Skip to navigation Skip to navigation Skip to search form Skip to login form Skip to footer Salta al contenido principal

Blog del sitio

More than 150 arrested in global crackdown on Darknet traders:...

Posted on

acitveondarkmarkets-1.png

THE HAGUE, Oct 26 (Reuters) - At least 150 people have been arrested by European and U.S.

authorities after a joint crackdown on traders of drugs, weapons and other illicit goods on darknet market e-commerce sites, Dutch media reported Tuesday citing police agency Europol.

Cash and cryptocurrency worth 26.7 million euros ($31 million) and 234 kilograms of drugs were also seized, according to Dutch broadcaster KRO-NRCV.

"This operation proves that we can reach (criminals on the dark web sites web) even if they think they are hiding somewhere, they cannot be sure we won't be there at one moment to knock on their door", Europol's deputy executive director dark web darknet market list of operations, Jean-Philippe Lecouffe told the broadcaster.

Europol would not comment on the report, but referred to a press conference set for 10AM local time (1400 GMT) in Washington with the Department of Justice.

According to the Dutch media 65 U.S.

nationals were arrested, along with 47 Germans, 24 Brits and a handful of Dutch, French, Swiss and Bulgarian nationals.

The operation focused on sellers and buyers on the darknet market rather than the people running the sites as in earlier crackdowns.

darknet market markets are e-commerce sites designed to lie beyond the reach of regular search engines.

They are popular with criminals, as buyers and sellers are largely untraceable.

In January this year, darknet market markets 2024 Europol announced it had taken down an online marketplace called "DarkMarket" that sold illegal drugs in an operation led by German law enforcement agencies.

($1 = 0.8593 euros)

(Reporting by Stephanie van den Berg, editing by Bart Meijer and Christina Fincher)

Self-proclaimed 'Crocodile of Wall Street' and husband granted bail

Posted on

The self-proclaimed 'Crocodile of Wall Street' and her husband have been granted bail set at $3million and $5million respectively after being arrested for allegedly laundering $4.5billion in stolen in the 2016 Bitfinex exchange hack. 

Ilya '' Lichtenstein, 34, and his wife, Heather Rhiannon Morgan, 31, who raps under the name Razzlekhan, were arrested on Tuesday in Manhattan on federal charges of conspiracy to commit money laundering and conspiracy to defraud the United States. 

At an initial court appearance, a magistrate judge ruled Lichtenstein could be released into home detention on a $5 million bond co-signed by his parents; the bond amount for Morgan was set at $3 million but they were to remain in custody until the bail conditions were met.

Prosecutors had argued defendants, who live on Wall Street in lower Manhattan, should be denied bail, calling them flight risks who still potentially have access to vast sums of money.  

Federal law enforcement officials said they recovered roughly $3.6 billon in cryptocurrency - the Justice Department's largest ever financial seizure - linked to the hack of Bitfinex, a virtual currency exchange whose systems were breached nearly six years ago.    

Lichtenstein is a citizen of both  and the United States and the co-founder of an online marketing firm. Morgan, a rapper and former Forbes contributor, describes herself as 'an expert in persuasion, social engineering, and game theory'.

WARNING: EXPLICIT LYRICS 

Bail for Ilya 'Dutch' Lichtenstein, 34, and his wife, Heather Rhiannon Morgan, 31, was set at $5million and $3million respectively after their arrest on Tuesday for allegedly laundering $4.5billion in Bitcoin stolen in the 2016 Bitfinex exchange hack

Morgan, who raps under the name Razzlekhan, (seen in front of Federal Hall on Wall Street in a music video) declared herself the 'Crocodile of Wall Street' in one of her rap songs

In this courtroom sketch, attorney Sam Enzer, center, sits between Heather Morgan, left, and her husband, Ilya 'Dutch' Lichtenstein, in federal court on Tuesday

'I'm many things, a rapper, an economist, a journalist, a writer, a CEO, and a dirty, dirty, dirty dirty h*,' she raps in her 2019 single, Versace Bedouin.

