Security

CSO

If Ransomware Inc was a company, its 2024 results would be a horror show

35% drop in payments across the year as your backups got better and law enforcement made a difference


Ransomware extortion payments fell in 2024, according to blockchain analyst biz Chainalysis this week.

Like infosec outfit NCC, Chainalysis thinks ransomware attacks increased during 2024. However the blockchain inspectors’ data suggests fewer victims paid ransoms, and online extortionists therefore raked in just $813.55 million last year compared to 2023's record-breaking haul of $1.25 billion. That's cryptocurrency payments that could be observed on public blockchains, to be clear.

"The number of ransomware events increased into the second half of the year, but on-chain payments declined, suggesting that more victims were targeted, but fewer paid," Chainalysis said.

More victims were targeted, but fewer paid

The results are perhaps a little surprising, considering the record-breaking $75 million payout by a Fortune 50 company to the Dark Angels crew in August 2024. On the other hand, perhaps payment amounts are down because organizations can't afford to pay, aren't allowed to pay, don't want to pay out of principle, or don't need to pay because the impact isn't worth the ransom demand.

Chainalysis's numbers also warrant careful consideration, as it uses volume of activity on ransomware gangs' data leak sites as a proxy for evidence of ransomware attacks rather than direct tallies of such incidents.

One might have hoped ransomware infections would be on the slide given law enforcement agencies have busted big ransomware gangs, but at least takings are down. The BlackCat and/or AlphV crew were smashed by police in December 2023. February 2024 saw an international operation take down the infamous LockBit operation shuttered.

Both groups later bounced back and resumed attacks. However, Chainalysis quoted Lizzie Cookson, senior director of incident response at ransomware specialists Coveware, as saying: "The market never returned to the previous status quo following the collapse of LockBit and BlackCat/ALPHV.”

"We saw a rise in lone actors, but we did not see any group(s) swiftly absorb their market share, as we had seen happen after prior high profile takedowns and closures,” Cookson said. “The current ransomware ecosystem is infused with a lot of newcomers who tend to focus efforts on the small- to mid-size markets, which in turn are associated with more modest ransom demands."

Another possible reason for the drop in ransom payments is, as we suspected, businesses are better prepared to recover from infections. Cookson opined victims feel it is cheaper to rebuild systems from secure backups than pay a ransom to retrieve information. Compromised machines need to be thoroughly wiped anyway.

"They may ultimately determine that a decryption tool is their best option and negotiate to reduce the final payment, but more often, they find that restoring from recent backups is the faster and more cost-effective path," she said.

Another factor is the criminals are learning that Bitcoin transactions and other forms of digi-cash transfers are harder to hide than expected, which means the ransomware business model becomes riskier.

That could be the result of concerted police action against cryptocurrency mixers such as Chipmixer and the North Korean favorite Sinbad, which make it harder to obfuscate evidence of digi-cash transactions.

Chainalysis noted the use of mixer services dropped markedly during 2024 and an increasing number of miscreants looked for different ways to access their coin.

Governments are taking an increasingly strong line against ransomware operators. Both the UK and US governments have come out against paying the extortionists. There's also anecdotal evidence the insurance industry - which gained a reputation for encouraging victims to pay up to reduce overall costs - is getting wise to the fact that feeding criminals money is unlikely to fix anything. ®

Send us news
2 Comments

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Ransomware isn't always about the money: Government spies have objectives, too

Analysts tell El Reg why Russia's operators aren't that careful, and why North Korea wants money AND data

Medusa ransomware gang demands $2M from UK private health services provider

2.3 TB held to ransom as biz formerly known as Virgin Care tells us it's probing IT 'security incident'

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Chinese spies suspected of 'moonlighting' as tawdry ransomware crooks

Some employees steal sticky notes, others 'borrow' malicious code

All your 8Base are belong to us: Ransomware crew busted in global sting

Dark web site seized, four cuffed in Thailand

Triplestrength hits victims with triple trouble: Ransomware, cloud hijacks, crypto-mining

These crooks have no chill

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process

Experts race to extract intel from Black Basta internal chat leaks

Researchers say there's dissent in the ranks. Plus: An AI tool lets you have a go yourself at analysing the data

Qualcomm pledges 8 years of security updates for Android kit using its chips (YMMV)

Starting with Snapdragon 8 Elite and 'droid 15

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling