{"id":20380,"date":"2021-12-21T19:43:37","date_gmt":"2021-12-21T19:43:37","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20380"},"modified":"2021-12-23T18:45:45","modified_gmt":"2021-12-23T18:45:45","slug":"the-link-between-ransomware-and-cryptocurrency","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/","title":{"rendered":"The Link Between Ransomware and Cryptocurrency"},"content":{"rendered":"<p>There are few guarantees in the IT industry, but one certainty is that as the world steps into 2022, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> will continue to be a primary cyberthreat.<\/p>\n<p>The dangers from ransomware have risen sharply since <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">WannaCry and NotPetya<\/a> hit the scene in 2017, and this year has been no different. A pair of recent reports underscores just how big that threat is.<\/p>\n<p>The <a href=\"https:\/\/www.fortinet.com\/content\/dam\/maindam\/PUBLIC\/02_MARKETING\/08_Report\/report-2021-threat%20landscape.pdf\" target=\"_blank\" rel=\"noopener\">Global Threat Landscape Report<\/a> released in August by FortiGuard, the <a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\">threat intelligence<\/a> unit of Fortinet, found that the weekly average of ransomware incidents over the previous 12 months had jumped 10.7 times. In Fortinet\u2019s <a href=\"https:\/\/www.fortinet.com\/content\/dam\/maindam\/PUBLIC\/02_MARKETING\/08_Report\/report-ransomware-survery.pdf\" target=\"_blank\" rel=\"noopener\">Global State of Ransomware Report<\/a> in September, two-thirds of companies surveyed had been victims of ransomware attacks and 85 percent said they were more concerned about ransomware than any other cyberthreat.<\/p>\n<p>The sharp increase in ransomware attacks can be attributed to many reasons, from the low level of cyber hygiene of some enterprises to insufficient <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\">training and education of employees<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patch management<\/a> issues, according to Derek Manky, chief of security insights and global threat alliances for Fortinet\u2019s FortiGuard Labs. Cybercriminals don\u2019t have to work too hard to get into these systems. When they do, the payoff can be huge, particularly as attackers are setting their sights on larger companies.<\/p>\n<h2><strong>Cryptocurrency Fuels Ransomware<\/strong><\/h2>\n<p>One constant in all this will be cryptocurrency, the coin of the realm when it comes to ransomware. The big payoffs, the tendency of most victims to pay the ransom demand, and the money to be made by selling or leasing their malware in the growing <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\">ransomware-as-a-service (RaaS)<\/a> market are all enticements when it comes to ransomware.<\/p>\n<p>The engine that is driving much of this is cryptocurrencies, which have become the way ransoms are paid and are creating the financial foundation for the rapid evolution of the ransomware market, the skyrocketing increases in incidents and the growing numbers of bad actors getting into it, Manky told <em>eSecurity Planet<\/em>.<\/p>\n<p>\u201cThere is no doubt a parallel rise here that we&#8217;re seeing,\u201d he said. \u201cIt is because of the cash cow. Cryptocurrency really is fueling this in a sense. &#8230; If you were to take cryptocurrency away from that, they don&#8217;t have a convenient digital platform. They&#8217;re going to have to go back to the drawing board. It actually makes their operations more expensive because they need to try to be innovative and get more boots on the ground themselves, just like any business would if they don&#8217;t have a platform.\u201d<\/p>\n<figure id=\"attachment_20383\" aria-describedby=\"caption-attachment-20383\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20383\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/12\/Fortinet-ransomware-detections-e1640115619789.png\" alt=\"ransomware growth\" width=\"900\" height=\"459\" \/><figcaption id=\"caption-attachment-20383\" class=\"wp-caption-text\">Fortinet ransomware detections<\/figcaption><\/figure>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/cybersecurity-blockchain-applications\/\">The State of Blockchain Applications in Cybersecurity<\/a><\/p>\n<h2><strong>Crypto Enables &#8216;Vicious Circle&#8217;<\/strong><\/h2>\n<p>Compounding all this is that ransomware is a \u201cvicious circle,\u201d Manky said.<\/p>\n<p>\u201cOnce you have that lower state of security and attackers are getting into systems, they&#8217;re forcing the hands as a means of enterprises to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/\">pay the ransom<\/a>,\u201d he said. \u201cWhen they&#8217;re paying the ransom using cryptocurrency, it&#8217;s encouraging cybercriminals. It&#8217;s making their pockets deeper. They don&#8217;t have to do a heavy lift to reap profits like they&#8217;re doing today.