'When she's not reverse-engineering black darknet markets onion address to think of better ways to combat fraud and cybercrime, she enjoys rapping and designing streetwear fashion,' her  reads. 

The August 2016 Bitfinex hack itself was one of the largest crypto heists ever recorded - so massive that news of the theft knocked 20 percent off Bitcoin's value at the time. 

Lichtenstein and Morgan are thus far not charged directly with perpetrating the hack, but rather with receiving and laundering the stolen funds. The case was filed in a federal court in Washington, D.C.

It was unclear who will be representing the couple in the criminal case and whether they had an attorney to speak on their behalf.

They were due to appear in federal court in Manhattan at 3 p.m. on Tuesday. 

The couple is accused of conspiring to launder 119,754 bitcoin that was stolen, after a hacker attacked Bitfinex and initiated more than 2,000 unauthorized transactions.

Morgan, a rapper and former Forbes contributor, describes herself as 'an expert in persuasion, social engineering, and game theory'

The couple is accused of conspiring to launder 119,754 bitcoin that was stolen, after a hacker attacked Bitfinex and initiated more than 2,000 unauthorized transactions

Justice Department officials said the transactions at the time were valued at $71 million in Bitcoin, but with the rise in the currency's value, it is now valued at over $4.5 billion.

'As the complaint alleges, the FBI and federal prosecutors were able to trace the movement of Bitcoin from this hack,' said Matthew Graves, the U.S. Attorney for dark darknet market 2024 the District of Columbia.

He added that the money moved through a major darknet markets onion address exchange tied to a host of crimes, as well as cryptocurrency addresses tied to child sexual abuse materials.

Lichtenstein and Morgan are facing charges of conspiring to commit money laundering, as well as to defraud the United States.

Prosecutors said on Tuesday the illegal proceeds were spent on a variety of things, from gold and non-fungible tokens to 'absolutely mundane things such as purchasing a Walmart gift card for $500.'

Bitfinex said in a statement that it was to working with the Department of Justice to 'establish our rights to a return of the stolen bitcoin.'

'We have been cooperating extensively with the DOJ since its investigation began and will continue to do so,' the company said. 

Bitfinex said it intends to provide further updates on its efforts to obtain a return of the stolen bitcoin as and when those updates are available. 

Tuesday's criminal complaint came more than four months after Monaco announced the department was launching a new National Cryptocurrency Enforcement Team, which is comprised of a mix of anti-money laundering and cybersecurity experts.

The August 2016 Bitfinex hack itself was one of the largest crypto heists ever recorded - so massive that news of the theft knocked 20 percent off Bitcoin's value

Lichtenstein and Morgan are facing charges of conspiring to commit money laundering, as well as to defraud the United States

Morgan is seen rapping with the New York Stock Exchange behind her to the right

Cyber criminals who attack companies, municipalities and individuals with ransomware often demand payment in the form of cryptocurrency.

In one high-profile example last year, hackers caused a widespread gas shortage on the U.S. East Coast when by using encryption software called DarkSide to launch a cyber attack on the Colonial Pipeline.

The Justice Department later recovered some $2.3 million in cryptocurrency ransom that Colonial paid to the hackers.

Cases like these demonstrate that the Justice Department 'can follow money across the blockchain, just as we have always followed it within the traditional financial system,' said Kenneth Polite, assistant attorney general of the department's Criminal Division. 

Justice Department officials say that though the proliferation of cryptocurrency and virtual currency exchanges represent innovation, the trend has also been accompanied by money laundering, ransomware and other crimes

'Today´s arrests, dark market 2024 darknet market and the Department´s largest financial seizure ever, show that cryptocurrency is not a safe haven for darkmarket link criminals,' Deputy Attorney General Lisa Monaco said in a statement. 

'In a futile effort to maintain digital anonymity, dark web market links the defendants laundered stolen funds through a labyrinth of cryptocurrency transactions. Thanks to the meticulous work of law enforcement, the department once again showed how it can and will follow the money, no matter the form it takes.'  

data-track-module="am-external-links^external-links">

Read more:

DM.later('bundle', function()

DM.has('external-source-links', 'externalLinkTracker');

);

U.S. imposes sanctions on Russian darknet market and crypto exchange

Posted on

WASHINGTON, best darknet market markets April 5 (Reuters) - The U.S.

