Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The Pros and Cons of Casinos Not on GamStop

    June 11, 2025

    Navigating Trust: Are New Online Casinos in the UK Fair and Reliable?

    June 11, 2025

    New Sportsbooks in the UK with In-Play Action

    June 10, 2025
    Facebook X (Twitter) Instagram
    The News Max
    • Home
    • Nature
    • Lifestyle
    • Jewellery
    • Real Estate
    • Contact
    • Register
    • Login
    The News Max
    Home » The history of hacking ransoms and cryptocurrency
    Uncategorized

    The history of hacking ransoms and cryptocurrency

    susanadarosa2By susanadarosa2January 6, 2024No Comments8 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email

    id=”article-body” class=”row” section=”article-body” data-component=”trackCWV”>

    Earlier this month, hundreds of companies from the US to Sweden were entangled in the , a company that offers network infrastructure to businesses around the world.

    The Kaseya hack comes on the heels of other headline-grabbing cyberattacks like the  and the . In each instance, criminals had the opportunity to make off with millions — and much of the ransoms were paid in Bitcoin.

    “We have to remember the primary reason for creating Bitcoin in the first place was to provide anonymity and secure, trustless and borderless transaction capabilities,” says Keatron Evans, principal security researcher at .

    As Bitcoin grows more prominent in best darknet markets around the world, dark darknet market url cybercrooks have found a vital tool to help them move illegal assets quickly and pseudonymously. And by all accounts, darknet markets onion the attacks are only becoming more common. 

    Contents hide
    1 Ransomware on the rise
    2 Why do hackers like cryptocurrency?
    3 Financial impact
    4 Early adopters
    5 Future legislation

    Ransomware on the rise

    Ransomware is a cybercrime that involves ransoming personal and business data back to the owner of that data. 

    First, a criminal hacks into a private network. The hack is accomplished through various tactics, including phishing, social engineering and preying upon users’ weak passwords.

    Once network access is gained, the criminal locks important files within the network using encryption. The owner can’t access the files unless they pay a ransom. Nowadays, cybercriminals tend to request their ransoms in cryptocurrencies.

    The FBI  ransomware attacks accounted for at least $144.35 million in Bitcoin ransoms from 2013 to 2019. 

    These attacks are scalable and can be highly targeted or broad, ensnaring anyone who happens to click a link or install a particular software program. 

    This allows a small team of cybercrooks to ransom data back to organizations of all sizes — and the tools needed to hack into a small business or multinational cooperation are largely the same. 

    Private citizens, businesses, and state and national governments have all fallen victim — and many decided to pay ransoms.

    Today’s business world depends on computer networks to keep track of administrative and financial data. When that data disappears, it can be impossible for the organization to function properly. This provides a large incentive to pay up. 

    Although victims of ransomware attacks are encouraged to report the crime to federal authorities, there’s no US law that says you have to report attacks (). Given this, there’s little authoritative data about the number of attacks or ransom payments. 

    However, a recent study from Threatpost  only 20% of victims pay up. Whatever the actual number is, the FBI  against paying ransoms because there’s no guarantee that you’ll get the data back, and paying ransoms creates further incentive for ransomware attacks. 

    Why do hackers like cryptocurrency?

    Cryptocurrency provides a helpful ransom tool for cybercrooks. Rather than being an aberration or misuse, the ability to make anonymous (or pseudonymous) transfers is a  of cryptocurrency. 

    “Bitcoin can be acquired fairly easily. It’s decentralized and readily 

    available in almost any country,” says Koen Maris, a cybersecurity expert and advisory board member at IOTA Foundation.

    Different cryptocurrencies feature different levels of anonymity. Some cryptocurrencies, like Monero and Zcash, specialize in confidentiality and may even provide a higher level of security than Bitcoin for cybercriminals. 

    That’s because Bitcoin isn’t truly anonymous — it’s pseudonymous. Through careful detective work and analysis, it appears possible to trace and recoup Bitcoin used for ransoms, as the FBI  after the Colonial Pipeline hack. So Bitcoin isn’t necessarily used by ransomers simply because of security features. Bitcoin transfers are also fast, irreversible and easily verifiable. Once a ransomware victim has agreed to pay, the criminal can watch the transfer go through on the public blockchain. 

    After the ransom is sent, it’s usually gone forever. Then crooks can either exchange the Bitcoin for another currency — crypto or fiat — or transfer the Bitcoin to another wallet for safekeeping. 

    While it’s not clear exactly when or how Bitcoin became associated with ransomware, hackers, cybercrooks, and crypto-enthusiasts are all computer-savvy subcultures with a natural affinity for new tech, and Bitcoin was adopted for illicit activities online soon after its creation. One of Bitcoin’s first popular uses was currency for transactions on the dark web. The  was among the early marketplaces that accepted Bitcoin.

    Financial impact

    Ransomware is big business. Cybercriminals made off just under $350 million worth of cryptocurrency in ransomware attacks last year, . That’s an increase of over 300% in the amount of ransom payments from the year before. 

    The COVID-19 pandemic set the stage for a surge in ransomware attacks. With vast tracts of the global workforce moving out of well-fortified corporate IT environments into home offices, cybercriminals had more surface area to attack than ever.

    According to , the organizational changes needed to accommodate remote work opened up more businesses for cybercrime exploits, with Coalition’s policyholders reporting a 35% increase in funds transfer fraud and social engineering claims since the beginning of the pandemic.

    It’s not just the number of attacks that is increasing, but the stakes, too. A  from Palo Alto Networks estimates that the average ransom paid in 2020 was over $300,000 — a year-over-year increase of more than 170%.

    When an organization falls prey to cybercrime, the ransom is only one component of the financial cost. There are also remediation expenses — including lost orders, business downtime, consulting fees, and other unplanned expenses. 

    The  report from Sophos found that the total cost of remediating a ransomware attack for a business averaged $1.85 million in 2021, up from $761,000 in 2020. 

    Many companies now buy cyber insurance for financial protection. But as ransomware insurance claims increase, the insurance industry is also dealing with the fallout.

    Globally, the price of cyber insurance has , according to a new report from Howden, an international insurance broker. The increase is likely due to the growing cost these attacks cause for insurance providers. 

    A cyber insurance policy generally covers a business’s liability from a data breach, such as expenses (i.e., ransom payments) and darknet market sites legal fees. Some policies may also help with contacting the businesses customers who were affected by the breach and repairing damaged computer systems. 

    Cyber insurance payouts now account for  of all premiums collected, which is the break-even point for the providers. 

    “We noticed cyber insurers are paying ransom on behalf of their customers. That looks like a bad idea to me, as it will only lead to more ransom attacks,” says Maris. “Having said that, I fully understand the argument: the company either pays or it goes out of business. Only time will tell whether investing in ransom payments rather than in appropriate cybersecurity is a viable survival strategy.”

    Early adopters

    The AIDS Trojan, or PC Cyborg Trojan, is the first known ransomware attack. 

    The attack began in 1989 when an AIDS researcher distributed thousands of copies of a floppy disk containing malware. When people used the floppy disk, it encrypted the computer’s files with a message that demanded a payment sent to a PO Box in Panama. 

    Bitcoin wouldn’t come along until almost two decades later. 

    In 2009, Bitcoin’s mysterious founder, Satoshi Nakamoto, created the blockchain network by mining the first block in the chain — the genesis block. 

    Bitcoin was quickly adopted as the go-to currency for the dark web market web. While it’s unclear exactly when Bitcoin became popular in ransomware attacks, the 2013 CryptoLocker attack definitely put Bitcoin in the spotlight. 

    CryptoLocker infected more than 250,000 computers over a few months. The criminals made off with about $3 million in Bitcoin and pre-paid vouchers. It took an internationally coordinated operation to take the ransomware offline in 2014.

    Since then, dark web market list Bitcoin has moved closer to the mainstream, and ransomware attacks have become much easier to carry out.

    Early ransomware attackers generally had to develop malware programs themselves. Nowadays, ransomware can be bought as a service, just like other software. 

    Ransomware-as-a-service allows criminals with little technical know-how to “rent” ransomware from a provider, which can be quickly employed against victims. Then if the job succeeds, the ransomware provider gets a cut. 

    Future legislation

    In light of the recent high-profile ransomware attacks, calls for new legislation are growing louder in Washington.

    President Joe Biden issued an  in May “on improving the nation’s cybersecurity.” The order is geared toward strengthening the federal government’s response to cybercrime, and it looks like more legislation is on the way.

    The  was recently introduced by a bipartisan group of senators. The bill aims to ramp up penalties for cyberattacks that impact critical infrastructure, so the Justice Department would have an easier time charging criminals in foreign countries under the new act.

