-attack-on-worlds-largest-meat-producer-jbs\">JBS<\/a>, <a href=\"https:\/\/u1f987.com\/en\/news\/ransomware-group-revil-demanded-50-million-in-monero-from-acer\">Acer<\/a> and many other firms and agencies have fallen victim. Reuters reports that the United States has elevated the priority of investigations into such breaches to the level of terrorism cases, <a href=\"https:\/\/u1f987.com\/en\/news\/us-raises-the-priority-of-cyberattack-investigations-to-the-level-of-terrorism-cases\">according to Reuters<\/a>.<\/p>\n<p>Analysts disagree on the total number of ransomware attacks. Reliable data are hard to obtain as many companies do not disclose details or even the fact of a breach.<\/p>\n<p>However, almost all experts agree on the increased level of damage.<\/p>\n<p>According to <a href=\"https:\/\/blog.chainalysis.com\/reports\/ransomware-update-may-2021\">Chainalysis<\/a>, the average ransom demanded by ransomware operators rose more than fourfold\u2014from $12,000 in Q4 2019 to $54,000 in Q1 2021.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/bTVn_Mv2AGi4vrnfRNzcuzn_savJxZpCZ855vp_TWDbdgZ3h629yhIGVHpeH9FnkPMWJvilPl57t1qdaxkNYCU-iOHuVU-j_EwgvIlrrbgnfitoh5ROtxS-rI-7OTt8fw46XoYJf\" alt=\"\u00ab\u041f\u0430\u043d\u0434\u0435\u043c\u0438\u044f \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439\u00bb: \u0441 \u0447\u0435\u043c \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0432\u043e\u043b\u043d\u0430 \u0430\u0442\u0430\u043a \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438 \u043a\u0430\u043a \u043e\u043d\u0430 \u043e\u0442\u0440\u0430\u0437\u0438\u0442\u0441\u044f \u043d\u0430 \u0431\u0438\u0442\u043a\u043e\u0438\u043d\u0435\"\/><figcaption>Data: <a href=\"https:\/\/blog.chainalysis.com\/reports\/ransomware-update-may-2021\" title=\"https:\/\/blog.chainalysis.com\/reports\/ransomware-update-may-2021\">Chainalysis<\/a>.<\/figcaption><\/figure>\n<p>According to <a href=\"https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-250-billion-usd-by-2031\/\">Cybersecurity Ventures<\/a>, the damage from ransomware in 2021 will reach $20 billion, rising to about $265 billion by 2031.<\/p>\n<p>One reason for the rising threat, experts say, is the transformation of extortion into an ecosystem, where malware developers are only part of the system.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Causes of the ransomware pandemic<\/strong><\/h2>\n<p>Ransomware-as-a-Service (RaaS) \u2014 a model that lets you order a cyberattack as a service. Usually: hackers develop the malware and provide it to a client. Depending on the level of involvement, developers take a cut of the ransom.<\/p>\n<p>Independent expert Alexander Isavin told ForkLog that the established &#8216;market for hired malware-as-a-service&#8217; has significantly boosted the number of attacks:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abSomeone develops, someone seeks paying victims, and the infrastructure for laundering illicit proceeds already existed. It\u2019s clear criminals use the most advanced tools first \u2014 and they were among the first to adopt cryptocurrencies\u00bb.<\/p>\n<\/blockquote>\n<p>A prime example of a RaaS-style attack is the Colonial Pipeline breach, ForkLog\u2019s cybersecurity expert from Kaspersky Lab, Dmitry Galov, said.<\/p>\n<p>The group involved in the Colonial Pipeline attack not only developed the tools but built an entire infrastructure for execution. It helped its clients during negotiations with victims and in obtaining the ransom, and offered special programs to other criminals, pre-selected through a competitive process according to formal requirements and after interviews.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abThe world of ransomware must be understood as an ecosystem and regarded as such\u00bb, \u2014 <a href=\"https:\/\/securelist.com\/ransomware-world-in-2021\/102169\/\">analysts emphasize<\/a>.<\/p>\n<\/blockquote>\n<p>Attackers often do not know each other. They interact through various forums and platforms, paying for services with cryptocurrency.\u00a0<\/p>\n<p>Thanks to this, arresting any single participant would have little effect on ransomware operations, since it is impossible to identify other actors.