Treasury Department imposed sanctions on Tuesday on a Russia-based darknet market site and a cryptocurrency exchange that it said operates primarily out of Moscow and St. Petersburg.

The sanctions against Russia-Based Hydra and darknet market markets currency exchange Garantex, published on the Treasury Department's website, "send a message today to criminals that you cannot hide on the darknet markets onion or their forums, and you cannot hide in Russia or anywhere else in the world," U.S.

Treasury Secretary Janet Yellen said.

(Reporting by Rami Ayyub Editing by Chris Reese)

Most weapons on the dark web come from US, study finds

Posted on

id="article-body" class="row" section="article-body" data-component="trackCWV">

US guns make up as much as 60 percent of the weapons on sale on the dark web, darknet markets new research has found.

Weapons, darknet market links drugs and stolen identities are readily available on the dark web, a . To investigate where guns, ammunition and guides to their use come from, the UK's University of Manchester and think tank Rand Europe -- or cryptomarkets -- and found 811 listings relevant to the study, darknet market links published Wednesday.

the2Bdeep2Bweb2Bsearch2Bengine.jpg

Most weapons were from the USA, where , and most sales were destined for Europe. A gun bought from the dark web was used in a .

"The dark web is both an enabler for the trade of illegal weapons already on the black darknet market and a potential source of diversion for weapons legally owned", said Giacomo Persi Paoli, the report's lead author. "The ability for criminals and terrorists, as well as vulnerable or fixated individuals, to make virtually anonymous purchases is perhaps the most dangerous aspect."

On Thursday, US and European law enforcement agencies the , two of the three largest dark web markets

Just 270 crypto addresses laundered $1.3 bln in dirty funds last...

Posted on

By Tom Wilson

LONDON, Feb 11 (Reuters) - Criminals are using a small group of cryptocurrency brokers and services to launder hundreds of millions of dollars of dirty virtual money, research shared with Reuters showed on Thursday.

Just 270 cryptocurrency addresses, many connected to over-the-counter brokers, received $1.3 billion in illicit digital coins last year - some 55% of all criminal crypto flows identified by U.S.

blockchain researcher Chainalysis.

A cryptocurrency address is a set of random letters and numbers that represents a location on a virtual network. Bitcoin, for instance, can be sent from a particular address to others on its network.

The illegal use of cryptocurrencies has long worried regulators and law enforcement, with U.S.

Treasury Secretary Janet Yellen and European Central Bank President Christine Lagarde both calling for tighter oversight last month.

The calls for stricter rules have come as bigger investors, especially from the United States, have stepped up their embrace of bitcoin, turbo-charging a 1,000% rally for the world's biggest cryptocurrency since March last year.

Bitcoin hit an all-time high of over $48,200 on Tuesday after Elon Musk's Tesla Inc revealed a $1.5 billion bet on the coin, darkmarkets leading some investors to claim cryptocurrencies were set to become a mainstream asset class.

Yet virtual money is subject to patchy regulation across the world, and remains popular with criminals.

On Wednesday, for instance, European police agency Europol said it assisted in the arrest of hackers suspected of stealing crypto assets worth $100 million.

The Chainalysis study website only covered crime that originates on the blockchain ledger that underpins most cryptocurrencies, including scams, cyberheists, ransomware and darknet market marketplaces used to buy contraband.

Also linked to the digital addresses were services connected to cryptocurrency exchanges.

Some may have received illicit funds inadvertently due to lax compliance checks, the study said.

The true scale of money laundering and dark web darknet market links other crime using cryptocurrencies - for example where criminals use bitcoin to launder traditional cash - is not known.

The United States, Russia and China received the highest volume of digital currency from illicit addresses, darknet market markets url reflecting their high shares of crypto trading volumes, dark web link Chainalysis said.

(Reporting by Tom Wilson. Editing by Mark Potter)

Germany busts international child porn site used by 400,000

Posted on

BERLIN (AP) - German prosecutors announced Monday they have busted one of the world's biggest international darknet market platforms for child pornography, used by more than 400,000 registered members.

Frankfurt prosecutors said in a statement together with the Federal Criminal Police Office that in mid-April three German suspects, said to be the administrators of the "Boystown" platform, were arrested along with a German user.

One of the three main suspects was arrested in Paraguay.

They also searched seven buildings in connection with the porn ring in mid-April in Germany.

The authorities said the platform was "one of the world's biggest child pornography darknet market platforms" and had been active at least since 2019.

Pedophiles used it to exchange and watch pornography of children and darkmarket 2024 toddlers, most of them boys, from all over the world.

Prosecutors wrote that they found "images of most severe sexual abuse of toddlers" among the photos and video material.

"The platform had several forums and chats - the illegal pictures and videos were kept in the forums; in the chats, the members could communicate," prosecutor Julia Bussweiler said.

"There were several language channels to facilitate the communication."

A German police task force investigated the platform, its administrators and users for months in cooperation with Europol and law enforcement authorities from the Netherlands, Sweden, Australia, the United States and Canada, the statement said.

The three main suspects were a 40-year-old man from Paderborn, a 49-year-old man from Munich and a 58-year-old man from northern Germany who had been living in Paraguay for darknet market markets links many years, the prosecutors' statement said.

They worked as administrators of the site and gave advice to members on how to evade law enforcement when using the platform for illegal child pornography.

A fourth suspect, a 64-year-old man from Hamburg, is accused of being one of the most active users of the platform having allegedly uploaded more than 3,500 posts.

Germany has requested the extradition of the suspect who was arrested in Paraguay.

No names were given in line with Germany privacy regulations.

After the raids in mid-April, the online platform was shut down.

Germany's top security official thanked the authorities for their success.

"This investigative success has a clear message: Those who assault the weakest aren't safe anywhere," German Interior Minister Horst Seehofer said.

"That's what investigators work for day and night, online and offline, globally."

"We'll do everything within our power to protect the kids from these disgusting crimes," he added.

___

Christoph Noelting in Frankfurt, Germany, darknet markets onion contributed to this story.

Global Drug Survey reveals alcohol and drug habits during pandemic

Posted on

Australians are officially the world's biggest binge drinkers, but Britain and the US don't lag far behind - featuring in the top five of the latest Global Drug Survey.

Denmark and Finland ranked at second and third in the survey of more than 32,000 people from 22 countries which collected data from December 2020 to March 2021.

The data also shows that the Irish felt the most remorse after drinking.   

Researchers believes extending Covid lockdowns contributed to the results

The survey found that the pandemic saw more experiment with 'microdosing' with psychedelics but people on average consumed less , cannabis, cocaine and LSD.  

According to the findings unveiled this week, Australians got drunk an average 27 times in 2021, almost double the global average of 15.

Australians filled up their beer or wine glass with booze two days per week on average, the survey revealed.

It also found Australians regret their intoxication on 24 per cent of occasions - compared to the 21 per cent global average, with women more likely to regret getting drunk than men. 

euro-vektorflagge-virtuelles-abstraktes-3d-objekt-aus-dreieckigen-polygonen-auf-blauem.jpg?b=1&s=170x170&k=20&c=Enlt04AZ-1_eCdEmMjp_TzqI_h52uOrWXfIu-G-KCRc=

Britons joined the United States, Denmark and Finland in the top five drunkest nations after Australia

'Drank too much too quickly' was the most common regret, darknet markets links claimed by nearly half of those surveyed

But the Irish felt the most remorse after drinking this year, regretting it about a quarter of the time. 

The Danish felt the least regretful, and were also the second drunkest nation after Australia in 2021.

'Drank too much too quickly' was the most common regret, claimed by 49 per cent of those surveyed.

Six per cent said they felt anxious about Covid while four per cent said it was because they 'hadn't drank for ages' due to pandemic restrictions. 

