Ransomware Payments

Ransomware operators forcibly acquire illicit proceeds by extorting victims and demanding payments in cryptocurrencies, often leveraging a “double extortion” model in which they both encrypt and threaten to disclose stolen data. Upon receiving funds, criminals rapidly move them through multiple newly generated wallet addresses, deliberately avoiding address reuse for separate incidents. They frequently chain-hop across different blockchains, deploy mixers, or utilize anonymity-enhanced cryptocurrencies to frustrate investigators, and they commonly rely on unregulated or foreign centralized exchanges as cash-out points. Some groups operate under a ransomware-as-a-service structure, wherein they share software and resources for broader reach and increased profits. By combining the initial extortion phase with rapid cross-wallet layering, these actors effectively complicate attribution and obscure connections to the original crime.

[
Code
T0049.001
]
[
Name
Ransomware Payments
]
[
Version
1.0
]
[
Parent Technique
]
[
Risk
Product Risk, Channel Risk
]
[
Created
2025-02-12
]
[
Modified
2025-04-02
]

Tactics

Through ransomware extortion demands, criminals forcibly obtain illegal capital from victims' payments, which represents their core objective of generating illicit proceeds.

Risks

RS0002
|
Product Risk
|

This technique exploits the inherent pseudonymity and decentralized nature of cryptocurrencies, facilitating the rapid movement of ransomware proceeds across newly generated wallet addresses, mixing services, privacy-focused coins, and cross-chain mechanisms. These core product features fundamentally impede straightforward tracing and constitute the primary vulnerability leveraged by adversaries.

RS0003
|
Channel Risk
|

Ransomware operators exploit unregulated or foreign-based exchanges and bridging services as layered transaction channels to bypass stricter AML controls. By using these loosely regulated platforms for swift conversions and cashing out, they further hinder investigators' ability to trace ransom funds back to their illicit origin.

Indicators

IND00221
|

A sudden shift from primarily fiat-based transactions to digital asset transfers that deviates from a customer’s historical profile, especially following a ransomware demand.

IND01477
|

An abrupt shift from conventional banking channels to high-frequency digital asset transactions immediately following a ransomware extortion event.

IND01497
|

Frequent transfers of funds through multiple intermediary cryptocurrency accounts in short intervals, without any legitimate commercial rationale, consistent with layered movement of ransomware proceeds.

IND01506
|

Multiple rapid digital asset transactions among newly generated wallet addresses, including the use of mixing services, indicating layering to obscure ransomware proceeds.

IND01507
|

The creation or use of new cryptocurrency wallets not consistent with the customer’s historical activity, particularly when initiated near a ransom demand.

IND01508
|

Use of anonymizing mechanisms such as crypto mixers or tumblers during digital asset transfers, obscuring the transaction trail linked to ransomware proceeds.

IND01509
|

Chaining or swapping digital assets across multiple blockchains or bridging services in quick succession post-ransom payment, hindering straightforward traceability.

IND01510
|

Use of unregulated or foreign-based cryptocurrency exchanges to liquidate ransom proceeds, bypassing stringent local regulatory oversight.

Data Sources

  • Consolidates data on high-risk jurisdictions, including unregulated or foreign-based cryptocurrency exchanges.
  • Aids in flagging ransom proceeds liquidated in regions with weak AML controls or minimal regulatory oversight.
  • Alerts investigators to geographic risks associated with cross-border movements of ill-gotten funds following ransomware extortion.
  • Provides comprehensive records of both fiat and digital asset transactions, including timestamps, amounts, counterparties, and currency types.
  • Enables detection of abrupt shifts from traditional fiat usage to intensive cryptocurrency activity following ransom demands.
  • Helps investigators identify unusual spikes in transaction volumes or sudden changes in payment channels consistent with ransomware extortion.

Provides logs of digital asset transactions and user activity within cryptocurrency exchanges and other virtual asset service providers. This includes wallet addresses, user identities, trading volumes, deposit and withdrawal records, and associated account details. Such explicit data is crucial for tracing ransomware proceeds, detecting suspicious cross-exchange transfers, and potentially linking illicit wallets to real-world entities.

  • Contains verified customer identities, beneficial ownership information, and documented wallet addresses.
  • Helps identify newly created or unregistered cryptocurrency wallets by comparing them against a customer’s established profile.
  • Supports investigations by corroborating suspicious wallet activity with known customer attributes to uncover undisclosed connections to ransomware proceeds.
  • Offers public blockchain ledger information, such as transaction IDs, timestamps, wallet addresses, transaction amounts, and potential mixer addresses.
  • Facilitates the tracing of layered transfers, chain-hopping, and rapid multi-wallet movements used to obscure ransomware proceeds.
  • Supplies advanced analytics that highlight clusters of related wallets and detect anomalous patterns consistent with ransomware layering strategies.

Mitigations

Implement specialized monitoring rules to identify abrupt or high-frequency cryptocurrency outflows to newly created addresses, chain-hopping events, or multiple rapid transfers indicative of ransomware layering. By promptly flagging and investigating these patterns, institutions can disrupt further laundering of ransomware proceeds.

Use advanced blockchain analytics to trace funds across multiple addresses and blockchains, identifying mixers, anonymity-enhanced cryptocurrencies, or bridging services commonly used by ransomware groups for obfuscation. By tracking the flow of extorted funds, institutions can detect and intervene in ransomware-related layering activities.

