Ransomware Extorts $25 Million in Payments over 2 Years
A team of researchers from New York University (NYU), University of California, San Diego (UCSD) and Google estimates that victims of ransomware have paid out more than $25 million over the last two years.
The team, which also included researchers from Chainalysis, a blockchain analysis firm, examined 300,000 files from more than 30 different kinds of ransomware and tracked blockchain payments to estimate the amount and scale of money paid by victims. Their findings are being presented this week at the Black Hat USA 2017 conference.
Danny Yuxing Huang, a Ph.D. candidate in Computer Science and Engineering UCSD and one of the researchers on the project, tracked bitcoins as they moved from potential victims to ransomware operators and from ransomware operators to coin exchanges, perhaps for liquidation.
"By masquerading as a part of the ransomware infrastructure," said Huang in a prepared statement, "I also gathered statistics on infected computers, such as the number of infections over time, and the geographical distribution of infected machines."
Last year was the first year ransomware was a multi-million-dollar industry, according to the researchers, and it wasn't necessarily the most well known ransomware that accounted for that growth.
The WannaCry attack, for example, generated seemingly endless headlines as it froze hospitals and more than 10,000 other organizations out of their own records, but it only pulled in about $140,000, good for the 11th spot on the list of ransomware with the largest payouts.
The researchers also noted that WannaCry wasn't true ransomware, but wipeware, as victims were not able to retrieve their data even after paying the ransom.
Locky and Cerber grabbed fewer headlines than WannaCry, but they're raking in money at $7.8 million and $6.9 million, respectively, in paid ransoms to date.
Locky is also notable for being the first ransomware to generate more than $1 million in monthly payments.
"Locky's big advantage was the decoupling of the people who maintain the ransomware from the people who are infecting machines," said Damon McCoy, assistant professor of computer science at NYU, in a prepared statement. "Locky just focused on building the malware and support infrastructure. Then they had other botnets spread and distribute the malware, which were much better at that end of the business."
About the Author
Joshua Bolkan is contributing editor for Campus Technology, THE Journal and STEAM Universe. He can be reached at [email protected].