Australians filled up their beer or wine glass with booze two days per week on average, the survey revealed

Vinegar Yard in London. Britons joined the Australia, the United States, Denmark and Finland darknet market list in the top five drunkest nations

Two percent drank too much at a virtual party. 

Britons joined the United States, Denmark and Finland in the top five drunkest nations after Australia.

France leads the world for the average number of drinks consumed in a year, dark web link web darknet market links enjoying more than 132 glasses of booze, followed by New Zealand on 122, while Australians had 106 drinks per year on average.

Despite this, the use of almost all drug classes fell in 2021 compared with last year's sample.

Alcohol consumption fell to 92.8 per cent to 94 per cent and 51 per cent said they had smoked cigarettes in 2021 compared to 60.8 per cent in 2020.

The report said this could be due to the older age of the sample group or that most drugs were simply used less amidst the pandemic.

The Danish felt the least regretful after drinking and were also the second drunkest nation after Australia in 2021

France leads the world for the average number of drinks consumed in a year, darknet market darknet markets onion address links enjoying more than 132 glasses of booze

People got less drunk over the lockdown and the rate of people seeking emergency help after consuming drugs fell for most substances too. 

However the report's finding suggest that microdosing, which is when a very small amount of a substance is taken to observe its effects on the body, 'may be on the increase among those who use psychedelics'.

One in four of this group said they had microdosed with LSD or psilocybin (more commonly known as 'magic mushrooms') in the last 12 months.

One third of those who had taken psychedelics before also experimented microdosing with MDMA, ketamine, DMT, and 1P-LSD.

The study also found that although the pandemic may have locked us in, most people who used illegal drugs still obtained substances in-person

For those who used illegal drugs, most sourced them in person despite Covid restrictions making this difficult for many

The study also found that although the pandemic may have locked us in, most people who used illegal drugs still obtained substances in-person. 

Where this occurred, people were most likely to get their supply from friends. 

Some 1 in 10 mentioned digital sources and reported darknet markets for drugs other than cannabis, which was more often accessed through apps.

The first question of the survey asked respondents to sum up 2020 in one word.

After translating responses the report said that the 'main theme was a negative sentiment' towards the year, with 'sh**', 'f***ed' and 'challenging' dominating the general consensus. 

More than 150 arrested in global crackdown on Darknet traders:...

Posted on

THE HAGUE, Oct 26 (Reuters) - At least 150 people have been arrested by European and U.S.

authorities after a joint crackdown on traders of drugs, weapons and other illicit goods on darknet market e-commerce sites, Dutch media reported Tuesday citing police agency Europol.

Cash and cryptocurrency worth 26.7 million euros ($31 million) and 234 kilograms of drugs were also seized, according to Dutch broadcaster KRO-NRCV.

"This operation proves that we can reach (criminals on the dark web) even if they think they are hiding somewhere, they cannot be sure we won't be there at one moment to knock on their door", Europol's deputy executive director of operations, Jean-Philippe Lecouffe told the broadcaster.

Europol would not comment on the report, but referred to a press conference set for 10AM local time (1400 GMT) in Washington with the Department of Justice.

According to the Dutch media 65 U.S.

nationals were arrested, along with 47 Germans, 24 Brits and a handful of Dutch, tor drug darknet market French, Swiss and Bulgarian nationals.

The operation focused on sellers and dark web market links buyers on the darknet market rather than the people running the sites as in earlier crackdowns.

Darknet markets are e-commerce sites designed to lie beyond the reach of regular search engines.

They are popular with criminals, darknet market lists as buyers and darknet market magazine sellers are largely untraceable.

In January this year, Europol announced it had taken down an online marketplace called "DarkMarket" that sold illegal drugs in an operation led by German law enforcement agencies.

($1 = 0.8593 euros)

(Reporting by Stephanie van den Berg, editing by Bart Meijer and Christina Fincher)

Inside busted illegal $220million darknet data centre

Posted on

Bank.jpg

Footage has emerged of the inside of a five-storey abandoned underground NATO bunker built with 31inch thick concrete walls in Germany allegedly converted by criminal gangs into a high tech data centre to host darknet market websites. 