&#8221;<\/p>\n<p>The use of cryptocurrencies like Bitcoin, Ethereum and myriad others harkens back to the days of e-gold, another digital currency launched in the 1990s that included the use of online accounts. E-gold use peaked in the mid-2000s before it was suspended in 2009 for legal reasons. As cybercrime became more about monetization, cybercriminals began leveraging the currency for money laundering, fraud and other schemes, he said.<\/p>\n<p>Between the demise of e-gold and the rise of cryptocurrency, bad actors used a number of different ways to move money, including gift cards. They would steal credit cards to buy gift cards and then use those to be cashed out and sold to other people, Manky said.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-ransomware-removal-tools\/\">Best Ransomware Removal Tools<\/a><\/p>\n<h2><strong>&#8216;New Form of Crypto-jacking&#8217;<\/strong><\/h2>\n<p>The rise of cryptocurrency has had a ripple effect throughout the cybercriminal world, Mansky said. When it first hit the scene, the primary targets of threat actors were the cryptocurrency exchanges themselves. The payouts for hackers were significant; when they hit an exchange, they had access to hundreds of cryptocurrency wallets. However, exchanges began strengthening their security, which made attacking them more expensive, so cybercriminals shifted tactics and began increasingly to target users.<\/p>\n<p>\u201cInstead of robbing a bank, they&#8217;re going to the victims themselves,\u201d Manky said.<\/p>\n<p>For the past five years, there has been <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-cryptojacking-and-why-is-it-a-cybersecurity-risk\/\">cryptomining<\/a>, where bad actors infect systems with <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> that leverages the CPUs to mine for coins, essentially crowdsourcing stolen CPU power. More recently has been crypto-jacking, where hackers go directly into a user\u2019s wallet and steal their coins.<\/p>\n<p>This also has shifted the attack vector and opened up end users to greater threats. Attackers no longer are going after one target, he said. They may get into a system to steal digital wallets, but once a system is compromised, it\u2019s open to other attacks.<\/p>\n<p>\u201cIt&#8217;s a new form of crypto-jacking, essentially, but these are always multi-purpose in a sense, because in order to install that malware, they need what we call a &#8216;loader,\u2019\u201d he said. \u201cThey need a channel into that system. They do this through taking advantage of cyber-hygiene practices, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\">social engineering<\/a>, all those things we talk about. &#8230; But once they&#8217;ve infected these systems, they&#8217;re compromised, and oftentimes we see a lot of secondary attacks happening. It&#8217;s just more and more volume and attack angles.\u201d<\/p>\n<figure id=\"attachment_20384\" aria-describedby=\"caption-attachment-20384\" style=\"width: 1244px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20384\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/12\/Fortinet-ransomware-concerns.png\" alt=\"top ransomware concerns\" width=\"1244\" height=\"591\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Fortinet-ransomware-concerns.png 1244w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Fortinet-ransomware-concerns-300x143.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Fortinet-ransomware-concerns-1024x486.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Fortinet-ransomware-concerns-768x365.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Fortinet-ransomware-concerns-150x71.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Fortinet-ransomware-concerns-696x331.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Fortinet-ransomware-concerns-1068x507.png 1068w\" sizes=\"(max-width: 1244px) 100vw, 1244px\" \/><figcaption id=\"caption-attachment-20384\" class=\"wp-caption-text\">Fortinet: Top ransomware concerns<\/figcaption><\/figure>\n<h2><strong>Cybercrime Rewarded<\/strong><\/h2>\n<p>Cryptocurrency is enabling cybercriminals to enrich themselves beyond what had been possible. They not only can get paid more money for their actions, but the nature of the payments allows them to add more layers to their operations, making it more difficult to trace payments. It operates like cash in many ways. It makes hiding and laundering the payment easier.<\/p>\n<p><em>\u201c<\/em>They can actually print their own money,\u201d he said. \u201cThey can print cryptocurrency on a piece of paper. All it is is a big hash address, a cryptographic algorithm, and they can transfer it that way. They can transfer it on a USB stick. They can transfer it physically on a piece of paper and put it into a briefcase and give it to somebody else. Once they have that and the actual keys for it, the money&#8217;s theirs. It&#8217;s literally physically transferring a wallet to a wallet.