What’s the best way to stop ransomware? Make it riskier and less lucrative for cyber criminals. Nearly all intruders prefer to collect a ransom in cryptocurrency. But it’s a double-edged sword since even crypto leaves a money trail. Recovering ransomware payouts could lead to a sharp decline in exploits.

Ransomware is still today’s top attack type, according to IBM Security’s latest research published in the tenth annual X-Force Threat Intelligence Index. It nets millions of dollars for nefarious actors and disrupts businesses, supply chains and entire industries.

Still, not all hope is lost. Using a multi-pronged approach, it’s possible to recover ransomware payments. In the long run, this could make a big difference in cyber crime reduction.

Recovering ransomware payments

Some still believe that cryptocurrency ransom payments can’t be recovered. This is far from the truth. For example, the Colonial Pipeline cyberattack resulted in the company paying a $4.4 million ransom in Bitcoin in early May 2021. But by early June 2021, the FBI recovered more than $2 million of the ransom paid.

In this case, a federal judge in the Northern District of California granted a warrant, and the feds seized proceeds from the crypto wallet that held the ransom. The warrant authorized the seizure of 63.7 bitcoin, or $2.3 million, per the exchange rate at the time of seizure.

The bureau obtained the private key for the wallet address, which enabled the FBI to confiscate the bitcoin from the wallet. Officials did not reveal how the FBI got the key.

Sanctioning the partners in crime

Threat actors have evolved quickly into offering Ransomware-as-a-Service. And like any other as-a-service project, it involves multiple affiliates. For example, if an attacker collects a ransom in bitcoin or ether, they need a cryptocurrency exchange to launder the money.

In September, the U.S. Department of the Treasury added the exchange Suex to its list of sanctioned entities due to laundering ties with ransomware attackers. Sanctions mean all property and interests of the target subject to U.S. jurisdiction are blocked. Also, U.S. persons are prohibited from engaging in transactions with sanctioned entities.

The sanctions also cover any entities 50% or more owned by one or more designated persons. Financial institutions and other persons that engage in certain transactions or activities with the sanctioned entities and individuals may expose themselves to sanctions as well, or be subject to an enforcement action.

Ransom recovery and arrests

In February 2022, the National Cryptocurrency Enforcement Team ran an investigation that led to the arrest of criminals conspiring to launder $4.5 billion worth of cryptocurrency. Allegedly, attackers stole the funds during the 2016 Bitfinex cryptocurrency exchange breach. As a result of law enforcement efforts, more than $3.6 billion in cryptocurrency was recovered. It was the largest Department of Justice (DOJ) crypto coin seizure to date.

In this case, the attackers laundered about 25,000 stolen bitcoin out of their wallet via an intricate process. It included automated money laundering transactions and sending stolen funds to a variety of exchanges and darknet markets. The attackers also converted ransomed bitcoin into other forms of virtual currency, including anonymity-enhanced virtual currency, in a practice known as chain hopping.

Despite this complex scheme, the DOJ caught and arrested the ones responsible. Commenting on the case, Assistant Attorney General Kenneth A. Polite Jr. of the Justice Department’s Criminal Division said, “Today, federal law enforcement demonstrates once again that we can follow [the] money through the blockchain, and that we will not allow cryptocurrency to be a safe haven for money laundering or a zone of lawlessness within our financial system.”

Tracing Bitcoin ransom payments

Law enforcement uses cryptocurrency, computer scientists, blockchain analysts and crypto-tracers to recover ransoms, according to Jeremy Sheridan, assistant director of investigations in the U.S. Secret Service within the Department of Homeland Security.

Crypto tracers enable law enforcement to aggregate and curate millions of open-source and private references, deception data and human intelligence. Harvested data points can include account types, account holders, contract types, contract owners and other metadata. Crypto tracing can also indicate illicit fund destinations, such as a wallet or an exchange. Crypto tracing solutions generate risk scores by profiling hundreds of global exchanges, ATMs, mixers, money laundering systems, gambling services and known criminal addresses.

Reporting ransomware

Another important measure in the fight against ransomware is incident reporting. Sadly, some organizations fear that reporting an attack could damage their good name. However, reporting adds valuable information to threat intelligence and can assist with ransom recovery efforts.

In light of this, the U.S. Congress recently approved the Strengthening American Cybersecurity Act, which applies to federal agencies and critical infrastructure. If signed into law, this new legislation mandates the reporting of attacks within 72 hours. In addition, it requires agencies to report ransomware payments within 24 hours.

Should I pay ransomware?

By far the most effective way to ‘recover’ ransomware payments is to not pay them at all. While some victims may feel they have no choice, consider these facts:

  • Even if you pay the ransom, the threat actors may not give you the decryption key to unlock your files
  • Even if the attackers give you the keys, your files may not be fully restored to their original state
  • After paying the ransom, attackers often threaten to leak or sell sensitive data on the darknet (‘double extortion’).

Instead, it’s best to have a solid anti-ransomware strategy. This includes:

  • Digital file backups to let you restore encrypted data
  • Segment network operations to prevent malware from spreading
  • Identity access management and zero trust solutions to secure the modern perimeter-less organization.

Ransomware isn’t going away anytime soon. Still, there are ways to recover ransomware payouts. Recovery success depends on the combined effort of advanced technology, law enforcement and the cooperation of both private and public organizations.

More from Risk Management

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today