<\/p>\n<p>One example supporting this view is the recent Ukrainian law-enforcement notification identifying members of the hacking group behind the Clop ransomware.<\/p>\n<p>Spreading a week after this news, Clop <a href=\"https:\/\/u1f987.com\/en\/news\/clop-publishes-new-batch-of-stolen-data-ukraine-had-previously-said-it-identified-hackers\">published a new batch of data<\/a>, allegedly obtained from two new victims.\u00a0<\/p>\n<p>As it turned out, the searches targeted not group members but operators of a cryptocurrency exchange through which Bitcoins flowed; Binance <a href=\"https:\/\/u1f987.com\/en\/news\/binance-helped-identify-members-of-a-group-laundering-money-for-the-clop-and-petya-operators\">helped identify<\/a> them. The hackers, it would seem, remain at large.<\/p>\n<p>According to researchers <a href=\"https:\/\/intel471.com\/blog\/ransomware-as-a-service-2020-ryuk-maze-revil-egregor-doppelpaymer\/\">Intel471<\/a>, among RaaS-operating groups are Doppel Paymer, Egregor\/Maze, Netwalker, REvil, Ryuk and others.<\/p>\n<p>The threat from ransomware activity grows also due to changing victim focus \u2014 hackers increasingly target companies and organisations rather than individuals.\u00a0<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abRansomware attacks in recent years have become a real threat to any organisation, including social facilities and industrial enterprises. Often the groups attacking business seek access to the maximum number of corporate networks and then study what company it is\u00bb, said Dmitry Galov, cybersecurity expert at Kaspersky Lab.<\/p>\n<\/blockquote>\n<p>Hackers increasingly adopt the tactic of double extortion. They not only encrypt data or devices but also exfiltrate personal or commercial information they threaten to publish if the ransom isn\u2019t paid. <\/p>\n<p>Many affected organisations choose to pay. As the media reports citing Proofpoint research, 52% of ransomware victims paid the ransom.<\/p>\n<p>Experts do not recommend paying, as &#8216;there is no guarantee criminals will fulfil their promises to decrypt after payment&#8217;, ForkLog told ESET:\u00a0<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abMoreover, statistics show that more than half of those who paid end up re-victimised within a year\u00bb.<\/p>\n<\/blockquote>\n<p>This is <a href=\"https:\/\/u1f987.com\/en\/news\/vpn-blocks-in-russia-german-authorities-press-telegram-for-user-data-and-other-cybersecurity-developments\">confirmed<\/a> by Cybereason. A survey of 1,263 cybersecurity professionals found that 80% of those who paid the ransom were hit again.<\/p>\n<p>The U.S. authorities <a href=\"https:\/\/u1f987.com\/en\/news\/us-authorities-urge-not-to-pay-ransomware-operators-under-the-threat-of-sanctions\">are urging<\/a> not to pay; some even <a href=\"https:\/\/www.nbcnews.com\/politics\/meet-the-press\/sec-granholm-backs-ban-ransomware-payments-you-are-encouraging-bad-n1269776\">advocate<\/a> banning such payouts.\u00a0<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">? If you were the victim of a <a href=\"https:\/\/twitter.com\/hashtag\/ransomware?src=hash&#038;ref_src=twsrc%5Etfw\">#ransomware<\/a> attack, paying the ransom doesn\u2019t guarantee you\u2019ll get a decryption key or your data back from cybercriminals. Eliminate the need to pay \u2013 back up your data and patch your computer often! <a href=\"https:\/\/t.co\/BuYmxnWdyK\">https:\/\/t.co\/BuYmxnWdyK<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Cybersecurity?src=hash&#038;ref_src=twsrc%5Etfw\">#Cybersecurity<\/a> <a href=\"https:\/\/t.co\/VdwqP8cymn\">pic.twitter.com\/VdwqP8cymn<\/a><\/p>\n<p>\u2014 US-CERT (@USCERT_gov) <a href=\"https:\/\/twitter.com\/USCERT_gov\/status\/1410655707809079296?ref_src=twsrc%5Etfw\">July 1, 2021<\/a><\/p><\/blockquote>\n<p> <script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In recent times American organisations and companies have increasingly found themselves in the crosshairs, prompting the government and security services to focus closely on this form of cybercrime. And with it\u2014cryptocurrencies.<\/p>\n<p>The Biden administration has already <a href=\"https:\/\/u1f987.com\/en\/news\/biden-administration-to-study-use-of-cryptocurrencies-in-ransomware-attacks\">stated<\/a> that tracking cryptocurrency transactions is one possible approach to counter ransomware.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Bitcoin and ransomware<\/strong><\/h2>\n<p>Some see cryptocurrencies as a major driver of ransomware.<\/p>\n<p>Programmer Stephen Diehl notes that previously attackers had few ways to collect a ransom without attracting law enforcement, especially for large sums.\u00a0<\/p>\n<blockquote class=\"twitter-tweet\" data-conversation=\"none\">\n<p lang=\"en\" dir=\"ltr\">Cryptocurrency provided the perfect answer to allowing hackers to prey on their victims and extort unlimited and anonymous cash payments while completely minimising their exposure of being caught by law enforcement. (8\/)<\/p>\n<p>\u2014 Stephen Diehl (@smdiehl) <a href=\"https:\/\/twitter.com\/smdiehl\/status\/1395684724241313795?ref_src=twsrc%5Etfw\">May 21, 2021<\/a><\/p><\/blockquote>\n<p> <script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"\/utf-8\"><\/script><\/p>\n<p>According to Chainalysis, in 2020 ransomware victims paid more than $406 million in cryptocurrencies. Analysts note that this figure is likely to rise as investigations continue.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/sxuQYivfKn_3RKcH-PqvLwxrP0lFeFX9M7q8iPG2h5TajdSP-mOv90e7NN0Diwl4e77L2GCxs6r0lWWD8MItkxvHSdMny5VtPeI2288U8ROAdzKkpznlo6icZ5kJZ4sRg7pGmN7Q\" alt=\"\u00ab\u041f\u0430\u043d\u0434\u0435\u043c\u0438\u044f \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439\u00bb: \u0441 \u0447\u0435\u043c \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0432\u043e\u043b\u043d\u0430 \u0430\u0442\u0430\u043a \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438 \u043a\u0430\u043a \u043e\u043d\u0430 \u043e\u0442\u0440\u0430\u0437\u0438\u0442\u0441\u044f \u043d\u0430 \u0431\u0438\u0442\u043a\u043e\u0438\u043d\u0435\"\/><figcaption>Data: <a href=\"https:\/\/blog.chainalysis.com\/reports\/ransomware-update-may-2021\" title=\"https:\/\/blog.chainalysis.com\/reports\/ransomware-update-may-2021\">Chainalysis<\/a>.<\/figcaption><\/figure>\n<p>Most often the ransom is demanded in Bitcoin, but payments can be made in other cryptocurrencies as well. According to Samantha Levin of CAC Specialty, the payments have been observed in Ethereum and even Dogecoin.<\/p>\n<p>Attackers focus on privacy-oriented assets. One such coin is Monero. Last year, the REvil (Sodinokibi) gang said it planned to abandon Bitcoin in favour of XMR.\u00a0<\/p>\n<p>However, although attackers have already <a href=\"https:\/\/u1f987.com\/en\/news\/ransomware-group-revil-demanded-50-million-in-monero-from-acer\">demanded a ransom in this cryptocurrency<\/a>, they have not managed to move completely away from Bitcoin. In one of the latest attacks they demanded <a href=\"https:\/\/u1f987.com\/en\/news\/revil-hackers-breached-thousands-of-companies-and-demanded-a-70-million-ransom-in-bitcoin\">$70 million in BTC<\/a>.<\/p>\n<p>According to <a href=\"https:\/\/www.ft.com\/content\/13fb66ed-b4e2-4f5f-926a-7d34dc40d8b6\">experts<\/a>, the main reason hackers have not fully shifted to privacy-focused digital assets is that victims find it harder to access them. Consequently, they simply cannot pay the ransom.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abMany of these [privacy-focused] cryptocurrencies remain unusable on a global scale, unlike Bitcoin\u00bb, said ForkLog to ESET.<\/p>\n<\/blockquote>\n<p>Bitcoin extortionists could tarnish the reputation of the lead cryptocurrency as Congress weighs its status, says Illinois Congressman Bill Foster.\u00a0<\/p>\n<p>With the rise in ransomware activity, U.S. authorities\u2014who had long warned about criminals using crypto\u2014have begun urging strict regulation of the industry, and government experts call for tighter compliance with KYC\/AML rules at the international level, <a href=\"https:\/\/u1f987.com\/en\/news\/experts-urge-tougher-kyc-aml-procedures-to-combat-bitcoin-ransomware\">says<\/a>.<\/p>\n<p>Some even propose banning Bitcoin altogether. Yet it remains unclear how, since the essence of the protocol lies in decentralisation. Reddit users mocked the idea, suggesting banning phones to curb spam calls or officials to curb corruption.