Why do ransomware gangs make a lot cash? | TechCrunch (2024)

For a lot of organizations and startups, 2023 was a tricky yr financially, with corporations struggling to lift cash and others making cuts to outlive. Ransomware and extortion gangs, however, had a report yr in earnings, if latest studies are something to go by.

It's not shocking if you have a look at the state of the ransomware panorama. Final yr, hackers continued to evolve their techniques to turn out to be extra ruthless and excessive of their efforts to stress victims into paying their more and more exorbitant ransom calls for. This escalation of techniques, coupled with the truth that governments have stopped in need of banning ransom funds, led to 2023 changing into probably the most profitable yr but for ransomware gangs.

The multi-billion greenback cybercrime enterprise

Based on new information from crypto-forensics startup Chainalysis, recognized ransomware payouts almost doubled in 2023 to surpass the $1 billion mark, calling the yr a “main ransomware comeback.”

That's the best determine ever noticed and almost double the variety of recognized ransom funds tracked in 2022. However Chainalysis stated the true determine is probably going a lot greater than the $1.1 billion in ransom funds it has seen up to now. .

Nevertheless, there’s a glimmer of excellent information. Whereas 2023 was total a banner yr for ransomware gangs, different hacker watchers famous a drop in payouts towards the tip of the yr.

This drop is a results of enhancing cyber defenses and resilience, together with the rising sentiment that the majority sufferer organizations don’t belief hackers to maintain their guarantees or delete stolen information as they declare. “This has led to higher steerage for victims and fewer funds for intangible collateral,” based on ransomware remediation firm Coveware.

Unprecedented rescues

Whereas extra ransomware victims refuse to line hackers' pockets, ransomware gangs are making up for this drop in earnings by rising the variety of victims they aim.

Take the MOVEit marketing campaign for instance. On this large assault, the prolific Russian-linked Clop ransomware gang mass-exploited a never-before-seen vulnerability within the extensively used MOVEit Switch software program to steal information from the programs of greater than 2,700 sufferer organizations. Lots of the victims are recognized to have paid the hacking group in an effort to stop the publication of delicate information.

Whereas it's not possible to know precisely how a lot cash the huge assault generated for the ransomware group, Chainalysis stated in its report that Clop's MOVEit marketing campaign racked up greater than $100 million in ransom funds and accounted for almost half of all the worth of the ransomware. ransomware obtained in June and July. 2023 through the peak of this large hack.

MOVEit was under no circ*mstances the one worthwhile marketing campaign of 2023.

In September, on line casino and leisure big Caesars paid roughly $15 million to hackers to stop the disclosure of buyer information stolen throughout a cyberattack in August.

This multimillion-dollar payout maybe illustrates why ransomware actors proceed to make a lot cash: The Caesars assault barely made the information, whereas a subsequent assault on resort big MGM Resorts, which has up to now value the corporate $100 million to get well, {dollars}, dominated the headlines for weeks. MGM's refusal to pay the ransom led to hackers releasing delicate information of MGM prospects, together with names, Social Safety numbers, and passport particulars. Caesars, a minimum of on the floor, appeared largely unscathed, even when, by its personal admission, it couldn’t assure that the ransomware gang would delete the corporate's stolen information.

Rising threats

For a lot of organizations, like Caesars, paying the ransom demand looks as if the simplest choice to keep away from a public relations nightmare. However as ransom cash dries up, ransomware and extortion gangs are upping the ante and resorting to ever-increasing techniques and excessive threats.

In December, for instance, it was reported that hackers tried to stress a most cancers hospital into paying a ransom demand by threatening to “crush” its sufferers. Swating incidents are primarily based on malicious calls that falsely declare a false risk to life in the true world, prompting a response from armed cops.

We additionally noticed the infamous Alphv ransomware gang (referred to as BlackCat) weaponize the US authorities's new information breach disclosure guidelines in opposition to MeridianLink, one of many gang's many victims. Alphv accused MeridianLink of allegedly failing to publicly disclose what the gang referred to as “a big breach that compromised buyer information and operational info,” for which the gang took credit score.

No ban on ransom funds

One more reason ransomware stays profitable for hackers is that, though it isn’t really helpful, there may be nothing stopping organizations from paying, until, after all, the hackers have been sanctioned.

To pay or to not pay the ransom is a controversial concern. Ransomware remediator Coveware means that if a ban on ransom funds had been imposed within the US or some other extremely victimized nation, corporations would seemingly cease reporting these incidents to authorities, reversing previous cooperation between corporations. victims and legislation enforcement companies. The corporate additionally predicts {that a} ban on ransom funds would result in the in a single day creation of a big unlawful market to facilitate ransomware funds.

Others, nonetheless, imagine {that a} blanket ban is the one manner to make sure that ransomware hackers can't proceed lining their pockets, a minimum of within the brief time period.

Allan Liska, a risk intelligence analyst at Recorded Future, has lengthy opposed banning ransom funds, however now believes that so long as ransom funds stay authorized, cybercriminals will do no matter it takes to gather them.

“I've resisted the concept of ​​blanket bans on ransom funds for years, however I believe that should change,” Liska advised TechCrunch. “Ransomware is getting worse, not solely within the variety of assaults however within the aggressive nature of the assaults and the teams behind them.”

