Explained: How cryptocurrency turbocharged the cybercrime racket


Cyberattacks using ransomware are incre­asing in frequency, and ransom payments made to the hackers are swelling as well. Cryptocurrency and the exchanges where digital currency can be traded anony­mously have emerged as key tools for the cyber extortionists. The vast sums being paid by corporations to regain control of their computers would have been near-impossible to move in any other legitimate currency market, experts say.


How is crypto used in cybercrime?





A typical ransomware attack on a company or organisation might proceed like this: Executives realise their business website is down or systems inaccessible, and administrator overrides don’t work. A ransom demand arrives via email, providing a Bitcoin address where the payment must go if the company wants its systems operational again, along with a deadline. The victim calls up the Bitcoin address, which is 26 to 34 characters in length, when signing onto a cryptocurrency exchange to make the deposit.


What makes crypto attractive to criminals?


The anonymity built into the digital ledger system known as blockchain, which forms the foundation of cyber­curren­cies, can be leveraged through a variety of maneuvers. A ransom paid in Bitcoin can be swiftly run through a so-called cryptocurrency mixer, which obscures the trail of ownership by pooling it with other people’s holdings. (While the practice itself is not considered illegal, mixer operators can get into trouble if found to have laundered illegally gotten money.) Another option is to convert the ransom payment to a different cryptocurrency via a crypto exchange. So-called money mules can be recruited on dark web forums and directed to withdraw Bitcoins out of certain accounts.


How much has been stolen this way?


Ransomware attacks took off in 2020, when victims paid more than $406 mill­ion in crypto­curr­ency to attackers, accord­ing to blockchain analysis firm Chainanalysis Inc. This year, groups had taken at least $81 million from victims as of May, the firm said. Cybersecurity firms say companies have paid many millions of dollars more in ransoms that have been kept quiet. Being insured against cybercrime may make victims more willing to pay ransoms if they are covered under the in­surance policy. Hackers who specialise in ransomware are said to be actively seeking out targets that have insurance.


What did cyber thieves do before Bitcoin?


There have always been myr­iad ways to launder money — that is, to obscure its roots in illegal acti­v­i­ty. In the past, ransomware payments were delivered by money transfers thro­ugh services like Western Union, prepaid gift cards, wiring of funds into above-board bank accounts that are quickly tran­sfered out by the criminals, even cash in duffle bags left at designated areas for pickup.


Can payments made in cryptocurrency be traced?


Yes, at least at first. All Bitcoin transact­ions, while anonymous, are available for anyone to see, so someone tracking a par­ticular Bitcoin wallet can observe when cash arrives. But accessing the money inside the wallet requires a private key, essentially a password, and that’s some­thing ransomware groups do not normally share with anyone outside their operation.


Have any ransomware payments been foiled?


Yes. The US Federal Bureau of Investigation managed to recoup 63.7 of the 75 Bitcoins paid by Colonial Pipeline Co, operator of the biggest US gasoline pipeline, to a Russian-linked ransomware operation because it was able to track the money as it went through over a dozen transactions, and importantly, came into possession of the private key the hackers had used. (The 63.7 Bitcoins were worth about $2.3 million at the time of the FBI action.) In the warrant it issued to seize funds, the FBI did not say how its agents acquired the private key.


Can anything else be done?


Regulation may be coming. In April, the Ransomware Task Force, a private-public partnership created by the Institute for Security and Technology, published an 81-page report with recommendations for how governments can protect against and deal with ransomware attacks. The group urged governments to extend Know Your Customer (KYC), Anti-Money Laundering (AML) and Combating Financing of Terrorism (CFT) requirements — which national and international authorities enforce against banks around the world — to crypto exchanges, kiosks (crypto’s version of automated teller machines) and over-the-counter trading desks. Calls to ban Bitcoin altogether have been quieted by the currency’s gradual acceptance by the financial industry.

Dear Reader,

Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.

We, however, have a request.

As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.

Support quality journalism and subscribe to Business Standard.

Digital Editor



This news is republished from another source. You can check the original article here

Be the first to comment

Leave a Reply

Your email address will not be published.


*