Leverage open-source intelligence and specialized cybercrime feeds to track ransomware-related wallet addresses or mixing services. Cross-check suspicious cryptocurrency flows against external data sources to confirm links to ransomware operations. This approach enables timely intervention when extorted funds appear within the institution’s channels.

Collaborate with industry peers, law enforcement, and threat intelligence organizations to exchange real-time data on ransomware wallet addresses, mixing services, and chain-hopping tactics. This collective approach enables faster identification and blocking of transactions tied to ransomware extortion activities.

Restrict or apply heightened scrutiny to transactions involving unregulated or foreign-based cryptocurrency exchanges, newly generated wallets with no verifiable history, and known ransomware addresses. By limiting direct access to high-risk exit points, institutions reduce the likelihood of facilitating ransomware cash-outs.

Instruments

  • Criminals convert funds from public cryptocurrencies into privacy-centric coins (e.g., Monero) that obscure sender and receiver details.
  • Techniques such as ring signatures or stealth addresses hinder investigators from tracing the illicit proceeds back to the ransomware source.
  • Operators create numerous wallet addresses for each ransom event, avoiding reuse that would link one incident to another.
  • This rapid turnover in addresses severs a straightforward transaction trail, frustrating efforts to trace the origin of the extorted funds.
  • Self-custody reduces oversight by regulated entities, enabling criminals to conceal movements more effectively.
IN0027
|
|
  • Ransomware operators convert ransom proceeds into stablecoins on unregulated exchanges to achieve price stability during the layering process.
  • Frequent conversions between stablecoins and other cryptocurrencies complicate analysis, masking the original ransom flow and impeding investigations.
  • Ransomware perpetrators frequently demand ransom in widely recognized public blockchain assets (e.g., Bitcoin, Ethereum).
  • These funds are then rapidly moved between multiple addresses, each newly generated for separate incidents.
  • By fragmenting transactions on visible but pseudonymous ledgers, criminals make it harder to tie funds back to the initial ransomware event.
  • By wrapping assets, criminals move ransom proceeds across otherwise incompatible blockchains.
  • These cross-chain transfers increase transaction layers, severing clear links to the initial ransom wallet and complicating any single-ledger investigation.

Service & Products

  • Offers rapid exchange between various cryptocurrencies without extensive verification, preserving anonymity.
  • Criminals exploit frequent swaps to break transaction patterns and prevent linking addresses to known ransomware indicators.
  • Criminals funnel or cash out ransom proceeds on unregulated or foreign-based exchanges to circumvent tighter AML controls.
  • These platforms enable quick conversions between fiat and cryptocurrencies, obscuring the origin of funds and frustrating investigation.
  • Facilitates “chain-hopping” by transferring digital assets across different blockchain networks.
  • This approach disrupts investigators’ ability to follow the money as it moves away from the initial ransom wallet, impeding effective tracing.
  • Ransomware operators create multiple newly generated wallet addresses for each extortion incident, avoiding address reuse.
  • This rapid wallet creation fragments the transactional trail, making it difficult to trace illicit assets back to the initial ransom event.

Actors

Ransomware operators, as specialized cybercriminals, forcibly extort cryptocurrency payments and rapidly layer these proceeds. Their role involves:

  • Employing ransomware-as-a-service platforms and threatening victims with double extortion (data encryption and disclosure).
  • Generating new wallet addresses for each incident, fragmenting the transactional trail.
  • Engaging in chain-hopping, mixing services, and foreign exchanges to thwart tracing and obscure the crime’s origin.

These activities knowingly circumvent AML controls, posing significant challenges for financial institutions attempting to identify and freeze illicit funds.

Criminals exploit unregulated or foreign-based cryptocurrency exchanges to:

  • Cash out ransom proceeds or convert them into different cryptocurrencies without stringent oversight.
  • Conduct rapid deposits and withdrawals across multiple accounts, complicating investigators’ ability to trace funds.

Knowingly or unknowingly, these exchanges facilitate layering that obscures the original source of ransom payments, hindering financial institutions’ detection efforts.

Ransomware operators use mixers to:

  • Pool and shuffle incoming ransom funds with other transactions, obscuring ownership and transaction histories.
  • Break the chain of custody by severing direct links between sending and receiving addresses.

This service frustrates due diligence efforts by financial institutions and investigators, making it difficult to attribute illicit funds to the initial ransomware event.

References

  1. FATF (Financial Action Task Force). (2023, March). Countering ransomware financing. FATF. https://www.fatf-gafi.org/content/fatf-gafi/en/publications/Methodsandtrends/countering-ransomware-financing.html

  2. FinCEN (Financial Crimes Enforcement Network). (2021). Financial trend analysis: Ransomware trends in Bank Secrecy Act data between January 2021 and June 2021. FinCEN. https://www.fincen.gov/resources/advisoriesbulletinsfact-sheets

  3. FinCEN (Financial Crimes Enforcement Network). (2021). Advisory on Ransomware and the Use of the Financial System to Facilitate Ransom Payments (FIN-2021-A004). FinCEN. https://www.fincen.gov/sites/default/files/advisory/2021-11-08/FinCEN%20Ransomware%20Advisory_FINAL_508_.pdf