Ransomware Payments Decline Post-Law Enforcement, Yet Remain Elevated: FinCEN Report

Published:

spot_img

According to a recent report from the U.S. Treasury’s Financial Crimes Enforcement Network (FinCEN), U.S. companies made ransomware payments totaling over $2 billion from 2022 through 2024. This marks a significant spike, nearly matching the total ransoms paid in the previous nine years leading up to this period.

The report analyzed threat patterns based on data collected from Bank Secrecy Act (BSA) filings. Between January 1, 2022, and December 31, 2024, FinCEN received 7,395 BSA reports concerning 4,194 ransomware incidents, generating payments exceeding $2.1 billion. For context, the prior nine-year influx, from 2013 to 2021, saw 3,075 BSA reports and around $2.4 billion in payments.

Understanding the Data Collection Limitations

It’s important to note the inherent limitations of FinCEN’s data, which relies on BSA filings; hence, the actual volume of ransomware incidents is likely understated. Reports indicate that 4,194 incidents recorded by FinCEN represent less than 40% of the nearly 11,000 ransomware attacks identified by Cyble’s threat intelligence during the same timeframe.

The year 2023 witnessed a record-high number of ransomware reports, with 1,512 incidents that totaled approximately $1.1 billion in payments—a 77% increase from the previous year. Although reports from 2024 showed a slight decline, with 1,476 incidents and about $734 million paid, this drop was largely attributed to law enforcement efforts that disrupted notable ransomware groups, including ALPHV/BlackCat and LockBit.

However, LockBit has begun to resurface, claiming 21 new victims in just the first month of 2024. During the reporting period, FinCEN identified 267 different ransomware variants, with Akira, ALPHV/BlackCat, LockBit, Phobos, and Black Basta being the most prevalent. Notably, the Qilin group has quickly emerged as a top contender in 2025, suggesting that FinCEN’s upcoming BSA data will reflect this evolving landscape.

Despite the downward trend in total payments, the figures for 2024 still represent the third-highest annual total since these reports began in 2013. The median payment for ransomware incidents reflected a rise from $124,097 in 2022 to $175,000 in 2023, settling at $155,257 in 2024. Throughout this period, ransom amounts predominantly fell below $250,000.

Industries Under Siege: Financial Services, Manufacturing, and Healthcare

Evaluating the number of attacks and total ransom payments, the financial services, manufacturing, and healthcare sectors emerged as the most frequently targeted industries during the specified timeframe. From January 2022 through December 2024, manufacturers faced 456 incidents, financial services had 432 incidents, and healthcare experienced 389 incidents. Other significantly impacted sectors included retail, with 337 incidents, and legal services, about 334 incidents.

In terms of total ransom payments, financial services again led the pack, with around $365.6 million paid, followed by healthcare at approximately $305.4 million, and manufacturing, accounting for about $284.6 million. The science and tech sectors, alongside retail, also contributed notably to ransom payments over the three years.

Regarding how these ransomware groups communicated with their victims, The Onion Router (TOR) was the preferred medium, as indicated in approximately 42% of BSA filings. Among these reports, 67% revealed that TOR was utilized, while email was cited by 28% as a method of communication.

When it comes to payment methods, Bitcoin (BTC) dominated the landscape, representing 97% of all reported ransom payments, with Monero (XMR) appearing in just 2% of BSA reports involving ransomware. Additionally, FinCEN outlined several common money laundering strategies employed by these criminals, highlighting the use of unhosted convertible virtual currency (CVC) wallets and exploitation of CVC exchanges.

Ransomware groups often collaborated with malicious cyber facilitators, such as shared initial access vendors, enhancing their capacity to execute a wide array of cybercrimes.

spot_img

Related articles

Recent articles

Attackers Exploit Cloudflare Zero-Day to Bypass WAF Using ACME Certificate Validation

Understanding the Cloudflare Zero-Day Vulnerability In the rapidly evolving landscape of web security, vulnerabilities can pose significant risks to both service providers and their customers....

Language as Vulnerability: Unpacking the Google Gemini Calendar Exploit

Understanding the Google Gemini Vulnerability: A New Era of Cyber Threats Introduction to the Vulnerability In recent years, cybersecurity teams have devoted considerable efforts to strengthen...

Salalah Mills Opens $65 Million Bakery Plant in Khazaen Economic City

Bakery Manufacturing Plant Launches in Khazaen Economic City Introduction to the New Facility The Food Development Company, a key subsidiary of Salalah Mills Company, has recently...

Turning Insights Into Action

20 Jan From Insight to Action Join the pivotal event where security experts unite to lead the future. The Security Middle East Conference is emerging as...