“Banning ransom funds will probably be painful and, if historical past is any information, will seemingly result in a short-term improve in ransomware assaults, nevertheless it seems that is the one resolution that has an opportunity of long-term success on this second. interval,” Liska stated.

Whereas an increasing number of victims understand that paying hackers can not assure the safety of their information, it’s clear that these financially motivated cybercriminals won’t be abandoning their lavish life anytime quickly. Till then, ransomware assaults will stay a significant money-making train for the hackers behind them.

Learn extra on TechCrunch:

Why do ransomware gangs make a lot cash?  |  TechCrunch (2024)

FAQs

Why do ransomware gangs make a lot cash? | TechCrunch? ›

No ban on ransom payments

Which ransomware group is the most active? ›

LockBit, Black Basta and Play have been observed to be the most active ransomware groups in Q1 2024, with Black Basta experiencing a notable 41% increase in activity.

Where do most ransomware attacks come from? ›

Ransomware is often spread through phishing emails that contain malicious attachments or through drive-by downloading. Drive-by downloading occurs when a user unknowingly visits an infected website and then malware is downloaded and installed without the user's knowledge.

What is a ransomware payment? ›

Ransomware is a malware designed to deny a user or organization access to files on their computer. By encrypting these files and demanding a ransom payment for the decryption key, cyberattackers place organizations in a position where paying the ransom is the easiest and cheapest way to regain access to their files.

How does a ransomware attack work? ›

Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files. A criminal group will then demand a ransom in exchange for decryption.

What is the largest ransomware ever paid? ›

10 Biggest Ransom Payouts: CNA Financials. In March 2021, CNA Financial, a major U.S. insurance company, faced a record-breaking ransomware attack, paying hackers $40 million to regain control after being locked out for two weeks.

Is it illegal to pay ransomware in the USA? ›

While it's technically illegal to pay a ransom during a ransomware attack, many businesses still do it quietly to avoid further damage. Federal and local governments both have legal requirements relating to ransomware payments.

How often do companies pay ransomware? ›

By the numbers: 29% of organizations paid a ransom in the last quarter of 2023 to get their stolen data back and unlock their systems during a cyberattack, according to Coveware's report, released Friday. That's a completely different story from the 85% who were paying in the first quarter of 2019.

Can you go to jail for ransomware? ›

A Ukrainian national was sentenced on Wednesday to more than 13 years in prison and ordered to pay $16 million in restitution for helping to conduct a 2021 ransomware attack that infected hundreds of businesses in the US and abroad.

Is it illegal to pay off ransomware? ›

The legality of paying ransom in a cyberattack varies depending on the jurisdiction and the specific circ*mstances. In the United States, it is generally legal to make ransom payments. However, cybersecurity experts and law enforcement agencies strongly discourage organizations from doing so.

Has anyone paid ransomware? ›

The study, which surveyed over 1000 cybersecurity professionals, found that a staggering 84% of organizations agreed to pay a ransom demand after being breached. Of these, less than half (47%) got their data and services back uncorrupted, emphasizing that paying is generally not the solution.

What is the first thing to do in ransomware attack? ›

Isolate affected systems

Disconnect ethernet and disable WiFi, Bluetooth and any other network capabilities for any infected or potentially infected device. Two other steps to consider: Turning off maintenance tasks. Immediately disable automatic tasks—e.g., deleting temporary files or rotating logs—affected systems.

Can you trace ransomware? ›

Identifying ransom payments

Accumulation wallets are the key to identifying ransomware payments. Once one of these wallets is identified, we look at its transaction ledger to trace back all the payments that ended up in it. This tells us how many ransoms were paid to this wallet and when they were paid.

Why shouldn't you pay ransomware? ›

In general, the FBI advises that organizations refrain from paying ransoms because it simply emboldens malicious actors by telling them that extortion works. Those attackers can then justify expanding their operations and continuing to target organizations, making everyone less safe.

What are the active ransomware groups in 2024? ›

The most active groups in the first quarter of 2024 (Q1 2024) were LockBit, Black Basta, and Play. Black Basta saw the most growth in activity—41% quarter-over-quarter.

What is the biggest ransomware? ›

The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency.

What are the three main types of ransomware? ›

Because new variants emerge daily, ransomware remains one of the major security threats. Organizations and individuals must stay vigilant. There are currently five different types of ransomware: Crypto and Locker Ransomware, Scareware, Leakware and RaaS.

Top Articles
Latest Posts
Article information

Author: Rev. Porsche Oberbrunner

Last Updated:

Views: 6261

Rating: 4.2 / 5 (53 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Rev. Porsche Oberbrunner

Birthday: 1994-06-25

Address: Suite 153 582 Lubowitz Walks, Port Alfredoborough, IN 72879-2838

Phone: +128413562823324

Job: IT Strategist

Hobby: Video gaming, Basketball, Web surfing, Book restoration, Jogging, Shooting, Fishing

Introduction: My name is Rev. Porsche Oberbrunner, I am a zany, graceful, talented, witty, determined, shiny, enchanting person who loves writing and wants to share my knowledge and understanding with you.