\u201d<\/p>\n<p>And they have multiple coins to choose from. They can be paid in Bitcoin and wash the payment by shifting to Ethereum or other exchanges. It makes it difficult for investigators, who <strong>\u201c<\/strong>don&#8217;t have only one coin to follow,\u201d Manky said, adding that the bad actors \u201ccan fork that to 100 different alternate coins.&#8221;<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/ransomware-removal-and-recovery-services\/\">Best Ransomware Removal and Recovery Services<\/a><\/p>\n<h2><strong>More Sophisticated Cybercriminals<\/strong><\/h2>\n<p>The profits threat actors are reaping are helping to fuel the rise of a more sophisticated and well-armed hacker that is able to build greater expertise on the backend, so they have the capability to launch larger and more complex attacks.<\/p>\n<p>\u201cWe see cybercriminals now that lie between what&#8217;s typically been nation-state attacks and nation-state capability in terms of sophistication \u2013 like <a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\">zero-days<\/a> and these sorts of things \u2013 that\u2019s now in the realm of cybercriminals, too,\u201d he said.<\/p>\n<p>More money begets more sophisticated operations and methods \u2013 think ransomware-as-a-service (RaaS) \u2013 and that leads to not only more sophisticated campaigns but also more attackers. With RaaS offered by highly sophisticated groups, less skilled people can leverage such services to launch attacks.<\/p>\n<p>All these cryptocurrency-fueled trends \u2013 including the greater sophistication of cybercriminals driven by massive profits, the promise of payoffs and the expanding numbers of threat actors who can launch attacks \u2013 has helped fuel the growing global problem of ransomware.<\/p>\n<h2><strong>Breaking the Crypto Link<\/strong><\/h2>\n<p>U.S. lawmakers, who this year have become more involved in the problem of ransomware as critical infrastructure \u2013 including energy systems as seen in the <a href=\"https:\/\/www.esecurityplanet.com\/trends\/colonial-pipeline-ransomware-attack\/\">attack on Colonial Pipeline<\/a> and food supplies via the campaign as global meat processor JBS \u2013 also are seeing the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/white-house-congress-target-ransomware-payments\/\">link between ransomware and cryptocurrency<\/a>.<\/p>\n<p>In October, several senators and representatives sent a <a href=\"https:\/\/www.markey.senate.gov\/imo\/media\/doc\/Ransomware%20and%20Cryptocurrency%20Letter%20Final%2010-8-21.pdf\" target=\"_blank\" rel=\"noopener\">letter<\/a> to the departments of Justice, State and Homeland Security urging them to address \u2013 among other things \u2013 the role of cryptocurrencies in the rise of ransomware attacks, noting the anonymity the digital currencies give attackers.<\/p>\n<p>It\u2019s important for enterprises to understand that link as well, Manky said. A <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">key is prevention<\/a> and protections \u2013 like backing up data \u2013 because once ransomware is in a system, they are forcing many companies that have few other options to pay in cryptocurrency. The exchanges put in protective measures, which drove up the cost to cybercriminals of attacking the exchanges. Given the increasingly distributed nature of IT, it\u2019s important for enterprises to think about prevention and resiliency in a similar way.<\/p>\n<p>\u201cIf we don&#8217;t do that &#8230; it&#8217;s going to be very bleak,\u201d Manky said. \u201cIt&#8217;s going to continue to fund these cybercriminals. Their pockets are going to get deeper. Their capabilities are going to become more sophisticated. They have businesses of their own and like any business, as it grows, they add more and more people, more partners. In the \u201990s, it used to be one person. Then it was a handful of people. Now we&#8217;re seeing 50, 100 people with partners, even thousands in some of these organizations. That&#8217;s a big problem.\u201d<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\">Best Backup Solutions for Ransomware Protection<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f3a23fc32-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f3a23fc32\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f3a23fc32\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f3a23fc32\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f3a23fc32\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f3a23fc32\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f3a23fc32\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>There are few guarantees in the IT industry, but one certainty is that as the world steps into 2022, ransomware will continue to be a primary cyberthreat. The dangers from ransomware have risen sharply since WannaCry and NotPetya hit the scene in 2017, and this year has been no different. A pair of recent reports [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":20382,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2478],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31790],"class_list":["post-20380","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-ransomware","b2b_audience-awareness-and-consideration","b2b_product-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Link Between Ransomware and Cryptocurrency | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Cryptocurrency is fueling ransomware by making cybercrime easy and profitable. How can we break the connection?