<\/p>\n<p>Moreover, as The Verge notes, a theoretical ban on cryptocurrencies would disrupt legitimate market participants, while \u201cdodgy exchanges based outside the United States\u201d would persist. <\/p>\n<p>Moreover, the reputation of Bitcoin as a totally anonymous coin is somewhat exaggerated, as the blockchain enables tracing of most transactions.<\/p>\n<p>In June, the FBI <a href=\"https:\/\/u1f987.com\/en\/news\/fbi-recovers-63-7-btc-from-colonial-pipeline-ransom-gains-access-to-a-bitcoin-wallet\">recovered 63.7 BTC<\/a> from the Colonial Pipeline ransom paid to the ransomware operators. The agency traced the blockchain transactions soon after the funds moved from the Colonial Pipeline address to the DarkSide hackers. Some were redirected to a wallet for which the authorities had the private key.\u00a0<\/p>\n<p>How they obtained access remains undisclosed. However, as Adam Back, a pioneer of the crypto industry and the CEO of Blockstream, noted, it is unlikely the FBI hacked the wallet. It is more plausible that the agency simply gained access via a service provider or hosting company.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abBlockchain analysis allowed linking the payment to a specific Bitcoin address and identifying the true owner of the final account. This example demonstrated that Bitcoin transfers are traceable and that this will deter cyber criminals from using the payment method in the future\u00bb, say ESET researchers.<\/p>\n<\/blockquote>\n<p>Before this story, Elliptic researchers <a href=\"https:\/\/u1f987.com\/en\/news\/study-finds-darkside-victims-paid-about-90-million-in-bitcoin\">identified<\/a> 47 Bitcoin wallets believed to belong to DarkSide.<\/p>\n<p>Even privacy-focused Monero is not fully anonymous, and tools to track transactions with it <a href=\"https:\/\/u1f987.com\/en\/news\/irs-to-task-chainalysis-with-tracking-monero-transactions\">are already being developed<\/a>.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abThe biggest myth, the greatest misconception is the traceability of Monero transactions. It\u2019s not hard to &#8216;hack&#8217; Monero privacy based on wallet analysis\u00bb, said in a ForkLog interview one of the cryptocurrency developers, Riccardo Spagni.<\/p>\n<\/blockquote>\n<p>Thus, the industry already has tools to track transactions, and exchanges are widely adopting KYC\/AML procedures, akin to those used by traditional financial firms. If the industry does not participate in finding countermeasures, regulators are likely to propose a solution themselves.\u00a0<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abCryptocurrencies are in fact more transparent than most other forms of value transfer. Certainly more transparent than cash\u00bb, says Chainalysis.<\/p>\n<\/blockquote>\n<p><em>Author: Alina Sagan-skaya.<\/em><\/p>\n<p>Read ForkLog\u2019s Bitcoin news on our <a href=\"\/\/telegram.me\/forklog\" target=\"\u201c_blank\u201d\" rel=\"\u201cnofollow\u201d noopener\">Telegram<\/a> \u2014 cryptocurrency news, prices and analysis.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since last year, many companies and government agencies have faced ransomware attacks. ForkLog examined what lies behind the heightened ransomware threat and its implications for the crypto industry.<\/p>\n","protected":false},"author":1,"featured_media":45888,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[1144],"tags":[1154],"class_list":["post-45887","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-longreads","tag-crimes"],"aioseo_notices":[],"amp_enabled":true,"views":"28","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/45887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=45887"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/45887\/revisions"}],"predecessor-version":[{"id":45889,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/45887\/revisions\/45889"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/45888"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=45887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=45887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=45887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}