Víctimas de ataques de ransomware que se niegan a pagar: Chainalysis
- Chainalysis declaró que los atacantes de ransomware extorsionaron al menos $456.8 millones de víctimas en 2022, frente a $765.6 millones en 2021.
- “Much of the decline is due to victim organizations increasingly refusing to pay ransomware attackers,” said the blockchain firm.
- La mayoría de los fondos obtenidos de los ataques se enviaron a los principales intercambios centralizados, ya que el uso de DEX se redujo drásticamente.
- La vida útil de una cepa también se redujo y la cepa promedio permaneció activa durante 70 días en 2022, frente a 153 en 2021 y 265 en 2020.
2022 was one of the most active years for hackers and fraudsters in the crypto industry, including ransomware attackers. These attackers use a type of software, which is actually malware from cryptovirology, that completely cuts off a user’s access to their personal data or threatens to reveal that data publicly if a ransom is not paid. Interestingly, the revenue of such attackers now continues to decline as victims have started refusing to pay them.
Según un nuevo entrada en el blog from blockchain data firm Chainalysis, “Ransomware attackers extorted at least $456.8 million from victims in 2022, down from $765.6 million the year before.” This positive shift in the trend confirms the fact that victims are no longer afraid of such attackers after regulators have become increasingly active in the crypto industry, cracking down on all the developers who use their skills for bad purposes.
Chainalysis also stated that the values it has found are not true and that there are still addresses of ransomware attackers that are yet to be identified. However, the blockchain data firm noted that the money made from such attacks is significantly down. As per the firm’s belief, “much of the decline is due to victim organizations increasingly refusing to pay ransomware attackers.”
On the other hand, Chainalysis has reported a substantial growth in the number of ransomware strains in 2022 and also cited a report by cybersecurity firm Fortinet, which claimed that more than 10,000 strains of ransomware were active in the first half of 2022. Interestingly, Chainalysis said that “on-chain data confirms that the number of active strains has grown significantly in recent years, but the vast majority of ransomware revenue goes to a small group of strains at any given time.”
Además, la vida útil del ransomware también siguió disminuyendo en 2022, y la tensión promedio permaneció activa durante más de 70 días, lo que representa una reducción de más de 501 TP3T en comparación con los 153 días de 2021 y los 265 de 2020. Curiosamente, la firma blockchain también confirmó que los fondos realizados a través de estas actividades se transfieren principalmente a los principales intercambios de cifrado centralizados.
“The share of ransomware funds going to mainstream exchanges grew from 39.3% in 2021 to 48.3% in 2022, while the share going to high-risk exchanges fell from 10.9% to 6.7%. Usage of illicit services such as darknet markets for ransomware money laundering also decreased, while mixer usage increased from 11.6% to 15.0%,” said Chainalysis.
Chainalysis también afirmó que la mayoría de las veces, estos programas maliciosos funcionan como un modelo de ransomware como servicio (RaaS), es decir, el desarrollador permite que los atacantes usen su software por una pequeña parte de los ingresos. Además, como informó anteriormente Bitnation, la corporación tecnológica multinacional estadounidense Microsoft, ha detectado un ataque llamado DEV-013 que se dirige específicamente a las nuevas empresas criptográficas.