    States are also taking their own stands against cybercrime:  have proposed legislation to outlaw ransomware payments. North Carolina, Pennsylvania, and Texas are all considering new laws that would outlaw taxpayer money from being used in ransom payments. New York’s law goes a step further and could outright ban private businesses from paying cybercrime ransoms. 

    “I think the concept of what cryptocurrency is and how it works is something that most legislative bodies worldwide struggle with understanding,” says Evans. “It’s difficult to legislate what we don’t really understand.”

    dark market 2024 dark websites onion dark website
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMassive dark web bust seizes $6.5 million from 179 alleged drug dealers
    Next Article Exness: The Journey to Becoming the World’s Largest Multi-Asset Broker
    susanadarosa2

    Related Posts

    Uncategorized

    The Pros and Cons of Casinos Not on GamStop

    June 11, 2025
    Uncategorized

    New Sportsbooks in the UK with In-Play Action

    June 10, 2025
    Uncategorized

    Could Snorter Token Be the Next Crypto Unicorn?

    June 4, 2025
    Add A Comment

    Comments are closed.

    Recent Posts

    • The Pros and Cons of Casinos Not on GamStop
    • Navigating Trust: Are New Online Casinos in the UK Fair and Reliable?
    • New Sportsbooks in the UK with In-Play Action
    • Exploring the Top Alternatives: Best UK Betting Sites Not Registered on GamStop
    • Could Snorter Token Be the Next Crypto Unicorn?
    Categories
    • Advertisement (1)
    • Animals (8)
    • App Development (2)
    • Arts and Entertainment (35)
    • Asian Restaurant (1)
    • Automotive (91)
    • Beauty (14)
    • Beauty and Wellness (9)
    • Business (238)
    • Buy and Sell (2)
    • Celebrities (2)
    • Clothing (23)
    • Commerce (1)
    • Communications (9)
    • Computers and Technology (21)
    • Construction (2)
    • cryptocurrency (3)
    • Digital Marketing (34)
    • E-commerce (3)
    • Editor's Picks (4)
    • Education (42)
    • Electronics (1)
    • Entertainment (5)
    • Fashion (33)
    • Featured (6)
    • Featured Reviews (6)
    • Finance (8)
    • Fitness (15)
    • Food (1)
    • Food and Drink (18)
    • Footwear (3)
    • Gadgets (2)
    • Gadgets (20)
    • Game (4)
    • Gaming (79)
    • Gaming (70)
    • Gaming Zone (50)
    • General (330)
    • Health (86)
    • Home and Family (32)
    • Home Based Business (39)
    • Home Improvement (71)
    • Industrial (1)
    • Insurance (115)
    • Internet and Businesses Online (44)
    • Jewellery (2)
    • Kids and Teens (5)
    • Legal (26)
    • Lifestyle (17)
    • Loan (3)
    • Marketing (11)
    • Markets (1)
    • Milk (1)
    • New Gadgets (7)
    • News (4)
    • People's Favorite (5)
    • Pets (1)
    • Phones (14)
    • Phones & Tech (8)
    • Photography (5)
    • Popular Now (6)
    • Real Estate (23)
    • Relationships (26)
    • Religion (2)
    • Self Improvement (23)
    • SEO (41)
    • Services (27)
    • Social Media (6)
    • Sports (3)
    • Sports &Leisure (1)
    • Tech (3)
    • Technology (39)
    • Technology (22)
    • Travel (2)
    • Travel and Leisure (52)
    • Trending Videos (9)
    • Uncategorized (6,459)
    • Vehicle (1)
    • Web Design (5)
    • Web Development (1)
    • Web Hosting (1)
    • Writing and Speaking (19)
    Top Posts
    Customize Chrome on Your Desktop

    Customize Chrome on Your Desktop: Unleash the Full Potential

    October 15, 202368 Views

    Why Electric Cars for Sale Should Be Your Next Purchase?

    December 22, 202348 Views
    women cardigans

    Different Types Of Pure Woolen Women Cardigans For All Seasons

    November 2, 202345 Views
    Latest Reviews
    85
    Featured Reviews

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    The News MaxJanuary 15, 2021
    8.1
    Featured Reviews

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    The News MaxJanuary 15, 2021
    8.9
    Featured Reviews

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    The News MaxJanuary 15, 2021

    Type above and press Enter to search. Press Esc to cancel.