An Australian man was arrested on Monday accused of running a $220million illegal darkweb marketplace - called the biggest in the world and ' for criminals' - after ha was tracked following the bunker's discovery. 

The joint investigation by Australian Federal Police, Scotland Yard, the , Europol, and German authorities, among others, arrested the man, 34, as he allegedly tried flee across the Danish border into . 

The man, known only as Julian K, is the alleged operator of DarkMarket and has been detained by German investigators.

The 5,000sq m former NATO bunker located in south-western Germany (pictured) was built with 31inch thick concrete walls and darkmarket url was converted into a data facility called CyberBunker to host darknet websites after being bought in 2012 

A night-vision aerial view of the aboveground portion of the bunker containing a gatehouse, office, darknet market darknet markets helipad and entrance building (pictured) which descends another four levels below the surface 

A screenshot of the illegal website allegedly run by the arrested Australian man and temporarily hosted on CyberBunker which displays drugs for sale (pictured) 

German police officers walk through the gate at the perimeter of the former Cold War bunker (pictured) converted into an illegal data centre after it was raided in 2019 

DarkMarket was shut down on Monday and its new servers, located in Ukraine and Moldova after relocating from the bunker, were taken off the internet, prosecutors in the city of Koblenz said.

'Until its closure, DarkMarket was probably the largest marketplace worldwide on the darknet market, with almost 500,000 users and more than 2400 sellers,' prosecutors said. 

More than 320,000 transactions were conducted via the website including the sale of drugs, counterfeit money, darknet markets onion address stolen or falsified credit cards, anonymous SIM cards and malware.

The transactions were reportedly worth a total of 4,650 bitcoin and 12,800 monero - two cryptocurrencies - for an equivalent sum of more than $221million. 

The servers will be forensically examined by authorities to uncover information about the website's operations and criminal network. 

The solid concrete bunker (pictured) was built to withstand a nuclear blast is located in the south-western German town of Traben-Trarbach 

Two of the entrances to the disused bunker (pictured) which was raided by police in 2019 after being bought by a private foundation based in Denmark in 2012 

The accused man has already fronted a German court and been denied bail - to be transferred to a German prison in the next few days. 

He has reportedly refused to speak to investigators or court officials. 

German prosecutors said the man was trying to flee Denmark into Germany when arrested and was travelling through Europe either on holiday or conducting business for the illegal website. 

They said the investigation around DarkMarket originated after the discovery of the data processing centre run by criminals in the 5,000sqm former unused bunker in south-west Germany. 

The discovery of the illegal data centre in the bunker led to the arrest of multiple people accused of being part of a criminal network and being an accessory to hundreds of thousands of illegal transactions.

Some went on trial in October (pictured) 

The data facility hosted illegal websites, which included DarkMarket temporarily, and was shut down in 2019. 

The building, constructed by the West-German military, in the mid-1970s descended five-storeys below the surface and was built with 31inch thick concrete walls to withstand a nuclear blast. 

A meteorological division of the military used the facility after the Cold War until 2012 to forecast weather patterns where German soldiers were deployed. 

The building was sold to a foundation based in Denmark in 2012 after officials could find no other buyers for the vacant facility. 

A number of people were arrested after the discovery of the data centre - accused of being part of a criminal network and being accessories to hundreds of thousands of illegal transactions involving prohibited material such as drugs and hacking tools. 

Some already went on trial in October. 

The darkweb was originally developed for the United States military but has been overrun by criminals because they can conceal their identity on the platform. 

Server rows constructed in the bunker which is made of solid concrete and climate controlled (pictured).

The data centre was dismantled after the raid and multiple people linked to the centre were put on trial 

The history of hacking ransoms and cryptocurrency

Posted on

id="article-body" class="row" section="article-body" data-component="trackCWV">

Earlier this month, hundreds of companies from the US to Sweden were entangled in the , a company that offers network infrastructure to businesses around the world.

