
Opfer von Ransomware-Angriffen, die sich weigern zu zahlen: Kettenanalyse
- Chainalysis gab an, dass Ransomware-Angreifer im Jahr 2022 mindestens $456,8 Millionen von Opfern erpresst haben, verglichen mit $765,6 Millionen im Jahr 2021.
- “Much of the decline is due to victim organizations increasingly refusing to pay ransomware attackers,” said the blockchain firm.
- Die meisten der durch die Angriffe erzielten Mittel wurden an große zentralisierte Börsen überwiesen, da die Nutzung von DEXs stark zurückgegangen ist.
- Die Lebensdauer eines Stammes sank ebenfalls, wobei der durchschnittliche Stamm im Jahr 2022 70 Tage lang aktiv blieb, verglichen mit 153 im Jahr 2021 und 265 im Jahr 2020.
2022 was one of the most active years for hackers and fraudsters in the crypto industry, including ransomware attackers. These attackers use a type of software, which is actually malware from cryptovirology, that completely cuts off a user’s access to their personal data or threatens to reveal that data publicly if a ransom is not paid. Interestingly, the revenue of such attackers now continues to decline as victims have started refusing to pay them.
Laut einer neuen Blogeintrag from blockchain data firm Chainalysis, “Ransomware attackers extorted at least $456.8 million from victims in 2022, down from $765.6 million the year before.” This positive shift in the trend confirms the fact that victims are no longer afraid of such attackers after regulators have become increasingly active in the crypto industry, cracking down on all the developers who use their skills for bad purposes.
Chainalysis also stated that the values it has found are not true and that there are still addresses of ransomware attackers that are yet to be identified. However, the blockchain data firm noted that the money made from such attacks is significantly down. As per the firm’s belief, “much of the decline is due to victim organizations increasingly refusing to pay ransomware attackers.”
On the other hand, Chainalysis has reported a substantial growth in the number of ransomware strains in 2022 and also cited a report by cybersecurity firm Fortinet, which claimed that more than 10,000 strains of ransomware were active in the first half of 2022. Interestingly, Chainalysis said that “on-chain data confirms that the number of active strains has grown significantly in recent years, but the vast majority of ransomware revenue goes to a small group of strains at any given time.”
Darüber hinaus sank auch die Lebensdauer von Ransomware im Jahr 2022 weiter, und der durchschnittliche Stamm blieb über 70 Tage aktiv, was mehr als 50% weniger ist als 153 Tage im Jahr 2021 und 265 im Jahr 2020. Interessanterweise bestätigte die Blockchain-Firma auch, dass die Mittel die über diese Aktivitäten getätigt werden, werden meist an große zentralisierte Krypto-Börsen übertragen.
“The share of ransomware funds going to mainstream exchanges grew from 39.3% in 2021 to 48.3% in 2022, while the share going to high-risk exchanges fell from 10.9% to 6.7%. Usage of illicit services such as darknet markets for ransomware money laundering also decreased, while mixer usage increased from 11.6% to 15.0%,” said Chainalysis.
Chainalysis erklärte auch, dass diese Malware die meiste Zeit als Ransomware-as-a-Service (RaaS)-Modell funktioniert, dh der Entwickler erlaubt den Angreifern, ihre Software für einen kleinen Teil der Einnahmen zu verwenden. Darüber hinaus, wie zuvor von Bitnation, dem amerikanischen multinationalen Technologiekonzern, berichtet Microsoft hat einen Angriff namens DEV-013 entdeckt das speziell auf Krypto-Startups abzielt.