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Link Between Ransomware and Cryptocurrency | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Cryptocurrency is fueling ransomware by making cybercrime easy and profitable. How can we break the connection?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-21T19:43:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-23T18:45:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Blockchain-02-1088x725-1-e1668811680290.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"The Link Between Ransomware and Cryptocurrency\",\"datePublished\":\"2021-12-21T19:43:37+00:00\",\"dateModified\":\"2021-12-23T18:45:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/\"},\"wordCount\":1574,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Blockchain-02-1088x725-1-e1668811680290.jpg\",\"keywords\":[\"ransomware\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/\",\"name\":\"The Link Between Ransomware and Cryptocurrency | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Blockchain-02-1088x725-1-e1668811680290.jpg\",\"datePublished\":\"2021-12-21T19:43:37+00:00\",\"dateModified\":\"2021-12-23T18:45:45+00:00\",\"description\":\"Cryptocurrency is fueling ransomware by making cybercrime easy and profitable. How can we break the connection?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Blockchain-02-1088x725-1-e1668811680290.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Blockchain-02-1088x725-1-e1668811680290.jpg\",\"width\":900,\"height\":600,\"caption\":\"Cryptocurrency and ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Link Between Ransomware and Cryptocurrency\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Link Between Ransomware and Cryptocurrency | eSecurity Planet","description":"Cryptocurrency is fueling ransomware by making cybercrime easy and profitable. How can we break the connection?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/","og_locale":"en_US","og_type":"article","og_title":"The Link Between Ransomware and Cryptocurrency | eSecurity Planet","og_description":"Cryptocurrency is fueling ransomware by making cybercrime easy and profitable. How can we break the connection?","og_url":"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/","og_site_name":"eSecurity Planet","article_published_time":"2021-12-21T19:43:37+00:00","article_modified_time":"2021-12-23T18:45:45+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Blockchain-02-1088x725-1-e1668811680290.jpg","type":"image\/jpeg"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"The Link Between Ransomware and Cryptocurrency","datePublished":"2021-12-21T19:43:37+00:00","dateModified":"2021-12-23T18:45:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/"},"wordCount":1574,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Blockchain-02-1088x725-1-e1668811680290.jpg","keywords":["ransomware"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/","url":"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/","name":"The Link Between Ransomware and Cryptocurrency | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Blockchain-02-1088x725-1-e1668811680290.jpg","datePublished":"2021-12-21T19:43:37+00:00","dateModified":"2021-12-23T18:45:45+00:00","description":"Cryptocurrency is fueling ransomware by making cybercrime easy and profitable. How can we break the connection?","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Blockchain-02-1088x725-1-e1668811680290.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Blockchain-02-1088x725-1-e1668811680290.jpg","width":900,"height":600,"caption":"Cryptocurrency and ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"The Link Between Ransomware and Cryptocurrency"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20380"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20380"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20380\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20382"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20380"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20380"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20380"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}