The Kaseya hack comes on the heels of other headline-grabbing cyberattacks like the  and the . In each instance, criminals had the opportunity to make off with millions -- and much of the ransoms were paid in Bitcoin.

"We have to remember the primary reason for creating Bitcoin in the first place was to provide anonymity and secure, trustless and borderless transaction capabilities," says Keatron Evansprincipal security researcher at .

As Bitcoin grows more prominent in best darknet markets around the world, cybercrooks have found a vital tool to help them move illegal assets quickly and pseudonymously. And by all accounts, the attacks are only becoming more common. 

Ransomware on the rise

Ransomware is a cybercrime that involves ransoming personal and business data back to the owner of that data. 

First, a criminal hacks into a private network. The hack is accomplished through various tactics, including phishing, social engineering and preying upon users' weak passwords.

Once network access is gained, the criminal locks important files within the network using encryption. The owner can't access the files unless they pay a ransom. Nowadays, cybercriminals tend to request their ransoms in cryptocurrencies.

The FBI  ransomware attacks accounted for at least $144.35 million in Bitcoin ransoms from 2013 to 2019. 

These attacks are scalable and can be highly targeted or broad, darknet markets onion ensnaring anyone who happens to click a link or install a particular software program. 

This allows a small team of cybercrooks to ransom data back to organizations of all sizes -- and the tools needed to hack into a small business or multinational cooperation are largely the same. 

Private citizens, businesses, and state and national governments have all fallen victim -- and many decided to pay ransoms.

Today's business world depends on computer networks to keep track of administrative and financial data. When that data disappears, it can be impossible for the organization to function properly. This provides a large incentive to pay up. 

Although victims of ransomware attacks are encouraged to report the crime to federal authorities, there's no US law that says you have to report attacks (). Given this, there's little authoritative data about the number of attacks or ransom payments. 

However, a recent study from Threatpost  only 20% of victims pay up. Whatever the actual number is, tor drug market the FBI  against paying ransoms because there's no guarantee that you'll get the data back, and paying ransoms creates further incentive for ransomware attacks. 

Why do hackers like cryptocurrency?

Cryptocurrency provides a helpful ransom tool for cybercrooks. Rather than being an aberration or misuse, the ability to make anonymous (or pseudonymous) transfers is a  of cryptocurrency. 

"Bitcoin can be acquired fairly easily. It's decentralized and readily 

available in almost any country," says Koen Maris, a cybersecurity expert and advisory board member at IOTA Foundation.

Different cryptocurrencies feature different levels of anonymity. Some cryptocurrencies, like Monero and Zcash, dark web darknet market urls specialize in confidentiality and may even provide a higher level of security than Bitcoin for cybercriminals. 

That's because Bitcoin isn't truly anonymous -- it's pseudonymous. Through careful detective work and analysis, it appears possible to trace and recoup Bitcoin used for ransoms, as the FBI  after the Colonial Pipeline hack. So Bitcoin isn't necessarily used by ransomers simply because of security features. Bitcoin transfers are also fast, irreversible and easily verifiable. Once a ransomware victim has agreed to pay, the criminal can watch the transfer go through on the public blockchain. 

After the ransom is sent, it's usually gone forever. Then crooks can either exchange the Bitcoin for another currency -- crypto or fiat -- or transfer the Bitcoin to another wallet for safekeeping. 

While it's not clear exactly when or how Bitcoin became associated with ransomware, hackers, cybercrooks, and crypto-enthusiasts are all computer-savvy subcultures with a natural affinity for new tech, and Bitcoin was adopted for illicit activities online soon after its creation. One of Bitcoin's first popular uses was currency for transactions on the dark web. The  was among the early marketplaces that accepted Bitcoin.

Financial impact

Ransomware is big business. Cybercriminals made off just under $350 million worth of cryptocurrency in ransomware attacks last year, . That's an increase of over 300% in the amount of ransom payments from the year before. 

The COVID-19 pandemic set the stage for a surge in ransomware attacks. With vast tracts of the global workforce moving out of well-fortified corporate IT environments into home offices, cybercriminals had more surface area to attack than ever.

According to , the organizational changes needed to accommodate remote work opened up more businesses for cybercrime exploits, dark market url markets with Coalition's policyholders reporting a 35% increase in funds transfer fraud and social engineering claims since the beginning of the pandemic.

It's not just the number of attacks that is increasing, but the stakes, too. A  from Palo Alto Networks estimates that the average ransom paid in 2020 was over $300,000 -- a year-over-year increase of more than 170%.

When an organization falls prey to cybercrime, the ransom is only one component of the financial cost. There are also remediation expenses -- including lost orders, business downtime, consulting fees, and other unplanned expenses. 

The  report from Sophos found that the total cost of remediating a ransomware attack for a business averaged $1.85 million in 2021, up from $761,000 in 2020. 

Many companies now buy cyber insurance for financial protection. But as ransomware insurance claims increase, the insurance industry is also dealing with the fallout.

Globally, the price of cyber insurance has , according to a new report from Howden, an international insurance broker. The increase is likely due to the growing cost these attacks cause for insurance providers. 

A cyber insurance policy generally covers a business's liability from a data breach, such as expenses (i.e., ransom payments) and legal fees. Some policies may also help with contacting the businesses customers who were affected by the breach and repairing damaged computer systems. 

Cyber insurance payouts now account for  of all premiums collected, which is the break-even point for the providers. 

"We noticed cyber insurers are paying ransom on behalf of their customers. That looks like a bad idea to me, as it will only lead to more ransom attacks," says Maris. "Having said that, I fully understand the argument: the company either pays or it goes out of business. Only time will tell whether investing in ransom payments rather than in appropriate cybersecurity is a viable survival strategy."

Early adopters

The AIDS Trojan, or PC Cyborg Trojan, is the first known ransomware attack. 

The attack began in 1989 when an AIDS researcher distributed thousands of copies of a floppy disk containing malware. When people used the floppy disk, it encrypted the computer's files with a message that demanded a payment sent to a PO Box in Panama. 

Bitcoin wouldn't come along until almost two decades later. 

In 2009, Bitcoin's mysterious founder, Satoshi Nakamoto, created the blockchain network by mining the first block in the chain -- the genesis block. 

Bitcoin was quickly adopted as the go-to currency for the dark web. While it's unclear exactly when Bitcoin became popular in ransomware attacks, the 2013 CryptoLocker attack definitely put Bitcoin in the spotlight. 

CryptoLocker infected more than 250,000 computers over a few months. The criminals made off with about $3 million in Bitcoin and pre-paid vouchers. It took an internationally coordinated operation to take the ransomware offline in 2014.

Since then, Bitcoin has moved closer to the mainstream, and ransomware attacks have become much easier to carry out.

Early ransomware attackers generally had to develop malware programs themselves. Nowadays, ransomware can be bought as a service, just like other software. 

Ransomware-as-a-service allows criminals with little technical know-how to "rent" ransomware from a provider, which can be quickly employed against victims. Then if the job succeeds, the ransomware provider gets a cut. 

Future legislation

In light of the recent high-profile ransomware attacks, calls for new legislation are growing louder in Washington.

President Joe Biden issued an  in May "on improving the nation's cybersecurity." The order is geared toward strengthening the federal government's response to cybercrime, and it looks like more legislation is on the way.

The  was recently introduced by a bipartisan group of senators. The bill aims to ramp up penalties for cyberattacks that impact critical infrastructure, so the Justice Department would have an easier time charging criminals in foreign countries under the new act.

States are also taking their own stands against cybercrime:  have proposed legislation to outlaw ransomware payments. North Carolina, Pennsylvania, and Texas are all considering new laws that would outlaw taxpayer money from being used in ransom payments. New York's law goes a step further and could outright ban private businesses from paying cybercrime ransoms. 

"I think the concept of what cryptocurrency is and how it works is something that most legislative bodies worldwide struggle with understanding," says Evans. "It's difficult to legislate what we don't really understand."

macro-cogwheel-gear-engine-vintage-industrial-work-mechanism-mechanics-thumbnail.jpg

  
Scroll to top