Share
What & Why — and introduction
In a ransomware attack malicious software (also called malware) gets installed by criminals on the victim’s device. This malware then denies access to data, systems, or even whole networks that the compromised device is connected to, commonly involving data encryption, data exfiltration, and disruption of operations because of inoperable systems. At the same time, a ransom payment is demanded by the criminals in exchange for unlocking the access and decrypting the data. Ransom demands range from several hundred dollars when targeting individuals to millions of dollars in cases targeting large corporations, critical infrastructure or organisations holding sensitive information. Consequently, besides the financial implications, ransomware attacks may also pose security threats by disrupting critical infrastructure and services. The Financial Action Task Force (FATF) classifies ransomware attacks as a form of extortion and the FATF Recommendations subsequently require that jurisdictions criminalise it as a predicate offence for money laundering.
Turning the focus to crypto, the FATF report concludes that criminals demand ransomware payments almost exclusively in virtual assets (VAs) and that victims often use virtual asset service providers (VASPs) to pay the ransom. On the other hand, criminals then also predominantly use VASPs to launder the received ransom payments and eventually exchange the illicit funds for fiat currency. Reasons why malicious actors prefer cryptocurrencies as ransom payment are that they provide a certain degree of (pseudo-)anonymity and allow for transfers without having a bank or other financial institution involved. Lastly, ransomware attacks are generally an international phenomenon, which makes crypto due to its international character an ideal mean for payments.
How — examples
Various ransomware attack techniques have been developed by malicious actors to maximise the efficacy and profitability of their attacks. One of them is double/triple/multiple-extortion: in addition to the original ransom demand other forms of extortion are used in the same attack, including threatening to publish the compromised data or extorting money not only from the original victim, but also from additional people, who for example would be impacted by the release of the compromised data. Malicious groups also carry out ‘ransomware as a service’ (RaaS) attacks, an illicit ‘business model’ in which criminals offer ransomware software kits and/or other attack elements on the Dark Web, including distribution of the malware or initial compromise of a victim’s network, in exchange for a fee or percentage of the ransom.
Let’s look at a concrete example: the Colonial Pipeline ransomware attack. On 7. May 2021, Colonial Pipeline, a US oil pipeline system, was successfully compromised with malware that impacted the digital pipeline management. The attack forced Colonial Pipeline to shut down more than 8’500 km of fuel pipelines, leading to a disruption of nearly half of the East Coast fuel supply. It is believed that the criminal organization DarkSide, that sells RaaS services carried out the attack. Colonial Pipeline paid approximately 75 Bitcoins (worth around USD 5 million at that time) as ransom. Interestingly, on 7. June 2021, the FBI announced that it was able to recover a large part of the ransom payment by using investigative techniques and on-chain analysis tools (read in our previous article more about the what, why and how of on-chain data analysis). This success demonstrates the potential of on-chain analysis tools to trace and recover funds.
To support the timely detection of transactions related to ransom payments as well as the laundering of these illicit proceeds, the FATF released a compilation of Potential Risk Indicators drawn from data provided by the jurisdictions in its network. These ‘red flag’ indicators may be used by VASPs and other financial service providers in their transaction monitoring systems to flag suspicious transactions related to this financial crime.
Would you like to learn more about other financial crime schemes involving digital assets and cryptocurrencies? Then have a look at our previous article about crypto hacks & exploits.
Would you like to stay up-to-date?
Subscribe to our Medium page. Follow us on Twitter and connect on LinkedIn.