After the WannaCry attack, no fewer than five threat research companies pounced on the fact that the ransomers were demanding to be paid in bitcoin. However, they completely glossed over the concept behind the malware itself. Within days, theorists came out of the woodwork to characterize the attack as some kind of subtle terrorist or government-backed operation. However, it’s worth considering the complexities of bitcoin and ransomware before spewing speculative notions.

Bitcoin and Ransomware

According to SonicWall’s “2017 Annual Threat Report,” the worldwide volume of ransomware attacks rose from 3.2 million in 2014 to 3.8 million in 2015. In 2016, the firm reported an astounding 638 million ransomware incidents. So far this year, the WannaCry ransomware alone accounted for 213,000 attacks in more than 100 countries.

CNN reported that cybercriminals extorted businesses to the tune of $209 million in the first three months of 2016. If that is correct, assuming that ransomware demands kept a steady pace during each quarter of 2016, the total amount of money collected through ransomware for the year should be equal to or greater than $836 million.

So far in 2017, the average number of bitcoin demanded with each infection of ransomware is 300. As of June 19, the bitcoin (XBT)-to-U.S. dollar exchange rate was 1 XBT = $2,531.61. Therefore, a single ransom payment in U.S. dollars, assuming the ransom is paid in bitcoin, would total $759,300.00.

This provides valuable insight into the ransomers’ thought process — namely, that there is no thought process at all. Rather, fraudsters seem to demand payment in bitcoin simply because the digital currency is trendy.

Money Is No Object

One bitcoin is worth more than a single ounce each of gold, palladium, platinum and rhodium, the most commonly traded metals on the commodities market. That exchange rate is more or less a flat exchange rate in the market economy, which does not take into account exchange fees, transaction fees, brokers or any value change that takes effect when bitcoin is spent on black market goods and services.

Time for a bit of speculative math: If ransomware criminals netted a total of $836 million dollars in profit, how much bitcoin could they buy using a digital currency exchange? Using the simplest equations:

  • Potential ransomware profit in 2016 = $836 million;
  • Transaction fee + conversion fee on a digital currency exchange = 50 cents per U.S. dollar;
  • $836 million x .50= $418 million in remaining profit;
  • 1 XBT = $2,531.61;
  • $418 million / $2,531.61 = 165,112.3198 bitcoin.

Now, all this simplistic math assumes at least one of three very important premises:

  1. The person or company held hostage by the ransomware knows what bitcoin is.
  2. The company or individual knows how and where to get bitcoins.
  3. The company or individual knows how to mine for bitcoins.

Considering the rate at which the ransom demands produce bitcoin payments, it is safe to say that those three premises are not always true. This tells astute researchers that the ransomware creators either failed to do their homework, do not understand the market to which they are pushing their malware, or rely on statistical averages to make their dreams of wealth and world domination come true.

Where Is the Money Going?

So where is all this money going? Popular theories claim that terrorist organizations, military agencies and illegal drug manufacturers purchase illicit supplies and equipment primarily in bitcoin. There are a few other areas, however, where individuals or organizations might benefit from dealing in the digital currency.

Lithium, for example, is priced between $39 and $45 per ingot (about 11 pounds). Lithium deposits are found in a handful of places on our planet. Considering that lithium ion batteries can power smartphones, laptops, tablets and electric cars, using bitcoin to purchase this material would be an investment both inside and outside of the black market.

Furthermore, citizens of countries whose currency has been devalued can use bitcoin to purchase essential items and services such as food, clothing, shelter, medicine, transportation and education. Likewise, bitcoin can be valuable in the event of an economic collapse, inflation, governmental dissolution or other large-scale catastrophe.

The $2,531.61 Question

It would be wonderful to conduct research into the life cycle of a bitcoin on the black market. Perhaps we could find answers to questions such as: Who is using it? When and where are they using it? What are they buying? How often are transactions made? How many times does a single bitcoin change hands? Is it being traded or kept as a potential new backing standard like gold? Is it being used to create not just a black market, but a secondary economy?

Answers to these questions would surely yield some fascinating insights into the relationship between bitcoin and ransomware. Until then, security analysts, individuals and organizations should become well-versed in basic ransomware prevention techniques.

Download the Ransomware Response Guide from IBM Incident Response services

More from Data Protection

Will the 2.5M Records Breach Impact Student Loan Relief?

Over 2.5 million student loan accounts were breached in the summer of 2022, according to a recent Maine Attorney General data breach notification. The target of the breach was Nelnet Servicing, a servicing system and web portal provider for the Oklahoma Student Loan Authority (OSLA) and EdFinancial. An investigation determined that intruders accessed student loan account registration information between June and July 2022. The stolen data includes names, addresses, emails, phone numbers and social security numbers for 2,501,324 student loan…

Transitioning to Quantum-Safe Encryption

With their vast increase in computing power, quantum computers promise to revolutionize many fields. Artificial intelligence, medicine and space exploration all benefit from this technological leap — but that power is also a double-edged sword. The risk is that threat actors could abuse quantum computers to break the key cryptographic algorithms we depend upon for the safety of our digital world. This poses a threat to a wide range of critical areas. Fortunately, alternate cryptographic algorithms that are safe against…

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and the Washington, D.C. chapter of the Association for Computing Machinery’s Special Interest Group on Security, Audit and Control. As noted by National Today, those in…

Resilient Companies Have a Disaster Recovery Plan

Historically, disaster recovery (DR) planning focused on protection against unlikely events such as fires, floods and natural disasters. Some companies mistakenly view DR as an insurance policy for which the likelihood of a claim is low. With the current financial and economic pressures, cutting or underfunding DR planning is a tempting prospect for many organizations. That impulse could be costly. Unfortunately, many companies have adopted newer technology delivery models without DR in mind, such as Cloud Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS)…